Author: Brian Alleyne
Publisher: Springer
ISBN: 1349958190
Category : Social Science
Languages : en
Pages : 119
Book Description
Geeks, hackers and gamers share a common ‘geek culture’, whose members are defined and define themselves mainly in terms of technology and rationality. The members of geek culture produce and circulate stories to express who they are and to explain and justify what they do. Geek storytelling draws on plots and themes from the wider social and cultural context in which geeks live. The author surveys many stories of heated exchanges and techno-tribal conflicts that date back to the earliest days of personal computing, which construct the “self” and the “enemy”, and express and debate a range of political positions. Geek and Hacker Stories will be of interest to students of digital social science and media studies. Both geeky and non-technical readers will find something of value in this account.
Geek and Hacker Stories
Author: Brian Alleyne
Publisher: Springer
ISBN: 1349958190
Category : Social Science
Languages : en
Pages : 119
Book Description
Geeks, hackers and gamers share a common ‘geek culture’, whose members are defined and define themselves mainly in terms of technology and rationality. The members of geek culture produce and circulate stories to express who they are and to explain and justify what they do. Geek storytelling draws on plots and themes from the wider social and cultural context in which geeks live. The author surveys many stories of heated exchanges and techno-tribal conflicts that date back to the earliest days of personal computing, which construct the “self” and the “enemy”, and express and debate a range of political positions. Geek and Hacker Stories will be of interest to students of digital social science and media studies. Both geeky and non-technical readers will find something of value in this account.
Publisher: Springer
ISBN: 1349958190
Category : Social Science
Languages : en
Pages : 119
Book Description
Geeks, hackers and gamers share a common ‘geek culture’, whose members are defined and define themselves mainly in terms of technology and rationality. The members of geek culture produce and circulate stories to express who they are and to explain and justify what they do. Geek storytelling draws on plots and themes from the wider social and cultural context in which geeks live. The author surveys many stories of heated exchanges and techno-tribal conflicts that date back to the earliest days of personal computing, which construct the “self” and the “enemy”, and express and debate a range of political positions. Geek and Hacker Stories will be of interest to students of digital social science and media studies. Both geeky and non-technical readers will find something of value in this account.
Breaking and Entering
Author: Jeremy N. Smith
Publisher: Mariner Books
ISBN: 0544903218
Category : BIOGRAPHY & AUTOBIOGRAPHY
Languages : en
Pages : 309
Book Description
This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high-risk physical trespassing: the original "hacking." Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons--and the trespassing and social engineering talents she had developed while "hacking" at MIT. The company tested its clients' security by every means possible--not just coding, but donning disguises and sneaking past guards and secretaries into the C-suite. Alien now runs a boutique hacking outfit that caters to some of the world's biggest and most vulnerable institutions--banks, retailers, government agencies. Her work combines devilish charm, old-school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character-driven, fast-paced treatment it deserves.
Publisher: Mariner Books
ISBN: 0544903218
Category : BIOGRAPHY & AUTOBIOGRAPHY
Languages : en
Pages : 309
Book Description
This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high-risk physical trespassing: the original "hacking." Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons--and the trespassing and social engineering talents she had developed while "hacking" at MIT. The company tested its clients' security by every means possible--not just coding, but donning disguises and sneaking past guards and secretaries into the C-suite. Alien now runs a boutique hacking outfit that caters to some of the world's biggest and most vulnerable institutions--banks, retailers, government agencies. Her work combines devilish charm, old-school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character-driven, fast-paced treatment it deserves.
Mind Hacking
Author: John Hargrave
Publisher: Simon and Schuster
ISBN: 1501105663
Category : Body, Mind & Spirit
Languages : en
Pages : 240
Book Description
Presents a twenty-one-day, three-step training program to achieve healthier thought patterns for a better quality of life by using the repetitive steps of analyzing, imagining, and reprogramming to help break down the barriers, including negative thought loops and mental roadblocks.
Publisher: Simon and Schuster
ISBN: 1501105663
Category : Body, Mind & Spirit
Languages : en
Pages : 240
Book Description
Presents a twenty-one-day, three-step training program to achieve healthier thought patterns for a better quality of life by using the repetitive steps of analyzing, imagining, and reprogramming to help break down the barriers, including negative thought loops and mental roadblocks.
