1: ”Genocide”: From Columbine to Hacking 2: Rebels: Joe Magee and “Noid” 3: The Hunt for Mafiaboy: Operation Claymore 4: A Tale of Two Script Kiddies: Pr0metheus and Explotion 5: World of Hell 6: Cyberchic: Starla Pureheart 7: Unlikely White Hat: Willie Gonzalez 8: Tinker, Teenager, Hacker, Spy: The H.D. Moore Story Afterword A: Two Decades of Teenage Hacking B: Making Headlines Over the Years C: Hacking on the Web
Dan Verton (Burke, VA) is a senior writer at Computerworld,
specializing in Internet security, national security, critical
infrastructure protection, and corporate information security
policies. He has written hundreds of news stories, profiles
of government and industry leaders, and feature-length stories
related to Internet security, defense, and intelligence matters.
He is also the former Associate Editor, Defense, for the
trade publication Federal Computer Week.
Other publication credits include stories on information warfare
and corporate espionage for Business2.0, various Internet security
news stories for Information Security Magazine, CNN.com, The
Industry Standard, InfoWorld, and PC World.Dan has been asked to
speak at various Internet security conferences, including a recent
event at the United Nations in New York, where he moderated an
expert panel on security issues.Dan is a former intelligence
officer in the U.S. Marine Corps. While in the military, he served
as an information systems security officer and training officer for
various CIA and DIA database systems. Dan is also a former imagery
intelligence analyst with the U.S. Army Reserve.
"Terrorists are strategic actors. They choose their targets deliberately based on the weakness they observe in our defenses and our preparedness. We must defend ourselves against a wide range of means and methods of attack. Terrorists continue to employ conventional means of attack, while at the same time gaining in expertise in less traditional means, such as cyber attacks."
Ask a Question About this Product More... |