Internet Security: Hacking, Counterhacking, and Society
Jones & Bartlett Learning, 2007 - Всего страниц: 292
The frequency of digital attacks and intrusions has steadily increased over the years as the number of people with the appropriate motivation and technical ability continues to grow. Internet Security: Hacking, Counterhacking, and Society is a modern survey of the recent ethical policy issues arising in connection with Internet and network security. This exciting collection of papers, articles, and monographs discusses a number of important ethical questions arising in many distinct areas of Internet and network security, including: Are hacker attacks and hacktivism morally justified? Is hacking justified as self-defense? How should professionals respond to security issues? Is publishing malicious code protected by moral rights to free speech? Is it morally permissible for the government or individuals to actively conceal e-content? Internet Security: Hacking, Counterhacking, and Society is a valuable addition to the library of anyone concerned with the growing number of Internet security issues and intrusions facing society today.
Отзывы - Написать отзыв
Не удалось найти ни одного отзыва.
Herman Tavani The Conceptual and Moral Landscape
Hacking Hacktivism and Active Defense
Kenneth Einar Himma Hacking as Politically Motivated Digital
Dorothy Denning A View of Cyberterrorism 5 Years Later
Ethical Issues in Professionalism and Design
Batya Friedman Daniel Howe and Edward Felten Informed
Richard Epstein The Impact of Computer Security Concerns
Other Security Issues
Kai Kimppa Andy Bissett and N Ben Fairweather Security in
acts of civil acts of hacktivism aggressive argue argument Available break-ins browser buffer overflow claim communication computer crime computer security computer systems cookie cookie management cookie watcher Core Wars cyber cyberattacks cyberspace cyberterrorism damage database defense principle digital attack digital intrusions disclosure discussion disk electronic civil disobedience encryption evaluation example hacker ethic hackers hacking hacktivism hacktivists harm Himma impact individuals informed consent infrastructures innocent intellectual property intermediate responses Internet development involving justified legitimate machines moral motivated Mozilla necessity principle on-line games password person political potential problems professional protect punishment puter relevant requires result risk secure software server significant social software development software development process Software Engineering software process software project goals someone Spafford steganalysis steganography Tavani terrorists third parties threat tion unauthorized user stories users vendors victim virus viruses vulnerability worm