Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.
Bruce Sterling's classic work highlights the 1990 assault on hackers, when law-enforcement officials successfully arrested scores of suspected illicit hackers and other computer-based law-breakers. These raids became symbolic of the debate between fighting serious computer crime and protecting civil liberties. However, The Hacker Crackdown is about far more than a series of police sting operations. It's a lively tour of three cyberspace subcultures–the hacker underworld, the realm of the cybercops, and the idealistic culture of the cybercivil libertarians.
Sterling begins his story at the birth of cyberspace: the invention of the telephone. We meet the first hackers–teenage boys hired as telephone operators–who used their technical mastery, low threshold for boredom, and love of pranks to wreak havoc across the phone lines. From phone-related hi-jinks, Sterling takes us into the broader world of hacking and introduces many of the culprits–some who are fighting for a cause, some who are in it for kicks, and some who are traditional criminals after a fast buck. Sterling then details the triumphs and frustrations of the people forced to deal with the illicit hackers and tells how they developed their own subculture as cybercops. Sterling raises the ethical and legal issues of online law enforcement by questioning what rights are given to suspects and to those who have private e-mail stored on suspects' computers. Additionally, Sterling shows how the online civil liberties movement rose from seemingly unlikely places, such as the counterculture surrounding the Grateful Dead. The Hacker Crackdown informs you of the issues surrounding computer crime and the people on all sides of those issues.
The Domain Name System (DNS) is arguably one of the most important network infrastructure services. As the enabler of almost every web, email, instant messaging, and e-commerce transaction, it is the central nervous system of the Internet. DNS is also a critical component for new and emerging applications such as Voice over LTE (VoLTE) in cellular networks, Voice over IP (VoIP) Telephony, Radio Frequency IDs (RFID), and Content Distribution Networks (CDN).
Now in IEEE ComSoc's Best Readings, this book gives the reader an in-depth understanding of how DNS works, its security vulnerabilities, how to monitor and detect security related events and how to prevent and mitigate attacks. After reading the book, the reader will be able to recognize and explain the major issues around DNS security, and know the best practices to setup, operate, and protect DNS service.
Continue reading “DNS Security: In-depth Vulnerability Analysis and Mitigation Solutions”
At our company, we research cyber hacking attacks all over the world to see if our server protection product will protect against the techniques used in the attack. In the course of this research, one important conclusion kept leaping out: MOST HACKING ATTEMPTS ARE PREVENTABLE FOR LITTLE COST AND SOME KNOWLEDGE. Cyber security can be very mysterious. The constant news about hacking can be very frightening. Either can leave you wondering if you will be the next victim. This book is for the majority of people who aren't involved in cyber security for a living. It’s for those who do other things. It’s an attempt to make cyber security simple, to acquaint you with the basics, and to provide you with easy things you can do to protect your family and your business from those who would use a computer to do you harm. Though terms will be introduced, no specialized knowledge in systems and network administration or IT security is presumed. You might be a homeowner wanting to protect your family. You might be a small business wanting to know what you can do that is low cost, yet effective. You might be a CEO/CFO/COO/Board Member of a large enterprise wanting to communicate with your IT department more effectively about this most important subject. CIO/CISO's may also find this book helpful in educating corporate members on cyber security.
They have the power to destroy lives, shut down businesses, and affect every one of us all around the world. They always come unannounced and you hear about them every day. Cyberattacks. The plague of today's technology-reliant world.
Many consider cyberattacks pure computer magic; something too complicated to comprehend. But let me assure you, it's definitely not magic. Cyberattacks do, however, require a certain level of intelligence and computer knowledge. That's why the only way to successfully defend yourself against a cyberattack, is to learn and understand its anatomy. In this book, I explain how a cyberattack looks like from a hacker's perspective so that in case he picks you as his next victim, you're not going to be vulnerable and defenceless.