Hacker (computer security) (794228), страница 3
Текст из файла (страница 3)
Main category: Hacker magazines
The most notable hacker-oriented magazine publications are Phrack, Hakin9 and 2600: The Hacker Quarterly. While the information contained in hacker magazines and ezines was often outdated, they improved the reputations of those who contributed by documenting their successes.[21]
Hackers in fiction
See also: List of fictional hackers
Hackers often show an interest in fictional cyberpunk and cyberculture literature and movies. Absorption of fictional pseudonyms, symbols, values, and metaphors from these fictional works is very common.[citation needed]
Books portraying hackers:
-
The cyberpunk novels of William Gibson — especially the Sprawl trilogy — are very popular with hackers.[24]
-
Hackers (short stories)
-
Helba from the .hack manga and anime series.
-
Little Brother by Cory Doctorow
-
Merlin, the protagonist of the second series in The Chronicles of Amber by Roger Zelazny is a young immortal hacker-mage prince who has the ability to traverse shadow dimensions.
-
Lisbeth Salander in The Girl with the Dragon Tattoo by Stieg Larsson
-
Snow Crash
-
Alice from Kami-sama no Memo-chō
Films also portray hackers:
|
|
|
Non-fiction books
-
Hacking: The Art of Exploitation, Second Edition by Jon Erickson
-
The Hacker Crackdown
-
The Art of Intrusion by Kevin D. Mitnick
-
The Art of Deception by Kevin D. Mitnick
-
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin D. Mitnick
-
The Hacker's Handbook
-
The Cuckoo's Egg by Clifford Stoll
-
Underground by Suelette Dreyfus
-
Stealing the Network: How to Own the Box, How to Own an Identity, and How to Own an Continent by various authors
Fiction books
-
Ender's Game
-
Evil Genius (novel)
-
Neuromancer
-
Snow Crash
See also
|
|
References
-
Taylor, Paul A. (1999). Hackers. Routledge. ISBN 978-0-415-18072-6.
-
^ a b Sterling, Bruce (1993). "Part 2(d)". The Hacker Crackdown. McLean, Virginia: IndyPublish.com. p. 61. ISBN 1-4043-0641-2.
-
^ Blomquist, Brian (May 29, 1999). "FBI's Web Site Socked as Hackers Target Feds". New York Post.
-
^ rfc 1983
-
^ S. Raymond, Eric. "Jargon File: Cracker". Retrieved 2010-05-08. "Coined ca. 1985 by hackers in defense against journalistic misuse of hacker"
-
^ http://stallman.org/archives/2012-sep-dec.html#06_December_2012_%28Ecuadorian_white_hat_cracker_freed%29
-
^ Clifford, Ralph D. (2006). Cybercrime:The Investigation, Prosecution and Defense of a Computer-Related Crime Second Edition. Durham, North Carolina: Carolina Academic Press.
-
^ a b Wilhelm, Douglas (2010). "2". Professional Penetration Testing. Syngress Press. p. 503. ISBN 978-1-59749-425-0.
-
^ EC-Council
-
^ Moore, Robert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.Robert Moore
-
^ a b c Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9.
-
^ Thomas, Douglas (2002). Hacker Culture. University of Minnesota Press. ISBN 978-0-8166-3346-3.
-
^ Andress, Mandy; Cox, Phil; Tittel, Ed. CIW Security Professional. New York, NY: Hungry Minds, Inc.. p. 638. ISBN 0-7645-4822-0.
-
^ "Blue hat hacker Definition". PC Magazine Encyclopedia. Retrieved 31 May 2010. "A security professional invited by Microsoft to find vulnerabilities in Windows."
-
^ Fried, Ina (June 15, 2005). "Blue Hat summit meant to reveal ways of the other side". Microsoft meets the hackers. CNET News. Retrieved 31 May 2010.
-
^ Markoff, John (October 17, 2005). "At Microsoft, Interlopers Sound Off on Security". New York Times. Retrieved 31 May 2010.
-
^ a b c Eric Chabrow (February 25, 2012). "7 Levels of Hackers: Applying An Ancient Chinese Lesson: Know Your Enemies". GovInfo Security. Retrieved February 27, 2012.
-
^ Hacking approach
-
^ Writer, Staff (6 September 2012). [Gary McKinnon extradition ruling due by 16 October "Profile: Gary McKinnon"]. BBC News. Retrieved 2012-09-25.
-
^ "Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution ..." (Press release). United States Attorney's Office, Central District of California. 9 August 1999. Retrieved 10 April 2010.
-
^ Tim Jordan, Paul A. Taylor (2004). Hacktivism and Cyberwars. Routledge. pp. 133–134. ISBN 978-0-415-26003-9. "Wild West imagery has permeated discussions of cybercultures."
-
^ a b Thomas, Douglas (2003). Hacker Culture. University of Minnesota Press. p. 90. ISBN 978-0-8166-3346-3.
-
^ € 19,500
-
^ http://wetten.overheid.nl/BWBR0001854/TweedeBoek/TitelV/Artikel138ab/geldigheidsdatum_27-12-2012
-
^ Staples, Brent (May 11, 2003). "A Prince of Cyberpunk Fiction Moves Into the Mainstream". The New York Times. Retrieved 2008-08-30. "Mr. Gibson's novels and short stories are worshiped by hackers"[dead link]
Related literature
-
Kevin Beaver (2010-01-12). Hacking For Dummies. ISBN 978-0-7645-5784-2.
-
Richard Conway, Julian Cordingley. Code Hacking: A Developer's Guide to Network Security. ISBN 978-1-58450-314-9.
-
“Dot.Con: The Dangers of Cyber Crime and a Call for Proactive Solutions,” by Johanna Granville, Australian Journal of Politics and History, vol. 49, no. 1. (Winter 2003), pp. 102–109.
-
Katie Hafner & John Markoff (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. Simon & Schuster. ISBN 0-671-68322-5.
-
David H. Freeman & Charles C. Mann (1997). @ Large: The Strange Case of the World's Biggest Internet Invasion. Simon & Schuster. ISBN 0-684-82464-7.
-
Suelette Dreyfus (1997). Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier. Mandarin. ISBN 1-86330-595-5.
-
Bill Apro & Graeme Hammond (2005). Hackers: The Hunt for Australia's Most Infamous Computer Cracker. Five Mile Press. ISBN 1-74124-722-5.
-
Stuart McClure, Joel Scambray & George Kurtz (1999). Hacking Exposed. Mcgraw-Hill. ISBN 0-07-212127-0.
-
Michael Gregg (2006). Certfied Ethical Hacker. Pearson. ISBN 978-0-7897-3531-7.
-
Clifford Stoll (1990). The Cuckoo's Egg. The Bodley Head Ltd. ISBN 0-370-31433-6.
-
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness & Michael Lester (2004). Gray Hat Hacking : The Ethical Hacker's Handbook. McGraw-Hill Osborne Media. ISBN 978-0072257090.
External links
| Wikibooks has a book on the topic of: Hacking |
-
CNN Tech PCWorld Staff (November 2001). Timeline: A 40-year history of hacking from 1960 to 2001
-
Discovery Channel Documentary. History of Hacking Documentary video