You will need a library password to place items on hold and to access the library's databases off campus. To create a password, click on the Login button, above and to the right of the search box, and then the "Reset My Password" link (Aims email address required).

Quick Guide to Creating Your Library Password        Finding Your Aims ID Number

If you are unable to log in, contact the Learning Commons Technology Assistance and Computer Learning Lab at 970 339-6541. Additionally, you may also stop by any Learning Commons location.

Hacking and hackers
(Book)

Book Cover
Your Rating: 0 stars
Star rating for

Published:
Detroit : Greenhaven Press, [2013].
Format:
Book
ISBN:
9780737766561, 0737766565, 9780737766578, 0737766573
Physical Desc:
211 pages ; 24 cm.
Status:

Description

Description not provided

Also in This Series

Copies

Location
Call Number
Status
Last Check-In
CMC Steamboat Campus
HV 6773 .H33 2013
On Shelf
Dec 30, 2014

More Like This

More Copies In Prospector

Loading Prospector Copies...

More Details

Street Date:
1309
Language:
English

Notes

Bibliography
Includes bibliographical references and index.

Citations

APA Citation (style guide)

Haerens, M., & Zott, L. M. 1. (2013). Hacking and hackers. Detroit, Greenhaven Press.

Chicago / Turabian - Author Date Citation (style guide)

Haerens, Margaret and Lynn M. 1969- Zott. 2013. Hacking and Hackers. Detroit, Greenhaven Press.

Chicago / Turabian - Humanities Citation (style guide)

Haerens, Margaret and Lynn M. 1969- Zott, Hacking and Hackers. Detroit, Greenhaven Press, 2013.

MLA Citation (style guide)

Haerens, Margaret. and Lynn M. 1969- Zott. Hacking and Hackers. Detroit, Greenhaven Press, 2013.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.

Staff View

Grouped Work ID:
2182e7c3-af04-8cc8-2338-8e07a80875d8
Go To Grouped Work

Record Information

Last Sierra Extract TimeOct 15, 2024 04:09:50 AM
Last File Modification TimeOct 15, 2024 04:10:16 AM
Last Grouped Work Modification TimeOct 15, 2024 04:09:57 AM

MARC Record

LEADER04001cam a22005538i 4500
001828768580
003OCoLC
00520131209143715.0
008130319s2013    miu      b    001 0 eng  
010 |a 2013009181
020 |a 9780737766561 |q (hardcover)
020 |a 0737766565 |q (hardcover)
020 |a 9780737766578 |q (paperback)
020 |a 0737766573 |q (paperback)
035 |a (OCoLC)828768580
040 |a DLC |b eng |e rda |c DLC |d YDXCP |d BTCTA |d BDX |d OCLCO |d OCLCQ |d OLT |d HDX
042 |a pcc
049 |a HDXA
05000 |a HV6773 |b .H33 2013
08200 |a 364.16/8 |2 23
24500 |a Hacking and hackers / |c Margaret Haerens and Lynn M. Zott, book editors.
263 |a 1309
2641 |a Detroit : |b Greenhaven Press, |c [2013]
300 |a 211 pages ; |c 24 cm.
336 |a text |b txt |2 rdacontent
337 |a unmediated |b n |2 rdamedia
338 |a volume |b nc |2 rdacarrier
4901 |a Opposing viewpoints
504 |a Includes bibliographical references and index.
50500 |g ch. 1: |t What is the most effective way to combat hacking? -- |t A clear and unified approach is needed to ensure cybersecurity / |r Mike McConnell -- |t Hackers are not a threat to cybersecurity / |r James Andrew Lewis -- |t US outgunned in hacker war / |r Devlin Barrett -- |t A multifaceted strategy is best to ensure cybersecurity / |r Michael P. Merritt -- |t Private sector isn't waiting for Feds to deal with internet security / |r John Hayward -- |t Ethical hacking improves cybersecurity / |r Sue Marquette Poremba -- |t Exploding the myth of the "ethical hacker" / |r Conrad Constantine ; Dominique Karg --
50500 |g ch. 2: |t Is hacktivism a serious threat? -- |t Hacktivism is an effective and ethical means of social protest / |r Graham Armstrong -- |t Hacktivist collectives are terrorists / |r Phil Elmore -- |t Hacktivists fight for civil liberties and free expression / |r James Ball -- |t Old-time hacktivists: Anonymous, you've crossed the line / |r Elinor Mills --
50500 |g ch. 3: |t What is the significance of WikiLeaks? -- |t WikiLeaks provides transparency and can deter corporate and government misbehavior / |r Jesse Walker -- |t WikiLeaks scandal reveals the limitations of the public's desire for transparency / |r Alasdair Roberts -- |t WikiLeaks is an unprecedented threat to US national security / |t Marc A. Thiessen -- |t A defense of WikiLeaks / |r John B. Judis -- |t WikiLeaks scandal reveals the US government lacks the will to deal with cyberthreats / |r Cliff May --
50500 |g ch. 4: |t What is the role of government in hacking? -- |t Cyberattacks require a military response / |r US Department of Defense -- |t A military response to cyberattacks is unwarranted and inappropriate / |r Benjamin H. Friedman ; Christopher Preble -- |t United States needs to develop a smart and effective counterinsurgency strategy for cyberspace / |r Paul Rosenzweig -- |t More government regulation would impede innovation and cybersecurity / |r Tom Ridge -- |t United States should engage in cyberwarfare treaty talks / |r Alice Slater
6500 |a Computer crimes. |0 https://id.loc.gov/authorities/subjects/sh85029492
6500 |a Hackers. |0 https://id.loc.gov/authorities/subjects/sh94005931
6500 |a Hacktivism. |0 https://id.loc.gov/authorities/subjects/sh2010014455
7001 |a Haerens, Margaret. |0 https://id.loc.gov/authorities/names/n2005069445
7001 |a Zott, Lynn M. |q (Lynn Marie), |d 1969- |0 https://id.loc.gov/authorities/names/n2002047639
8300 |a Opposing viewpoints series (Unnumbered) |0 https://id.loc.gov/authorities/names/n83729248
907 |a .b41153716
948 |a MARCIVE Comp, in 2022.12
948 |a MARCIVE August, 2017
948 |a MARCIVE extract Aug 5, 2017
989 |1 .i8134868x |b 1030003359342 |d cms |g - |m  |h 1 |x 0 |t 0 |i 0 |j 18 |k 131211 |n 12-30-2014 18:17 |o - |a HV 6773 .H33 2013
994 |a 02 |b HDX
995 |a Loaded with m2btab.ltiac in 2022.12
995 |a Loaded with m2btab.ltiac in 2017.08
995 |a Initial Bemis load m2btab.test019 in 2019.02
998 |e - |f eng |a cm |a cms