Warehouse Stock Clearance Sale

Grab a bargain today!


The Hacker Diaries
By

Rating

Product Description
Product Details

Table of Contents

1: ”Genocide”: From Columbine to Hacking 2: Rebels: Joe Magee and “Noid” 3: The Hunt for Mafiaboy: Operation Claymore 4: A Tale of Two Script Kiddies: Pr0metheus and Explotion 5: World of Hell 6: Cyberchic: Starla Pureheart 7: Unlikely White Hat: Willie Gonzalez 8: Tinker, Teenager, Hacker, Spy: The H.D. Moore Story Afterword A: Two Decades of Teenage Hacking B: Making Headlines Over the Years C: Hacking on the Web

About the Author

Dan Verton (Burke, VA) is a senior writer at Computerworld, specializing in Internet security, national security, critical infrastructure protection, and corporate information security policies.  He has written hundreds of news stories, profiles of government and industry leaders, and feature-length stories related to Internet security, defense, and intelligence matters.  He is also the former Associate Editor, Defense, for the trade publication Federal Computer Week.
Other publication credits include stories on information warfare and corporate espionage for Business2.0, various Internet security news stories for Information Security Magazine, CNN.com, The Industry Standard, InfoWorld, and PC World.Dan has been asked to speak at various Internet security conferences, including a recent event at the United Nations in New York, where he moderated an expert panel on security issues.Dan is a former intelligence officer in the U.S. Marine Corps. While in the military, he served as an information systems security officer and training officer for various CIA and DIA database systems. Dan is also a former imagery intelligence analyst with the U.S. Army Reserve.

Reviews

"Terrorists are strategic actors. They choose their targets deliberately based on the weakness they observe in our defenses and our preparedness. We must defend ourselves against a wide range of means and methods of attack. Terrorists continue to employ conventional means of attack, while at the same time gaining in expertise in less traditional means, such as cyber attacks."

Ask a Question About this Product More...
 
Look for similar items by category
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top