Hacking and hackers
(Book)
Contributors:
NoveList Series:
Published:
Detroit : Greenhaven Press, [2013].
Format:
Book
Physical Desc:
211 pages ; 24 cm.
Status:
Description
Description not provided
Copies
Location
Call Number
Status
Last Check-In
CMC Steamboat Campus
HV 6773 .H33 2013
On Shelf
Dec 30, 2014
More Copies In Prospector
Loading Prospector Copies...
Subjects
LC Subjects
More Details
Street Date:
1309
Language:
English
ISBN:
9780737766561, 0737766565, 9780737766578, 0737766573
Notes
Bibliography
Includes bibliographical references and index.
Citations
APA Citation (style guide)
Haerens, M., & Zott, L. M. 1. (2013). Hacking and hackers. Detroit, Greenhaven Press.
Chicago / Turabian - Author Date Citation (style guide)Haerens, Margaret and Lynn M. 1969- Zott. 2013. Hacking and Hackers. Detroit, Greenhaven Press.
Chicago / Turabian - Humanities Citation (style guide)Haerens, Margaret and Lynn M. 1969- Zott, Hacking and Hackers. Detroit, Greenhaven Press, 2013.
MLA Citation (style guide)Haerens, Margaret. and Lynn M. 1969- Zott. Hacking and Hackers. Detroit, Greenhaven Press, 2013.
Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
Staff View
Grouped Work ID:
2182e7c3-af04-8cc8-2338-8e07a80875d8
QR Code
Record Information
Last Sierra Extract Time | Oct 15, 2024 04:09:50 AM |
---|---|
Last File Modification Time | Oct 15, 2024 04:10:16 AM |
Last Grouped Work Modification Time | Oct 15, 2024 04:09:57 AM |
MARC Record
LEADER | 04001cam a22005538i 4500 | ||
---|---|---|---|
001 | 828768580 | ||
003 | OCoLC | ||
005 | 20131209143715.0 | ||
008 | 130319s2013 miu b 001 0 eng | ||
010 | |a 2013009181 | ||
020 | |a 9780737766561 |q (hardcover) | ||
020 | |a 0737766565 |q (hardcover) | ||
020 | |a 9780737766578 |q (paperback) | ||
020 | |a 0737766573 |q (paperback) | ||
035 | |a (OCoLC)828768580 | ||
040 | |a DLC |b eng |e rda |c DLC |d YDXCP |d BTCTA |d BDX |d OCLCO |d OCLCQ |d OLT |d HDX | ||
042 | |a pcc | ||
049 | |a HDXA | ||
050 | 0 | 0 | |a HV6773 |b .H33 2013 |
082 | 0 | 0 | |a 364.16/8 |2 23 |
245 | 0 | 0 | |a Hacking and hackers / |c Margaret Haerens and Lynn M. Zott, book editors. |
263 | |a 1309 | ||
264 | 1 | |a Detroit : |b Greenhaven Press, |c [2013] | |
300 | |a 211 pages ; |c 24 cm. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a unmediated |b n |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
490 | 1 | |a Opposing viewpoints | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |g ch. 1: |t What is the most effective way to combat hacking? -- |t A clear and unified approach is needed to ensure cybersecurity / |r Mike McConnell -- |t Hackers are not a threat to cybersecurity / |r James Andrew Lewis -- |t US outgunned in hacker war / |r Devlin Barrett -- |t A multifaceted strategy is best to ensure cybersecurity / |r Michael P. Merritt -- |t Private sector isn't waiting for Feds to deal with internet security / |r John Hayward -- |t Ethical hacking improves cybersecurity / |r Sue Marquette Poremba -- |t Exploding the myth of the "ethical hacker" / |r Conrad Constantine ; Dominique Karg -- |
505 | 0 | 0 | |g ch. 2: |t Is hacktivism a serious threat? -- |t Hacktivism is an effective and ethical means of social protest / |r Graham Armstrong -- |t Hacktivist collectives are terrorists / |r Phil Elmore -- |t Hacktivists fight for civil liberties and free expression / |r James Ball -- |t Old-time hacktivists: Anonymous, you've crossed the line / |r Elinor Mills -- |
505 | 0 | 0 | |g ch. 3: |t What is the significance of WikiLeaks? -- |t WikiLeaks provides transparency and can deter corporate and government misbehavior / |r Jesse Walker -- |t WikiLeaks scandal reveals the limitations of the public's desire for transparency / |r Alasdair Roberts -- |t WikiLeaks is an unprecedented threat to US national security / |t Marc A. Thiessen -- |t A defense of WikiLeaks / |r John B. Judis -- |t WikiLeaks scandal reveals the US government lacks the will to deal with cyberthreats / |r Cliff May -- |
505 | 0 | 0 | |g ch. 4: |t What is the role of government in hacking? -- |t Cyberattacks require a military response / |r US Department of Defense -- |t A military response to cyberattacks is unwarranted and inappropriate / |r Benjamin H. Friedman ; Christopher Preble -- |t United States needs to develop a smart and effective counterinsurgency strategy for cyberspace / |r Paul Rosenzweig -- |t More government regulation would impede innovation and cybersecurity / |r Tom Ridge -- |t United States should engage in cyberwarfare treaty talks / |r Alice Slater |
650 | 0 | |a Computer crimes. |0 https://id.loc.gov/authorities/subjects/sh85029492 | |
650 | 0 | |a Hackers. |0 https://id.loc.gov/authorities/subjects/sh94005931 | |
650 | 0 | |a Hacktivism. |0 https://id.loc.gov/authorities/subjects/sh2010014455 | |
700 | 1 | |a Haerens, Margaret. |0 https://id.loc.gov/authorities/names/n2005069445 | |
700 | 1 | |a Zott, Lynn M. |q (Lynn Marie), |d 1969- |0 https://id.loc.gov/authorities/names/n2002047639 | |
830 | 0 | |a Opposing viewpoints series (Unnumbered) |0 https://id.loc.gov/authorities/names/n83729248 | |
907 | |a .b41153716 | ||
948 | |a MARCIVE Comp, in 2022.12 | ||
948 | |a MARCIVE August, 2017 | ||
948 | |a MARCIVE extract Aug 5, 2017 | ||
989 | |1 .i8134868x |b 1030003359342 |d cms |g - |m |h 1 |x 0 |t 0 |i 0 |j 18 |k 131211 |n 12-30-2014 18:17 |o - |a HV 6773 .H33 2013 | ||
994 | |a 02 |b HDX | ||
995 | |a Loaded with m2btab.ltiac in 2022.12 | ||
995 | |a Loaded with m2btab.ltiac in 2017.08 | ||
995 | |a Initial Bemis load m2btab.test019 in 2019.02 | ||
998 | |e - |f eng |a cm |a cms |