Fancy bear goes phishing : (Record no. 91898)

MARC details
000 -LEADER
fixed length control field 02324nam a22001697a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240212b2023 |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780241461969
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168 SHA-S
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Shapiro, Scott J.
245 ## - TITLE STATEMENT
Title Fancy bear goes phishing :
Statement of responsibility, etc. Scott J. Shapiro
Remainder of title the dark history of the information age, in five extraordinary hacks /
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. India
Name of publisher, distributor, etc. Penguin Books
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent 420p.
500 ## - GENERAL NOTE
General note Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the elite hacking unit within Russian military intelligence broke into the Democratic National Committee network, grabbed what it could, and may have contributed to the election of Donald Trump.<br/><br/>Robert Morris was curious. Experimenting one night, the graduate student from Cornell University released "the Great Worm" and became the first person to crash the internet.<br/><br/>Dark Avenger was in love. To impress his crush, the Bulgarian hacker invented the first mutating computer virus-engine and nearly destroyed the anti-virus industry.<br/><br/>Why is the internet so insecure? How do hackers exploit its vulnerabilities? Fancy Bear Goes Phishing tells the stories of five great hacks, their origins, motivations and consequences. As well as Fancy Bear, Robert Morris and Dark Avenger, we meet Cameron Lacroix, a sixteen-year-old from South Boston, who hacked Paris Hilton's cell phone because he wanted to be famous and Paras Jha, a Rutgers undergraduate, who built a giant botnet designed to get him out of his calculus exam and disrupt the online game Minecraft, but which almost destroyed the internet in the process. Scott Shapiro's five stories demonstrate that computer hacking is not just a tale of technology, but of human beings.<br/><br/>Yet as Shapiro shows, hackers do not just abuse computer code - they exploit the philosophical principles of computation: the very features that make computers possible also make hacking possible. He explains how our information society works, the ways our data is stored and manipulated, and why it is so subject to exploitation. Both intellectual romp and dramatic true-crime narrative, Fancy Bear Goes Phishing exposes the secrets of the digital age.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hacking--Case studies.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Phishing--Case studies.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet--Security measures.
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
Withdrawn status
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
  Dewey Decimal Classification     360 BITS Pilani Hyderabad BITS Pilani Hyderabad New Book Display (Welcome to Reserve) 12/02/2024   364.168 SHA-S 48171 13/07/2024 12/02/2024 New books on display New Book on Display from 06.05.2024 to 19.05.2024
An institution deemed to be a University Estd. Vide Sec.3 of the UGC
Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

© 2024 BITS-Library, BITS-Hyderabad, India.