The Art of Intrusion
Author: Kevin D. Mitnick
Publisher: John Wiley & Sons
ISBN: 0470503823
Category : Computers
Languages : en
Pages : 354
Book Description
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
Publisher: John Wiley & Sons
ISBN: 0470503823
Category : Computers
Languages : en
Pages : 354
Book Description
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
Exploding the Phone
Author: Phil Lapsley
Publisher: Open Road + Grove/Atlantic
ISBN: 0802193757
Category : Business & Economics
Languages : en
Pages : 432
Book Description
“A rollicking history of the telephone system and the hackers who exploited its flaws.” —Kirkus Reviews, starred review Before smartphones, back even before the Internet and personal computers, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary “harmonic telegraph,” by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same. Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T’s monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell’s Achilles’ heel. Phil Lapsley expertly weaves together the clandestine underground of “phone phreaks” who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI. The product of extensive original research, Exploding the Phone is a groundbreaking, captivating book that “does for the phone phreaks what Steven Levy’s Hackers did for computer pioneers” (Boing Boing). “An authoritative, jaunty and enjoyable account of their sometimes comical, sometimes impressive and sometimes disquieting misdeeds.” —The Wall Street Journal “Brilliantly researched.” —The Atlantic “A fantastically fun romp through the world of early phone hackers, who sought free long distance, and in the end helped launch the computer era.” —The Seattle Times
Publisher: Open Road + Grove/Atlantic
ISBN: 0802193757
Category : Business & Economics
Languages : en
Pages : 432
Book Description
“A rollicking history of the telephone system and the hackers who exploited its flaws.” —Kirkus Reviews, starred review Before smartphones, back even before the Internet and personal computers, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary “harmonic telegraph,” by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same. Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T’s monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell’s Achilles’ heel. Phil Lapsley expertly weaves together the clandestine underground of “phone phreaks” who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI. The product of extensive original research, Exploding the Phone is a groundbreaking, captivating book that “does for the phone phreaks what Steven Levy’s Hackers did for computer pioneers” (Boing Boing). “An authoritative, jaunty and enjoyable account of their sometimes comical, sometimes impressive and sometimes disquieting misdeeds.” —The Wall Street Journal “Brilliantly researched.” —The Atlantic “A fantastically fun romp through the world of early phone hackers, who sought free long distance, and in the end helped launch the computer era.” —The Seattle Times
Hacked Again
Author: Scott N. Schober
Publisher: Hillcrest Publishing Group
ISBN: 0996902201
Category : Computers
Languages : en
Pages : 203
Book Description
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm Scott Schober, as he struggles to understand: the motives and mayhem behind his being hacked. As a small business owner, family man and tech pundit, Scott finds himself leading a compromised life. By day, he runs a successful security company and reports on the latest cyber breaches in the hopes of offering solace and security tips to millions of viewers. But by night, Scott begins to realize his worst fears are only a hack away as he falls prey to an invisible enemy. When a mysterious hacker begins to steal thousands from his bank account, go through his trash and rake over his social media identity; Scott stands to lose everything he worked so hard for. But his precarious situation only fortifies Scott's position as a cybersecurity expert and also as a harbinger for the fragile security we all cherish in this digital life. Amidst the backdrop of major breaches such as Target and Sony, Scott shares tips and best practices for all consumers concerning email scams, password protection and social media overload: Most importantly, Scott shares his own story of being hacked repeatedly and bow he has come to realize that the only thing as important as his own cybersecurity is that of his readers and viewers. Part cautionary tale and part cyber self-help guide, Hacked Again probes deep into the dark web for truths and surfaces to offer best practices and share stories from an expert who has lived as both an enforcer and a victim in the world of cybersecurity. Book jacket.
Publisher: Hillcrest Publishing Group
ISBN: 0996902201
Category : Computers
Languages : en
Pages : 203
Book Description
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm Scott Schober, as he struggles to understand: the motives and mayhem behind his being hacked. As a small business owner, family man and tech pundit, Scott finds himself leading a compromised life. By day, he runs a successful security company and reports on the latest cyber breaches in the hopes of offering solace and security tips to millions of viewers. But by night, Scott begins to realize his worst fears are only a hack away as he falls prey to an invisible enemy. When a mysterious hacker begins to steal thousands from his bank account, go through his trash and rake over his social media identity; Scott stands to lose everything he worked so hard for. But his precarious situation only fortifies Scott's position as a cybersecurity expert and also as a harbinger for the fragile security we all cherish in this digital life. Amidst the backdrop of major breaches such as Target and Sony, Scott shares tips and best practices for all consumers concerning email scams, password protection and social media overload: Most importantly, Scott shares his own story of being hacked repeatedly and bow he has come to realize that the only thing as important as his own cybersecurity is that of his readers and viewers. Part cautionary tale and part cyber self-help guide, Hacked Again probes deep into the dark web for truths and surfaces to offer best practices and share stories from an expert who has lived as both an enforcer and a victim in the world of cybersecurity. Book jacket.
