Ethical Hacking by Alana Maurushat pb

US $24.99
ApproximatelyS$ 32.43
or Best Offer
Condition:
Very Good
Breathe easy. Returns accepted.
Shipping:
US $5.99 (approx S$ 7.77) USPS Media MailTM.
Located in: Nevada City, California, United States
Delivery:
Estimated between Sat, 25 Oct and Tue, 28 Oct to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)

Shop with confidence

Top Rated Plus
Trusted seller, fast shipping, and easy returns. Learn more- Top Rated Plus - opens in a new window or tab
Seller assumes all responsibility for this listing.
eBay item number:326237829758

Item specifics

Condition
Very Good: A book that has been read but is in excellent condition. No obvious damage to the cover, ...
ISBN
9780776627915
Category

About this product

Product Identifiers

Publisher
University of Ottawa Press/Les Presses DE L'universite D'ottawa
ISBN-10
0776627910
ISBN-13
9780776627915
eBay Product ID (ePID)
22038753387

Product Key Features

Book Title
Ethical Hacking
Number of Pages
368 Pages
Language
English
Publication Year
2019
Topic
Intelligence & Espionage, Sociology / General, Civil Rights, Science & Technology
Illustrator
Yes
Genre
Law, Political Science, Social Science
Author
Alana Maurushat
Book Series
Law, Technology, and Media Ser.
Format
Trade Paperback

