All Summit County Libraries will be closed Thursday and Friday, November 28th and 29th for Thanksgiving. South Branch and North Branch will also be closed Saturday, November 29th, but the Main Library in Frisco will be open 9am-5pm.

Hacking and hackers
(Book)

Book Cover
Your Rating: 0 stars
Star rating for

Published:
Detroit : Greenhaven Press, [2013].
Format:
Book
Physical Desc:
211 pages ; 24 cm.
Status:

Description

Description not provided

Also in This Series

Copies

Location
Call Number
Status
Last Check-In
CMC Steamboat Campus
HV 6773 .H33 2013
On Shelf
Dec 30, 2014

More Like This

More Copies In Prospector

Loading Prospector Copies...

More Details

Street Date:
1309
Language:
English
ISBN:
9780737766561, 0737766565, 9780737766578, 0737766573

Notes

Bibliography
Includes bibliographical references and index.

Tagging

Tags:

No Tags, Be the first to tag this record!


Citations

APA Citation (style guide)

Haerens, M., & Zott, L. M. 1. (2013). Hacking and hackers. Detroit, Greenhaven Press.

Chicago / Turabian - Author Date Citation (style guide)

Haerens, Margaret and Lynn M. 1969- Zott. 2013. Hacking and Hackers. Detroit, Greenhaven Press.

Chicago / Turabian - Humanities Citation (style guide)

Haerens, Margaret and Lynn M. 1969- Zott, Hacking and Hackers. Detroit, Greenhaven Press, 2013.

MLA Citation (style guide)

Haerens, Margaret. and Lynn M. 1969- Zott. Hacking and Hackers. Detroit, Greenhaven Press, 2013.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.

Staff View

Grouped Work ID:
2182e7c3-af04-8cc8-2338-8e07a80875d8
Go To Grouped Work

QR Code

Record Information

Last Sierra Extract TimeOct 15, 2024 04:09:50 AM
Last File Modification TimeOct 15, 2024 04:10:16 AM
Last Grouped Work Modification TimeOct 15, 2024 04:09:57 AM

MARC Record

LEADER04001cam a22005538i 4500
001828768580
003OCoLC
00520131209143715.0
008130319s2013    miu      b    001 0 eng  
010 |a 2013009181
020 |a 9780737766561 |q (hardcover)
020 |a 0737766565 |q (hardcover)
020 |a 9780737766578 |q (paperback)
020 |a 0737766573 |q (paperback)
035 |a (OCoLC)828768580
040 |a DLC |b eng |e rda |c DLC |d YDXCP |d BTCTA |d BDX |d OCLCO |d OCLCQ |d OLT |d HDX
042 |a pcc
049 |a HDXA
05000 |a HV6773 |b .H33 2013
08200 |a 364.16/8 |2 23
24500 |a Hacking and hackers / |c Margaret Haerens and Lynn M. Zott, book editors.
263 |a 1309
2641 |a Detroit : |b Greenhaven Press, |c [2013]
300 |a 211 pages ; |c 24 cm.
336 |a text |b txt |2 rdacontent
337 |a unmediated |b n |2 rdamedia
338 |a volume |b nc |2 rdacarrier
4901 |a Opposing viewpoints
504 |a Includes bibliographical references and index.
50500 |g ch. 1: |t What is the most effective way to combat hacking? -- |t A clear and unified approach is needed to ensure cybersecurity / |r Mike McConnell -- |t Hackers are not a threat to cybersecurity / |r James Andrew Lewis -- |t US outgunned in hacker war / |r Devlin Barrett -- |t A multifaceted strategy is best to ensure cybersecurity / |r Michael P. Merritt -- |t Private sector isn't waiting for Feds to deal with internet security / |r John Hayward -- |t Ethical hacking improves cybersecurity / |r Sue Marquette Poremba -- |t Exploding the myth of the "ethical hacker" / |r Conrad Constantine ; Dominique Karg --
50500 |g ch. 2: |t Is hacktivism a serious threat? -- |t Hacktivism is an effective and ethical means of social protest / |r Graham Armstrong -- |t Hacktivist collectives are terrorists / |r Phil Elmore -- |t Hacktivists fight for civil liberties and free expression / |r James Ball -- |t Old-time hacktivists: Anonymous, you've crossed the line / |r Elinor Mills --
50500 |g ch. 3: |t What is the significance of WikiLeaks? -- |t WikiLeaks provides transparency and can deter corporate and government misbehavior / |r Jesse Walker -- |t WikiLeaks scandal reveals the limitations of the public's desire for transparency / |r Alasdair Roberts -- |t WikiLeaks is an unprecedented threat to US national security / |t Marc A. Thiessen -- |t A defense of WikiLeaks / |r John B. Judis -- |t WikiLeaks scandal reveals the US government lacks the will to deal with cyberthreats / |r Cliff May --
50500 |g ch. 4: |t What is the role of government in hacking? -- |t Cyberattacks require a military response / |r US Department of Defense -- |t A military response to cyberattacks is unwarranted and inappropriate / |r Benjamin H. Friedman ; Christopher Preble -- |t United States needs to develop a smart and effective counterinsurgency strategy for cyberspace / |r Paul Rosenzweig -- |t More government regulation would impede innovation and cybersecurity / |r Tom Ridge -- |t United States should engage in cyberwarfare treaty talks / |r Alice Slater
6500 |a Computer crimes. |0 https://id.loc.gov/authorities/subjects/sh85029492
6500 |a Hackers. |0 https://id.loc.gov/authorities/subjects/sh94005931
6500 |a Hacktivism. |0 https://id.loc.gov/authorities/subjects/sh2010014455
7001 |a Haerens, Margaret. |0 https://id.loc.gov/authorities/names/n2005069445
7001 |a Zott, Lynn M. |q (Lynn Marie), |d 1969- |0 https://id.loc.gov/authorities/names/n2002047639
8300 |a Opposing viewpoints series (Unnumbered) |0 https://id.loc.gov/authorities/names/n83729248
907 |a .b41153716
948 |a MARCIVE Comp, in 2022.12
948 |a MARCIVE August, 2017
948 |a MARCIVE extract Aug 5, 2017
989 |1 .i8134868x |b 1030003359342 |d cms |g - |m  |h 1 |x 0 |t 0 |i 0 |j 18 |k 131211 |n 12-30-2014 18:17 |o - |a HV 6773 .H33 2013
994 |a 02 |b HDX
995 |a Loaded with m2btab.ltiac in 2022.12
995 |a Loaded with m2btab.ltiac in 2017.08
995 |a Initial Bemis load m2btab.test019 in 2019.02
998 |e - |f eng |a cm |a cms