Kelley Library

Fancy Bear goes phishing, the dark history of the information age, in five extraordinary hacks, Scott J. Shapiro

Label
Fancy Bear goes phishing, the dark history of the information age, in five extraordinary hacks, Scott J. Shapiro
Language
eng
Bibliography note
Includes bibliographical references (pages 331-402) and index
Illustrations
illustrations
Index
index present
Literary Form
non fiction
Main title
Fancy Bear goes phishing
Nature of contents
bibliography
Responsibility statement
Scott J. Shapiro
Sub title
the dark history of the information age, in five extraordinary hacks
Summary
"A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--, Provided by publisher
Table Of Contents
Introduction: The Brilliant Project -- The great worm -- How the tortoise hacked Achilles -- The Bulgarian virus factory -- The father of dragons -- Winner take all -- Snoop Dogg does his laundry -- How to mudge -- Kill chain -- The Minecraft wars -- Attack of the killer toasters -- Conclusion: The death of solutionism -- Epilogue
Target audience
adult
Classification
Content

Incoming Resources