Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking 1st Edition by Kim Crawley – Ebook PDF Instant Download/Delivery: 9781098145675 ,1098145674
Full download Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking 1st Edition after payment

Product details:
ISBN 10: 1098145674
ISBN 13: 9781098145675
Author: Kim Crawley
Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking 1st Edition Table of contents:
1. A
Abacus
Abandonware
Activision
Adleman, Leonard
Advanced persistent threat (APT)
Agile methodology
Airgapping
Akihabara, Tokyo
Alderson, Elliot
Alphabet Inc.
Amazon Web Services (AWS)
AMD (Advanced Micro Devices)
Amiga
Android operating system
Anonymous
Apache/Apache License
Apple
ARM (Advanced RISC Machines)
ARPAnet
Artificial intelligence (AI)
Assange, Julian
Assembly
Atari
Atlus
Augmented and virtual reality
Autistic
AWS
Azure
2. B
Babbage, Charles
Baer, Ralph
bash
BASIC
BBS
Bell Labs
Berkeley, University of California
Berners-Lee, Tim
Binary
BitTorrent
Blockchain
Botnet
Bug
Bulletin board systems (BBSes)
Byte magazine
3. C
Calce, Michael “MafiaBoy”
Cama, Amat
Captain Crunch (John Draper)
Capture the Flag
Carnegie Mellon University
Carr, Iris
The Cathedral and the Bazaar (1999 book)
Certificates (cryptography)
Certificates (professional credentials)
ChatGPT
CIA (Central Intelligence Agency)
CIA triad (confidentiality, integrity, availability)
CISSP
C languages
Cleartext
Closed source software
Cloud
Comic-Con
Commodore
Common Vulnerabilities and Exposures (CVE)
Consumer Electronics Show (CES)
Copyleft
CPU (Central processing unit)
Cray, Seymour
Creative Commons licenses
Crunch time
Cryptocurrency
Cryptography
Cult of the Dead Cow (cDc)
Cyberpunk
Cybersecurity
4. D
Dark.Fail
Dark Web/darknet
DARPA (Defense Advanced Research Projects Agency)
Data
Da Vinci, Leonardo
Debian
DEC (Digital Equipment Corporation)
Deep Web
DEF CON
Demoscene
Denial-of-service (DoS, DDoS) attacks
Developers
DevOps
Diffie, Whitfield
Diffie-Hellman key exchange
Disk, disc
DOOM (video game)
DOS (Disk Operating System)
Draper, John
Dread forums
DRM (Digital Rights Management)
Dungeons & Dragons (game franchise)
5. E
Electronic Arts
Electronic Entertainment Expo (E3)
Electronic Frontier Foundation (EFF)
Electronics
Emacs
ENIAC (Electronic Numerical Integrator and Computer)
Enigma
“Ethical” hacking
Exploit
6. F
Fairchild Semiconductor
Floppy disk
Form factor
Freenet
Free Software Foundation (FSF)
Freeware
FUD
7. G
Game Developers Conference (GDC)
Gates, Bill
Gibson, William
Git/GitHub
GNOME
GNU (software collection)
Go
Goldstein, Emmanuel
Google Cloud Platform (GCP)
Governance
Graphical user interface (GUI)
8. H
Hacker
Hackers (1995 film)
Hackers: Heroes of the Computer Revolution (2010 book)
Hackers on Planet Earth (HOPE)
Hacking Is Not a Crime
Hack the Box
Hacktivism
Hak5
Ham radio
Hardware
Hellman, Martin
Hello World
Hewlett-Packard (HP)
Hexadecimal numbering
Hidden Figures (2017 film)
Homebrew Computer Club
Hopper, Grace
HTML (HyperText Markup Language)
9. I
IBM
Indian Institute of Engineering Science and Technology (IIEST); Indian Institutes of Technology (IIT)
