Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Hacker culture A to Z - Kim Crawley

Hacker culture A to Z

a fun guide to the people, ideas and gadgets that made the tech world

(Autor)

Buch | Softcover
350 Seiten
2024 | 1. Auflage
O'Reilly Media (Verlag)
978-1-0981-4567-5 (ISBN)
CHF 64,55 inkl. MwSt
This fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.

This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. Read it like a coffee table book or a desk reference.

If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones.



Understand the relationship between hacker culture and cybersecurity
Get to know the ideas behind the hacker ethos, like "knowledge should be free"
Explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow
Appreciate the history of cybersecurity
Learn about key figures in the history of hacker culture
Understand the difference between hackers and cybercriminals

Kim Crawley has been a cybersecurity researcher and writer for well over a decade. She authored 8 Steps to Better Security, and co-authored The Pentester Blueprint, both with strongly positive reviews on Amazon and Goodreads. She was also featured in the first volume of Marcus J. Carey and Jennifer Jin's Tribe of Hackers. Her magazine articles and blogs have appeared in 2600 Magazine, CIO Magazine, Sophos Naked Security, AT&T Cybersecurity's blog, Infosecurity Magazine, Hack The Box, and too many other places to name here. Recently, she has given talks about penetration testing and hacker culture at SANS PenTest HackFest and Wild West Hackin' Fest. In her spare time, Kim enjoys playing JRPG video games, listening to goth, progressive, jazz, and funk music, cuddling her teddy bears, watching anime, astrology, being a pedantic know-it-all, looking at Lake Ontario from her condo in Toronto, and spending time with her metalhead partner, Jay.

Erscheinungsdatum
Zusatzinfo Illustrationen
Verlagsort Sebastopol
Sprache englisch
Einbandart kartoniert
Themenwelt Schulbuch / Wörterbuch Lexikon / Chroniken
Geschichte Teilgebiete der Geschichte Technikgeschichte
Informatik Theorie / Studium Kryptologie
ISBN-10 1-0981-4567-4 / 1098145674
ISBN-13 978-1-0981-4567-5 / 9781098145675
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Vom Perceptron zum Deep Learning

von Daniel Sonnet

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 27,95