TOP
紅利積點抵現金,消費購書更貼心
Profiling Hackers ─ The Science of Criminal Profiling As Applied to the World of Hacking
90折

Profiling Hackers ─ The Science of Criminal Profiling As Applied to the World of Hacking

商品資訊

定價
:NT$ 1884 元
優惠價
901696
無庫存,下單後進貨(到貨天數約45-60天)
下單可得紅利積點:50 點
商品簡介
目次

商品簡介

Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art.

Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators. The authors reveal hidden aspects of the cyber-crime underground, answering questions such as: Who is a real hacker? What life does a hacker lead when not on-line? Is it possible to determine a hacker’s profile on the basis of his behavior or types of intrusion? What is the motive behind phishing, pharming, viruses, and worms?

After gaining notoriety for breaking into many high-profile computer systems, the Italian hacker Raoul Chiesa turned to ethical hacking in 1995. Today he uses his skills and abilities to find ways to protect networks and computer systems. Stefania Ducci is a member of the Counter Human Trafficking and Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). Silvio Ciappi is a criminologist who lectures at the University of Pisa and studies criminal profiling. These three experts with vastly different backgrounds explore the clandestine network of cyber-criminals, providing an unparalleled glimpse into the secret lives of these malevolent individuals.

目次

Introduction to Criminal Profiling
Brief History of Criminal Profiling
Serial Crimes and Criminal Profiling: How to Interpret Them
Criminal Profiling: Applying it to Study Hackers
Introducing "Cybercrime"
Information Technology and Digital Crimes
1980, 1990, 2000: Three Ways of Looking at Cybercrime
Mr. Smith, Hackers and Digital Crimes in the IT Society
Digital Crimes vs. Hacking: Terminology and Definitions
Conclusions
To Be, Think, and Live as a Hacker
Evolution of the Term
The Artifacts of the Hacker Culture
One Ethics or More?
Understanding Hackers: How Far Have We Gone?
What are the Motives Behind Hacking?
The Colours of the Underground
Commonly Recognized Hacker Categories
The HPP Project
The Planning Phase
The Questionnaires
First Level Analysis
Second Level Analysis
Who are Hackers? Part 1
What are We Trying to Understand?
Gender and Age Group
Background and Place of Residence
How Hackers View Themselves
Family Background
Socio-Economic Background
Social Relationships
Leisure Activities
Education
Professional Environment
Psychological Traits
To Be or to Appear: the Level of Self-Esteem
Presence of Multiple Personalities
Psychophysical Conditions
Alcohol & Drug Abuse and Dependencies
Definition or Self-Definition: What is a Real Hacker?
Relationship Data
Who are Hackers? Part 2
Handle and Nickname
Starting Age
Learning and Training Modalities
The Mentor's Role
Technical Capacities (Know-How)
Hacking, Phreaking or Carding: the Reasons Behind the Choice
Networks, Technologies and Operating Systems
Techniques Used to Penetrate a System
Individual and Group Attacks
The Art of War: Examples of Attack Techniques
Operating Inside a Target System
The Hacker’s Signature
Relationships with the System Administrators
Motivations
The Power Trip
Lone Hackers
Hacker Groups
Favourite Targets and Reasons
Specializations
Principles of the Hacker Ethics
Acceptance or Refusal of the Hacker Ethics
Crashed Systems
Hacking/Phreaking Addiction
Perception of the Illegality of Their Actions
Offences Perpetrated with the Aid of IT Devices
Offences Perpetrated without the Use of IT Devices
Fear of Discovery, Arrest and Conviction
The Law as Deterrent
Effect of Convictions
Leaving the Hacker Scene
Beyond Hacking
Conclusions
Appendices

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

優惠價:90 1696
無庫存,下單後進貨
(到貨天數約45-60天)

暢銷榜

客服中心

收藏

會員專區