Industrial control systems
Integrated development environment (IDE)
Intel
Intellectual property
Internet
Invisible Internet Project (I2P)
IRC (Internet Relay Chat)
10. J
Jack, Barnaby
Jackson, Mary
Java
JavaScript
Jobs, Steve
Johnson, Katherine Coleman
Joy, Bill
11. K
Kali Linux
Key
Keyboard
12. L
Lamarr, Hedy
Larsson, Stieg
Lawson, Jerry
Levy, Steven
Linux
Lovelace, Ada
LulzSec
13. M
Macintosh
macOS
Malware
Manning, Chelsea
Massachusetts Institute of Technology (MIT)
Meta
Metasploit Framework
Microcomputers
Microsoft
Minicomputers
Mitnick, Kevin
Miyamoto, Shigeru
MMO (Massively Multiplayer Online) games
Moore’s law
Morse code
Mr. Robot (TV show)
MS-DOS (Microsoft Disk Operating System)
Multics
14. N
Napster
National Air and Space Administration (NASA)
National Security Agency (NSA)
Networking
NeXT Computer
Nihon Falcom
Nintendo
Nonfungible tokens (NFTs)
NVIDIA
15. O
OpenAI
Open source
Open Worldwide Application Security Project (OWASP)
Operating systems
Operational security
16. P
Packet switching
Page, Larry
PEBKAC
Peer-to-peer (P2P) networks
Penetration testing
PGP
Personal computers
Phishing
Phreaking
Ping
Piracy
Pirate Bay/Pirate Party
Pirates of Silicon Valley (1999 film)
Pizza
Pretty Good Privacy (PGP)
Programming
Proprietary software
Proxy networks
Python
17. Q
Quantum computing
18. R
Radio
RadioShack
Ramachandran, Vivek
Ransomware
Raspberry Pi
README files
Red Hat
Ritchie, Dennis
Rivest, Ron
Rivest-Shamir-Adleman (RSA) cryptography
Robotics
Roleplaying games (RPGs)
19. S
Sakura, Futaba
Salander, Lisbeth
SCADA (Supervisory control and data acquisition)
Schneier, Bruce
Script kiddie
Search engines
Sega
Semiconductors
Shamir, Adi
Shareware/freeware/abandonware
Signal (messaging app)
Silicon Valley
Silk Road
Smartphone
Snowden, Edward
Social media
Spyware
Stallman, Richard
Stanford University
Startups
Steam
Stuxnet
Sun Microsystems
Supercomputers
Swartz, Aaron
Syntax
20. T
TCP/IP (Transmission Control Protocol/Internet Protocol)
Tech Model Railroad Club
Telephones
Texas Instruments
Thompson, Ken
Threat actor
Timesharing
Tokyo Denki University
Tor (The Onion Router)
Torvalds, Linus
Tramiel, Jack
Transistor
Tribe of Hackers
Turing, Alan
2600 (Twenty-Six Hundred): The Hacker Quarterly (magazine)
21. U
UNIX
Unreal Engine
Usenet
22. V
Valve
Vaughan, Dorothy
Version control
vi
Video games
Virtual reality (VR)
Virus
VisiCalc
23. W
Wardialing
Wardriving
WarGames (1983 film)
Watch_Dogs (video game series)
Waterloo, University of
Whiteboard interviews
Whitehat hackers
WiFi
WikiLeaks
Wikipedia
Windows
WIRED magazine
World War II
World Wide Web
World Wide Web Consortium (W3C)
Worm
Wozniak, Steve
WYSIWYG
24. X
Xbox
Xerox
Xfce
Xiao Tian
25. Y
Yahoo!
Y Combinator
26. Z
Zero day
Zettabyte Era
Zork
Zuckerberg, Mark
About the Author
People also search for Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking 1st Edition:
hacker tools and techniques
hacker groups near me
hacker culture definition
hacker culture reddit
hacker subculture norms
Tags: Kim Crawley, Hacker Culture, Cybersecurity, Hacking


