Syndetics cover image
Image from Syndetics

Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks / Scott J. Shapiro.

By: Material type: TextTextPublisher: New York : Farrar, Straus and Giroux, 2023Copyright date: ©2023Edition: First editionDescription: 420 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780374601171
  • 0374601178
Other title:
  • Dark history of the information age, in 5 extraordinary hacks
Subject(s): Genre/Form:
Contents:
Introduction: The Brilliant Project -- The great worm -- How the tortoise hacked Achilles -- The Bulgarian virus factory -- The father of dragons -- Winner take all -- Snoop Dogg does his laundry -- How to mudge -- Kill chain -- The Minecraft wars -- Attack of the killer toasters -- Conclusion: The death of solutionism -- Epilogue.
Summary: "A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"-- Provided by publisher.Summary: It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian "Dark Avenger," who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode Item holds
Adult Book Adult Book Dr. James Carlson Library NonFiction 364.168 S529 Available 33111011066145
Adult Book Adult Book Main Library NonFiction 364.168 S529 Available 33111011289051
Adult Book Adult Book Northport Library NonFiction 364.168 S529 Available 33111009477122
Total holds: 0

Enhanced descriptions from Syndetics:

"Unsettling, absolutely riveting, and--for better or worse--necessary reading." --Brian Christian, author of Algorithms to Live By and The Alignment Problem

An entertaining account of the philosophy and technology of hacking--and why we all need to understand it.

It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing , Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian "Dark Avenger," who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to take control of a US election, and others.

In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of G ö del, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.

Includes black-and-white images

Includes bibliographical references (pages 331-402) and index.

Introduction: The Brilliant Project -- The great worm -- How the tortoise hacked Achilles -- The Bulgarian virus factory -- The father of dragons -- Winner take all -- Snoop Dogg does his laundry -- How to mudge -- Kill chain -- The Minecraft wars -- Attack of the killer toasters -- Conclusion: The death of solutionism -- Epilogue.

"A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"-- Provided by publisher.

It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian "Dark Avenger," who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.

Powered by Koha