Unavailable
Unavailable
Unavailable
Audiobook11 hours
Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking
Written by Kim Crawley
Narrated by Faith Connor
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this audiobook
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.
This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z.
If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminals.
This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z.
If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminals.
Unavailable
More audiobooks from Kim Crawley
The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5
Related to Hacker Culture A to Z
Related audiobooks
Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Conspiracy Theories & Secret Societies For Dummies Rating: 4 out of 5 stars4/5The Art of Cyber Security: A practical guide to winning the war on cyber crime Rating: 0 out of 5 stars0 ratingsCybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Cosmic Codes: Hidden Messages from the Edge of Eternity Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5Come and Take It: The Gun Printer's Guide to Thinking Free Rating: 5 out of 5 stars5/5Forensics For Dummies: 2nd Edition Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Greatest Hackers in the History Rating: 4 out of 5 stars4/5Crypto: The Insights You Need from Harvard Business Review (HBR Insights Series) Rating: 0 out of 5 stars0 ratingsThe Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Women Code Breakers: The Best Kept Secret of WWII: True Stories of Female Code Breakers Whose Top-Secret Work Helped Win WWII Rating: 0 out of 5 stars0 ratingsFacing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World Rating: 0 out of 5 stars0 ratingsIntellectual Property: A Very Short Introduction (Very Short Introductions) 2nd ed. Edition Rating: 0 out of 5 stars0 ratingsCryptography: A Very Short Introduction Rating: 5 out of 5 stars5/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5What the Fact?: Finding the Truth in All the Noise Rating: 4 out of 5 stars4/5SUMMARY - Hackers Painters: Big Ideas From The Computer Age By Paul Graham Rating: 0 out of 5 stars0 ratingsArtificial Intelligence: From Medieval Robots to Neural Networks Rating: 4 out of 5 stars4/5The Infinite Machine: How an Army of Crypto-hackers Is Building the Next Internet with Ethereum Rating: 4 out of 5 stars4/5HACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5It's Mine: How Crypto Is Redefining Ownership Rating: 0 out of 5 stars0 ratings
Computers For You
Algorithms to Live By: The Computer Science of Human Decisions Rating: 4 out of 5 stars4/5Elon Musk Rating: 5 out of 5 stars5/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5The Death of Expertise: The Campaign Against Established Knowledge and Why it Matters Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Art of Social Media: Power Tips for Power Users Rating: 4 out of 5 stars4/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines Rating: 5 out of 5 stars5/5Bored and Brilliant: How Spacing Out Can Unlock Your Most Productive and Creative Self Rating: 4 out of 5 stars4/5Artificial Intelligence For Dummies Rating: 4 out of 5 stars4/5Alone Together: Why We Expect More from Technology and Less from Each Other Rating: 4 out of 5 stars4/5Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence Rating: 5 out of 5 stars5/5Computational Thinking Rating: 4 out of 5 stars4/5Once Upon an Algorithm: How Stories Explain Computing Rating: 4 out of 5 stars4/5AI: Rise of the Lightspeed Learners Rating: 4 out of 5 stars4/5The Emperor's New Mind: Concerning Computers, Minds, and the Laws of Physics Rating: 4 out of 5 stars4/5Competing in the Age of AI: Strategy and Leadership When Algorithms and Networks Run the World Rating: 5 out of 5 stars5/5T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power Rating: 4 out of 5 stars4/5Quantum Computing: The Transformative Technology of the Qubit Revolution Rating: 5 out of 5 stars5/5
Reviews for Hacker Culture A to Z
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews