Catalog

Record Details

Catalog Search



Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks  Cover Image Book Book

Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks / Scott J. Shapiro.

Shapiro, Scott, (author.).

Summary:

"A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"-- Provided by publisher.
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton’s cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers’ tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.

Record details

  • ISBN: 9780374601171
  • ISBN: 0374601178
  • Physical Description: 420 pages : illustrations ; 24 cm
  • Edition: First edition.
  • Publisher: New York : Farrar, Straus and Giroux, [2023]

Content descriptions

Bibliography, etc. Note:
Includes bibliographical references (pages [331]-402) and index.
Subject: Hacking > Case studies.
Phishing > Case studies.
Internet > Security measures.

Available copies

  • 2 of 3 copies available at Lehigh Valley Library System.

Holds

  • 0 current holds with 3 total copies.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Allentown Public Library 364.16 SHAP (Text) 34455007026160 New Adult Nonfiction Available -
Bethlehem Main Library 364.168 (Text) 33062009760019 Adult Nonfiction Checked Out 05/11/2024
Easton Main Library 364.168 S529f (Text) 31901004713238 Adult Nonfiction Available -


Additional Resources