Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma.
نوع المادة : نصالناشر:Sudbury, Mass. : Jones and Bartlett Publishers, [2007]تاريخ حقوق النشر: ©2007وصف:x, 292 pages ; 23 cmنوع المحتوى:- text
- unmediated
- volume
- 0763735361
- 9780763735364
- TK5105.875.I57 I574 2007
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.875.I57 I574 2007 (إستعراض الرف(يفتح أدناه)) | C.1 | المتاح | 30020000020808 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.875.I57 I574 2007 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30020000020807 |
Includes bibliographical references and index.
Ch. 1. Hacking and viruses / Tom Forester and Perry Morrison -- Ch. 2. conceptual and moral landscape of computer security / Herman Tavani -- Ch. 3. Are computer break-ins ethical? / Eugene Spafford -- Ch. 4. Terrorism or civil disobedience : toward a hacktivist ethic / Mark Manion and Abby Goodrum -- Ch. 5. Hacking as politically motivated digital civil disobedience : is hacktivism morally justified? / Kenneth Einar Himma -- Ch. 6. ethics of 'hacking back' : active response to computer intrusions / Kenneth Einar Himma -- Ch. 7. view of cyberterrorism 5 years later / Dorothy Denning -- Ch. 8. Internet development : professionalism, profits, ethics, or sleaze? / Don Gotterbarn and David Tarnoff -- Ch. 9. Informed consent in the mozilla browser : implementing value-sensitive design / Batya Friedman, Daniel Howe and Edward Felten -- Ch. 10. impact of computer security concerns on software development / Richard Epstein -- Ch. 11. ethical implications of the messenger's haircut : steganography in the digital age / Frances Grodzinsky, Keith Miller and Marty Wolf -- Ch. 12. Security in online games / Kai Kimppa, Andy Bissett and N. Ben Fairweather -- Ch. 13. Privacy, intellectual property, and hacking : evaluating free access arguments / Adam Moore -- Ch. 14. Disclosing software vulnerabilities / Maria Canellopoulou-Bottis.