Hacking Harvard
Author: Robin Wasserman
Publisher: Simon and Schuster
ISBN: 1442407441
Category : Young Adult Fiction
Languages : en
Pages : 339
Book Description
It's the ultimate challenge: breaking into the Ivy League. The hack: To get one deadbeat, fully unqualified slacker into the most prestigious school in the country. The crew: Eric Roth -- the good guy, the voice of reason. Max Kim -- the player who made the bet in the first place. Schwartz -- the kid genius already on the inside...of Harvard, that is. Lexi -- the beauty-queen valedictorian who insists on getting in the game. The plan: Use only the most undetectable schemes and techno-brilliant skills. Don't break the Hacker's Code. Don't get distracted. Don't get caught. Take down someone who deserves it. The stakes: A lot higher than they think. They've got the players, the plot, and soon -- the prize. It's go time.
Publisher: Simon and Schuster
ISBN: 1442407441
Category : Young Adult Fiction
Languages : en
Pages : 339
Book Description
It's the ultimate challenge: breaking into the Ivy League. The hack: To get one deadbeat, fully unqualified slacker into the most prestigious school in the country. The crew: Eric Roth -- the good guy, the voice of reason. Max Kim -- the player who made the bet in the first place. Schwartz -- the kid genius already on the inside...of Harvard, that is. Lexi -- the beauty-queen valedictorian who insists on getting in the game. The plan: Use only the most undetectable schemes and techno-brilliant skills. Don't break the Hacker's Code. Don't get distracted. Don't get caught. Take down someone who deserves it. The stakes: A lot higher than they think. They've got the players, the plot, and soon -- the prize. It's go time.
Home Hacking Projects for Geeks
Author: Anthony Northrup
Publisher: "O'Reilly Media, Inc."
ISBN: 0596004052
Category : Computers
Languages : en
Pages : 336
Book Description
Presents step-by-step instructions for a variety of projects to create ia high-tech home, including a pet monitor, a security system, a keyless entry, and a Linux-based home theater
Publisher: "O'Reilly Media, Inc."
ISBN: 0596004052
Category : Computers
Languages : en
Pages : 336
Book Description
Presents step-by-step instructions for a variety of projects to create ia high-tech home, including a pet monitor, a security system, a keyless entry, and a Linux-based home theater
Hardware Hacking Projects for Geeks
Author: Scott Fullam
Publisher: "O'Reilly Media, Inc."
ISBN: 0596003145
Category : Computers
Languages : en
Pages : 348
Book Description
A collection of unusual projects for computer hardware geeks of all ages explains how to create such projects as a personal Lojack system, Web-enabled coffee machine, cubicle intrusion detection systems, and a laptop battery extender.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596003145
Category : Computers
Languages : en
Pages : 348
Book Description
A collection of unusual projects for computer hardware geeks of all ages explains how to create such projects as a personal Lojack system, Web-enabled coffee machine, cubicle intrusion detection systems, and a laptop battery extender.
Love Hack
Author: Kimberly Dean
Publisher: Tiger Eye Productions, LLC
ISBN:
Category : Fiction
Languages : en
Pages : 150
Book Description
Some firewalls are hotter than others. Security analyst Spencer is excited when he lands a job at Afire Industries. The responsibility is daunting, but nowhere near as exhilarating as working with Josie, the pretty program manager in charge. He's attracted to her, but knows that she only sees him as a work friend. He needs to make himself over if he’s going to have a shot with her. Josie is all too aware of the cute computer geek watching over her. He was tempting before, but with his newfound muscles and sexy haircut, he’s suddenly irresistible . She makes the first move and is stunned to learn that her hot IT guy is just as studious in the sack. Their affair turns hot and heavy, but Josie broke her rule about a workplace romance once before. It didn't end well. When her ex returns and posts scandalous pictures of her on the Internet, it’s not Spencer’s muscles that she needs. She needs a hacker.
Publisher: Tiger Eye Productions, LLC
ISBN:
Category : Fiction
Languages : en
Pages : 150
Book Description
Some firewalls are hotter than others. Security analyst Spencer is excited when he lands a job at Afire Industries. The responsibility is daunting, but nowhere near as exhilarating as working with Josie, the pretty program manager in charge. He's attracted to her, but knows that she only sees him as a work friend. He needs to make himself over if he’s going to have a shot with her. Josie is all too aware of the cute computer geek watching over her. He was tempting before, but with his newfound muscles and sexy haircut, he’s suddenly irresistible . She makes the first move and is stunned to learn that her hot IT guy is just as studious in the sack. Their affair turns hot and heavy, but Josie broke her rule about a workplace romance once before. It didn't end well. When her ex returns and posts scandalous pictures of her on the Internet, it’s not Spencer’s muscles that she needs. She needs a hacker.