Recomienda este artículo a tus amigos:
Hacking and Hackers
Margaret Haerens
Hacking and Hackers
Margaret Haerens
Marc Notes: Includes bibliographical references and index. Table of Contents: Why Consider Opposing Viewpoints? -- Introduction -- Chapter 1. What Is the Most Effective Way to Combat Hacking? -- Chapter Preface -- 1. A Clear and Unified Approach Is Needed to Ensure Cybersecurity / Mike McConnell -- 2. Hackers Are Not a Threat to Cybersecurity / James Andrew Lewis -- 3. US Outgunned in Hacker War / Devlin Barrett -- 4. A Multifaceted Strategy Is Best to Ensure Cybersecurity / Michael P. Merritt -- 5. Private Sector Isn't Waiting for Feds to Deal with Internet Security / John Hayward -- 6. Ethical Hacking Improves Cybersecurity / Sue Marquette Poremba -- 7. Exploding the Myth of the Ethical Hacker / Conrad Constantine, Dominique Karg -- Periodical and Internet Sources Bibliography -- Chapter 2. Is Hacktivism a Serious Threat? -- Chapter Preface -- 1. Hacktivism Is an Effective and Ethical Means of Social Protest / Graham Armstrong -- 2. Hacktivist Collectives Are Terrorists / Phil Elmore -- 3. Hacktivists Fight for Civil Liberties and Free Expression / James Ball -- 4. Old-Time Hacktivists: Anonymous, You've Crossed the Line / Elinor Mills -- Periodical and Internet Sources Bibliography -- Chapter 3. What Is the Significance of WikiLeaks? -- Chapter Preface -- 1. WikiLeaks Provides Transparency and Can Deter Corporate and Government Misbehavior / Jesse Walker -- 2. The WikiLeaks Scandal Reveals the Limitations of the Publics Desire for Transparency / Alasdair Roberts -- 3. WikiLeaks Is an Unprecedented Threat to US National Security / Marc A. Thiessen -- 4. A Defense of Wikileaks / John B. Judis -- 5. The WikiLeaks Scandal Reveals the US Government Lacks the Will to Deal with Cyberthreats / Cliff May -- Periodical and Internet Sources Bibliography -- Chapter 4. What Is the Role of Government in Hacking? -- Chapter Preface -- 1. Cyberattacks Require a Military Response -- US Department of Defense -- 2. A Military Response to Cyberattacks Is Unwarranted and Inappropriate / Benjamin H. Friedman, Christopher Preble -- 3. The United States Needs to Develop a Smart and Effective Counterinsurgency Strategy for Cyberspace / Paul Rosenzweig -- 4. More Government Regulation Would Impede Innovation and Cybersecurity / Tom Ridge -- 5. The United States Should Engage in Cyberwarfare Treaty Talks / Alice Slater -- Periodical and Internet Sources Bibliography -- For Further Discussion -- Organizations to Contact -- Bibliography of Books -- Index. Review Citations: Voice of Youth Advocates 04/01/2014 pg. 95 (EAN 9780737766578, Paperback) Voice of Youth Advocates 04/01/2014 (EAN 9780737766561, Library Binding) Contributor Bio: Haerens, Margaret B01
Medios de comunicación | Libros Paperback Book (Libro con tapa blanda y lomo encolado) |
Publicado | 30 de diciembre de 2013 |
ISBN13 | 9780737766578 |
Editores | Greenhaven Press |
Páginas | 211 |
Dimensiones | 152 × 229 × 13 mm · 294 g |
Mas por Margaret Haerens
Ver todo de Margaret Haerens ( Ej. Paperback Book , Hardcover Book y Book )