Hacker culture A to Z : a fun guide to the people, ideas, and gadgets that made the tech world /

Saved in:
Bibliographic Details
Author / Creator:Crawley, Kim, author.
Edition:[First edition].
Imprint:[Place of publication not identified] : Ascent Audio, 2024.
Description:1 online resource (1 sound file (11 hr., 18 min.))
Language:English
Subject:
Format: E-Resource Spoken word recording Audio Streaming Audio
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13713994
Hidden Bibliographic Details
Other authors / contributors:Jayden, Jen, narrator.
ISBN:9781663732552
1663732558
Sound characteristics:digital
Digital file characteristics:audio file
Notes:Read by Jen Jayden.
Online resource; title from title details screen (O'Reilly, viewed January 17, 2024).
Summary:"Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like ""knowledge should be free""; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminals.".