LEADER 02021oam 2200493 450 001 9910158634603321 005 20190911103516.0 010 $a1-5081-7315-X 035 $a(OCoLC)967983295 035 $a(MiFhGG)GVRL07ZE 035 $a(EXLCZ)993710000001010139 100 $a20160418h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aWhite and black hat hackers /$fJason Porterfield 205 $aFirst edition. 210 1$aNew York :$cRosen Publishing,$d2017. 210 4$d?2017 215 $a1 online resource (64 pages) $ccolor illustrations 225 1 $aCryptography : code making and code breaking 311 $a1-5081-7314-1 320 $aIncludes bibliographical references and index. 327 $aHacking's early days -- The shady side of security -- Mischief and threats -- Attack and counterattack -- Gathering in the shadows. 330 $aIn this book, readers learn the differences among white hat, black hat, and gray hat hackers and their ways of working concerning computer networks today. The origins and history of hacker culture are examined, as are the law enforcement methods of catching criminals. Some of the topics covered are the motives for hacking, black hat targets, online hazards, malware programs, and typical hacker techniques. 410 0$aCryptography: code making and code breaking. 606 $aPenetration testing (Computer security) 606 $aComputer security 606 $aComputer crimes 606 $aComputer crimes$xPrevention 615 0$aPenetration testing (Computer security) 615 0$aComputer security. 615 0$aComputer crimes. 615 0$aComputer crimes$xPrevention. 676 $a005.8 700 $aPorterfield$b Jason$01246958 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910158634603321 996 $aWhite and black hat hackers$92892606 997 $aUNINA