Hacking and hackers
(Book)
Description
Copies
More Copies In Prospector
Subjects
More Details
Notes
Citations
Haerens, M., & Zott, L. M. 1. (2013). Hacking and hackers. Detroit, Greenhaven Press.
Chicago / Turabian - Author Date Citation (style guide)Haerens, Margaret and Lynn M. 1969- Zott. 2013. Hacking and Hackers. Detroit, Greenhaven Press.
Chicago / Turabian - Humanities Citation (style guide)Haerens, Margaret and Lynn M. 1969- Zott, Hacking and Hackers. Detroit, Greenhaven Press, 2013.
MLA Citation (style guide)Haerens, Margaret. and Lynn M. 1969- Zott. Hacking and Hackers. Detroit, Greenhaven Press, 2013.
Staff View
Record Information
Last Sierra Extract Time | Nov 26, 2024 10:31:30 PM |
---|---|
Last File Modification Time | Nov 26, 2024 10:31:56 PM |
Last Grouped Work Modification Time | Nov 26, 2024 10:31:36 PM |
MARC Record
LEADER | 04001cam a22005538i 4500 | ||
---|---|---|---|
001 | 828768580 | ||
003 | OCoLC | ||
005 | 20131209143715.0 | ||
008 | 130319s2013 miu b 001 0 eng | ||
010 | |a 2013009181 | ||
020 | |a 9780737766561 |q (hardcover) | ||
020 | |a 0737766565 |q (hardcover) | ||
020 | |a 9780737766578 |q (paperback) | ||
020 | |a 0737766573 |q (paperback) | ||
035 | |a (OCoLC)828768580 | ||
040 | |a DLC |b eng |e rda |c DLC |d YDXCP |d BTCTA |d BDX |d OCLCO |d OCLCQ |d OLT |d HDX | ||
042 | |a pcc | ||
049 | |a HDXA | ||
050 | 0 | 0 | |a HV6773 |b .H33 2013 |
082 | 0 | 0 | |a 364.16/8 |2 23 |
245 | 0 | 0 | |a Hacking and hackers / |c Margaret Haerens and Lynn M. Zott, book editors. |
263 | |a 1309 | ||
264 | 1 | |a Detroit : |b Greenhaven Press, |c [2013] | |
300 | |a 211 pages ; |c 24 cm. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a unmediated |b n |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
490 | 1 | |a Opposing viewpoints | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |g ch. 1: |t What is the most effective way to combat hacking? -- |t A clear and unified approach is needed to ensure cybersecurity / |r Mike McConnell -- |t Hackers are not a threat to cybersecurity / |r James Andrew Lewis -- |t US outgunned in hacker war / |r Devlin Barrett -- |t A multifaceted strategy is best to ensure cybersecurity / |r Michael P. Merritt -- |t Private sector isn't waiting for Feds to deal with internet security / |r John Hayward -- |t Ethical hacking improves cybersecurity / |r Sue Marquette Poremba -- |t Exploding the myth of the "ethical hacker" / |r Conrad Constantine ; Dominique Karg -- |
505 | 0 | 0 | |g ch. 2: |t Is hacktivism a serious threat? -- |t Hacktivism is an effective and ethical means of social protest / |r Graham Armstrong -- |t Hacktivist collectives are terrorists / |r Phil Elmore -- |t Hacktivists fight for civil liberties and free expression / |r James Ball -- |t Old-time hacktivists: Anonymous, you've crossed the line / |r Elinor Mills -- |
505 | 0 | 0 | |g ch. 3: |t What is the significance of WikiLeaks? -- |t WikiLeaks provides transparency and can deter corporate and government misbehavior / |r Jesse Walker -- |t WikiLeaks scandal reveals the limitations of the public's desire for transparency / |r Alasdair Roberts -- |t WikiLeaks is an unprecedented threat to US national security / |t Marc A. Thiessen -- |t A defense of WikiLeaks / |r John B. Judis -- |t WikiLeaks scandal reveals the US government lacks the will to deal with cyberthreats / |r Cliff May -- |
505 | 0 | 0 | |g ch. 4: |t What is the role of government in hacking? -- |t Cyberattacks require a military response / |r US Department of Defense -- |t A military response to cyberattacks is unwarranted and inappropriate / |r Benjamin H. Friedman ; Christopher Preble -- |t United States needs to develop a smart and effective counterinsurgency strategy for cyberspace / |r Paul Rosenzweig -- |t More government regulation would impede innovation and cybersecurity / |r Tom Ridge -- |t United States should engage in cyberwarfare treaty talks / |r Alice Slater |
650 | 0 | |a Computer crimes. |0 https://id.loc.gov/authorities/subjects/sh85029492 | |
650 | 0 | |a Hackers. |0 https://id.loc.gov/authorities/subjects/sh94005931 | |
650 | 0 | |a Hacktivism. |0 https://id.loc.gov/authorities/subjects/sh2010014455 | |
700 | 1 | |a Haerens, Margaret. |0 https://id.loc.gov/authorities/names/n2005069445 | |
700 | 1 | |a Zott, Lynn M. |q (Lynn Marie), |d 1969- |0 https://id.loc.gov/authorities/names/n2002047639 | |
830 | 0 | |a Opposing viewpoints series (Unnumbered) |0 https://id.loc.gov/authorities/names/n83729248 | |
907 | |a .b41153716 | ||
948 | |a MARCIVE Comp, in 2022.12 | ||
948 | |a MARCIVE August, 2017 | ||
948 | |a MARCIVE extract Aug 5, 2017 | ||
989 | |1 .i8134868x |b 1030003359342 |d cms |g - |m |h 1 |x 0 |t 0 |i 0 |j 18 |k 131211 |n 12-30-2014 18:17 |o - |a HV 6773 .H33 2013 | ||
994 | |a 02 |b HDX | ||
995 | |a Loaded with m2btab.ltiac in 2022.12 | ||
995 | |a Loaded with m2btab.ltiac in 2017.08 | ||
995 | |a Initial Bemis load m2btab.test019 in 2019.02 | ||
998 | |e - |f eng |a cm |a cms |