by
Ablon, Lillian, author.
Call Number
364.168 23
Publication Date
2014
Summary
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks).
Format:
Electronic Resources
Relevance:
46124.3594
by
Delfanti, Alessandro, author.
Call Number
364.168 23
Publication Date
2013
Format:
Electronic Resources
Relevance:
2.1988
View Other Search Results
by
Grand, Joe.
Call Number
005.8 22
Publication Date
2006
Summary
The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more. The presentation of these 20 projects on DVD media provides users with benefits and options not available on the printed page. All images are hi-res color that can be enlarged or printed, the text is easily searched, and the user can copy the contents to their hard disk and add comments directly into the PDF files. The DVD media also lends itself well to group projects (it includes a 10 user license). The 160-page book includes chapters on hacking tools and electrical engineering basics, along with chapters on the background, design and functionality of each hardware device. * Packed full of high resolution colour images that reveal the smallest details of each step in a hack * Includes in depth coverage of the tools of the hacking trade and the basics of electrical engineering * DVD includes a "Using the Tools" video starring Joe "kingpin" Grand.
Format:
Electronic Resources
Relevance:
2.1185
by
Long, Johnny.
Call Number
813.6 22
Publication Date
2007
Summary
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Format:
Electronic Resources
Relevance:
1.5547
by
Contos, Brian T.
Call Number
005.8 22
Publication Date
2006
Summary
Packed with vivid real-life cases, this comprehensive book addresses the most difficult to manage and costly of all security threats: the insider.
Format:
Electronic Resources
Relevance:
1.2569
by
Cole, Eric.
Call Number
005.8 22
Publication Date
2006
Summary
Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats.
Format:
Electronic Resources
Relevance:
1.0423
by
Grand, Joe.
Call Number
621.3916 22
Publication Date
2004
Summary
"If I had this book 10 years ago, the FBI would never have found me!"--Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help" * An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case * Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players * Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development * Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC * Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point * Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader * Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB Includes hacks of today's most popular gaming systems like Xbox and PS/2. Teaches readers to unlock the full entertainment potential of their desktop PC. Frees iMac owners to enhance the features they love and get rid of the ones they hate.
Format:
Electronic Resources
Relevance:
0.7700
8.
by
Brenner, Susan W., 1947-
Call Number
364.1680973
Publication Date
2012
Format:
Electronic Resources
Relevance:
0.5998
by
Hagestad, William T., II.
Call Number
303.48
Publication Date
2012
Summary
21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage.
Format:
Electronic Resources
Relevance:
0.5208
Call Number
XX(272553.1)
Publication Date
1968
Format:
Electronic Resources
Relevance:
0.1786
11.
by
Honders, Christine.
Call Number
641.815
Publication Date
2019
Summary
Who doesn't love a bakery? Few people can resist the smell of cookies and pies baking or keep from staring at the beautifully decorated cakes. Behind the counter is the person responsible for all this goodness. Your readers learn that bakers not only provide us with breads and rolls and satisfy our sweet tooth, they learn about health, nutrition, and science to produce their delicious recipes. Some bakers spend their careers in local bakeries, making treats for birthdays and weddings. Others work in manufacturing facilities that mass-produce baked goods for grocery stores. Wherever they work, bakers keep us well fed and put a smile on our faces. Colorful photographs of bakers at work help readers make a connection with the fun and informative narrative.
Format:
Electronic Resources
Relevance:
0.1179
12.
by
Sen, Mayukh.
Call Number
641.50922
Publication Date
2021
Summary
America's modern culinary history told through the lives of seven pathbreaking chefs and food writers.
Format:
Electronic Resources
Relevance:
0.1054
Limit Search Results