Passwords are now required to access your library account. To create a password, select "Reset my Password" from the Login screen (email address required).

For further assistance, please contact the library.

Hacking and hackers
(Book)

Book Cover
Published:
Detroit : Greenhaven Press, [2013].
Format:
Book
Physical Desc:
211 pages ; 24 cm.
Status:
CMC Steamboat Campus
HV 6773 .H33 2013
Description
Description not provided
Also in This Series
Copies
Location
Call Number
Status
Last Check-In
CMC Steamboat Campus
HV 6773 .H33 2013
On Shelf
Dec 30, 2014
Citations
APA Citation (style guide)

Haerens, M., & Zott, L. M. 1. (2013). Hacking and hackers. Detroit, Greenhaven Press.

Chicago / Turabian - Author Date Citation (style guide)

Haerens, Margaret and Lynn M. 1969- Zott. 2013. Hacking and Hackers. Detroit, Greenhaven Press.

Chicago / Turabian - Humanities Citation (style guide)

Haerens, Margaret and Lynn M. 1969- Zott, Hacking and Hackers. Detroit, Greenhaven Press, 2013.

MLA Citation (style guide)

Haerens, Margaret. and Lynn M. 1969- Zott. Hacking and Hackers. Detroit, Greenhaven Press, 2013.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
More Like This
More Copies In Prospector
Loading Prospector Copies...
More Details
Street Date:
1309
Language:
English
ISBN:
9780737766561, 0737766565, 9780737766578, 0737766573

Notes

Bibliography
Includes bibliographical references and index.
Staff View
Grouped Work ID:
2182e7c3-af04-8cc8-2338-8e07a80875d8
Go To GroupedWork

Record Information

Last Sierra Extract TimeApr 27, 2024 07:44:04 PM
Last File Modification TimeApr 27, 2024 07:44:16 PM
Last Grouped Work Modification TimeApr 27, 2024 07:44:10 PM

MARC Record

LEADER04001cam a22005538i 4500
001828768580
003OCoLC
00520131209143715.0
008130319s2013    miu      b    001 0 eng  
010 |a 2013009181
020 |a 9780737766561|q (hardcover)
020 |a 0737766565|q (hardcover)
020 |a 9780737766578|q (paperback)
020 |a 0737766573|q (paperback)
035 |a (OCoLC)828768580
040 |a DLC|b eng|e rda|c DLC|d YDXCP|d BTCTA|d BDX|d OCLCO|d OCLCQ|d OLT|d HDX
042 |a pcc
049 |a HDXA
05000|a HV6773|b .H33 2013
08200|a 364.16/8|2 23
24500|a Hacking and hackers /|c Margaret Haerens and Lynn M. Zott, book editors.
263 |a 1309
264 1|a Detroit :|b Greenhaven Press,|c [2013]
300 |a 211 pages ;|c 24 cm.
336 |a text|b txt|2 rdacontent
337 |a unmediated|b n|2 rdamedia
338 |a volume|b nc|2 rdacarrier
4901 |a Opposing viewpoints
504 |a Includes bibliographical references and index.
50500|g ch. 1:|t What is the most effective way to combat hacking? --|t A clear and unified approach is needed to ensure cybersecurity /|r Mike McConnell --|t Hackers are not a threat to cybersecurity /|r James Andrew Lewis --|t US outgunned in hacker war /|r Devlin Barrett --|t A multifaceted strategy is best to ensure cybersecurity /|r Michael P. Merritt --|t Private sector isn't waiting for Feds to deal with internet security /|r John Hayward --|t Ethical hacking improves cybersecurity /|r Sue Marquette Poremba --|t Exploding the myth of the "ethical hacker" /|r Conrad Constantine ; Dominique Karg --
50500|g ch. 2:|t Is hacktivism a serious threat? --|t Hacktivism is an effective and ethical means of social protest /|r Graham Armstrong --|t Hacktivist collectives are terrorists /|r Phil Elmore --|t Hacktivists fight for civil liberties and free expression /|r James Ball --|t Old-time hacktivists: Anonymous, you've crossed the line /|r Elinor Mills --
50500|g ch. 3:|t What is the significance of WikiLeaks? --|t WikiLeaks provides transparency and can deter corporate and government misbehavior /|r Jesse Walker --|t WikiLeaks scandal reveals the limitations of the public's desire for transparency /|r Alasdair Roberts --|t WikiLeaks is an unprecedented threat to US national security /|t Marc A. Thiessen --|t A defense of WikiLeaks /|r John B. Judis --|t WikiLeaks scandal reveals the US government lacks the will to deal with cyberthreats /|r Cliff May --
50500|g ch. 4:|t What is the role of government in hacking? --|t Cyberattacks require a military response /|r US Department of Defense --|t A military response to cyberattacks is unwarranted and inappropriate /|r Benjamin H. Friedman ; Christopher Preble --|t United States needs to develop a smart and effective counterinsurgency strategy for cyberspace /|r Paul Rosenzweig --|t More government regulation would impede innovation and cybersecurity /|r Tom Ridge --|t United States should engage in cyberwarfare treaty talks /|r Alice Slater
650 0|a Computer crimes.|0 https://id.loc.gov/authorities/subjects/sh85029492
650 0|a Hackers.|0 https://id.loc.gov/authorities/subjects/sh94005931
650 0|a Hacktivism.|0 https://id.loc.gov/authorities/subjects/sh2010014455
7001 |a Haerens, Margaret.|0 https://id.loc.gov/authorities/names/n2005069445
7001 |a Zott, Lynn M.|q (Lynn Marie),|d 1969-|0 https://id.loc.gov/authorities/names/n2002047639
830 0|a Opposing viewpoints series (Unnumbered)|0 https://id.loc.gov/authorities/names/n83729248
907 |a .b41153716
948 |a MARCIVE Comp, in 2022.12
948 |a MARCIVE August, 2017
948 |a MARCIVE extract Aug 5, 2017
989 |1 .i8134868x|b 1030003359342|d cms|g -|m |h 1|x 0|t 0|i 0|j 18|k 131211|n 12-30-2014 18:17|o -|a HV 6773 .H33 2013
994 |a 02|b HDX
995 |a Loaded with m2btab.ltiac in 2022.12
995 |a Loaded with m2btab.ltiac in 2017.08
995 |a Initial Bemis load m2btab.test019 in 2019.02
998 |e -|f eng|a cm|a cms