Dimensions

Item Height
1 in
Item Weight
17.5 Oz
Item Length
9 in
Item Width
6 in

Additional Product Features

Intended Audience
Trade
LCCN
2019-401129
Table Of Content
Chapter I: Why Ethical Hacking? 1.1 You 1.2 Me 1.3 Ethical Hacking Chapter II: Essential Terms and Concepts 2.1 Types of Ethical Hackers 2.2 Definitions and Typology of Ethical Hacking 2.3 Conventional Computer-Security-Threat Model 2.4 Common Methods Used in Ethical Hacking 2.5 Other Relevant Terms Chapter III: Methodology and Quantitative Studies of Ethical Hacking: Evidence-Based Decision and Policy-Making 3.1 Report for Public Safety Canada, 2011 3.2 Summary of Findings 3.3 GDELT Analysis Service--Event Data(with Kevin Kim) 3.4 Google''s BigQuery (with Richard Li) 3.5 Dark-Net Analysis of Malware and Cyber-Jihad Forums 3.5.1 Cyber-Jihad Forums (with Adrian Agius) 3.5.2 Hacking Forums (with Richard Li) 3.6 Observations Chapter IV: Legal Cases Around the World (with Jelena Ardalic) Chapter V: Select Ethical-Hacking Incidences: Anonymous Chapter VI: Select Ethical-Hacking Incidences: Chaos Computer Club, CyberBerkut, LulzSec, Iranian Cyber Army, and Others Chapter VII: Online Civil Disobedience 7.1 Online Civil Disobedience in Context 7.2 Timeline 7.3 Case Studies 7.3.1 Anonymous, Operation Titstorm 7.3.2 German Lufthansa Protest 7.3.3 Twitter #TellVicEverything Campaign 7.4 Observations Chapter VIII: Hacktivism 8.1 Hacktivism in Context 8.2 Timelines 8.3 Case Studies 8.3.1 Anonymous, Post-Christmas Charity Donations 8.3.2 Neo-Nazi Website 8.3.3 WikiLeaks, Operation Payback 8.4 Observations Chapter IX: Penetration/Intrusion Testing and Vulnerability Disclosure 9.1 Penetration Testing and Vulnerability Disclosure in Context 9.2 Timeline 9.3 Case Studies 9.3.1 Australian Security Expert Patrick Webster 9.3.2 Cisco Router9.3.3 LulzSec Hacking to Incentivize Sony to Fix Known Software Bugs 9.3.4 Guardians of Peace, North Korea, and the Sony Pictures Hack 9.3.5 Vulnerability Hunter Glenn Mangham 9.3.6 Da Jiang Innovation 9.4 Observations Chapter X: Counterattack/Hackback 10.1 Counterattack/Hackback in Context 10.2 Case Studies 10.2.1 LulzSec, MasterCard and PayPal, and Barr 10.2.2 Illegal Streaming Link Sites 10.2.3 Automated Counter-DDoS 10.3 The Legalization of Hackback 10.4 Observations Chapter XI: Security Activism 11.1 Security Activism in Context 11.2 Case Studies 11.2.1 Spamhaus Project 11.2.2 Spam Fighter 11.2.3 Botnet Removal Communities 11.2.4 Cyber-Security Researcher Y 11.3 Observations Chapter XII: Ethical-Hacking Challenges in Legal Frameworks, Investigation, Prosecution, and Sentencing 12.1 Criminal Landscape: Convention on Cybercrime and the Canadian Criminal Framework 12.2 Attribution 12.3 Jurisdiction 12.4 Evidence 12.5 Integrity, Volatility of Evidence, and the Trojan-Horse Defence 12.6 Damages 12.7 Sentencing and Dealing with Mental Disorders--Addiction and Autism Spectrum (with PhD candidate Hannah Rappaport) 12.8 Observations Chapter XIII: Ethical Hacking, Whistle-Blowing, and Human Rights and Freedoms 13.1 The Canadian Charter of Human Rights and Freedoms 13.2 Whistle-Blowing and Ethical Hacking 13.3 Observations Chapter XIV: Toward an Ethical-Hacking Framework 14.1 Ethical Hacking in Context 14.2 Encourage Legitimate Space for Virtual Protests 14.3 Guidelines and Policy 14.4 Code of Conduct for Hackback 14.5 Transparency of Government Engagement with Hackback 14.6 Security Research Exemption and Public-Interest Consideration 14.7 Concluding Remarks Bibliography Appendix: Interview Questions
Synopsis
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto "we open governments" on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause--political or otherwise--which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La premi re moiti du XXIe si cle sera sans doute reconnue comme l' poque o le piratage thique a ouvert de force les gouvernements, d pla ant les limites de la transparence. La page twitter de Wikileaks ench sse cet ethos m me sa devise, we open governments , et sa volont d' tre omnipr sent. En parall le, les grandes soci t s de technologie comme Apple se font comp tition pour produire des produits de plus en plus s curitaires et prot ger les donn es de leurs clients, alors m me que les gouvernements tentent de limiter et de d crypter ces nouvelles technologies d'encryption. Entre-temps, le march des vuln rabilit s en mati re de s curit augmente mesure que les experts en s curit informatique vendent des vuln rabilit s de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 1,5 million de dollars. L'activisme en s curit est la hausse. Le piratage thique est l'utilisation non-violence d'une technologie quelconque en soutien d'une cause politique ou autre qui est souvent ambigue d'un point de vue juridique et moral. Le hacking thique peut d signer les actes de v rification de p n tration professionnelle ou d'experts en s curit informatique, de m me que d'autres formes d'actions mergentes, comme l'hacktivisme et la d sob issance civile en ligne. L'hacktivisme est une forme de piratage thique, mais galement une forme de militantisme des droits civils l' re num rique. En principe, les adeptes du hacktivisme croient en deux grands principes: le respect des droits de la personne et les libert s fondamentales, y compris la libert d'expression et la vie priv e, et la responsabilit des gouvernements d' tre ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les ant c dents comme les agendas des hacktivistes sont fort diversifi s. Il n'est pas clair de quelle fa on les tribunaux et les gouvernements traiteront des tentatives de piratage eu gard aux zones grises juridiques, aux approches thiques conflictuelles, et compte tenu du fait qu'il n'existe actuellement, dans le monde, presque aucune exception aux provisions, en mati re de cybercrime et de crime informatique, li es la recherche sur la s curit ou l'int r t public. Il sera galement difficile de d terminer le lien entre hacktivisme et droits civils. Ce livre est publi en anglais., How will governments and courts manoeuvre within the boundaries of protected civil liberties in this new era of hacktivism? This monograph discusses moral and legal issues of ethical hacking and reviews analytics and trends., How will governments and courts manoeuvre within the boundaries of protected civil liberties in this new era of hacktivism? This monograph discusses moral and legal issues of ethical hacking and reviews analytics and trends. How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto "we open governments" on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause--political or otherwise--which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. Published in English.
LC Classification Number
HV6773.M3835 2019

Item description from the seller

About this seller

Nick's Knacks and Books

99.8% positive feedback95K items sold

Joined Apr 2001
Welcome to Nick's Knacks and Books! We sell primarily books, but also cds, videos, dvds, magazines, laserdiscs, and more!

Detailed Seller Ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
4.8
Shipping speed
5.0
Communication
5.0

Seller feedback (48,954)

All ratingsselected
Positive
Neutral
Negative
  • s***h (296)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    100+ year old book, in excellent condition and exactly as described. Excellent transaction. Shiping was immediate and received 4 days after ordering. Packaging was first rate. I highly recommend this seller and will do business again.h
  • 1***s (95)- Feedback left by buyer.
    Past year
    Verified purchase
    This is a very nice seller to do business with. Item looked just as described, even better than it looked. All questions were answered quickly, Item was reasonably priced and so was the shipping. The magazine was wrapped very well. I would recommend this seller, and I will be purchasing from again very soon.
  • d***d (58)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Thanks for a great transaction! Fast shipping, excellent price for the item and postage, and accurately described in the ad. Also appreciated the "instantaneous" reply/communication responding to my question. Top seller, I recommend without any hesitation.