Listing 1 - 3 of 3 |
Sort by
|
Choose an application
In Respawn Colin Milburn examines the connections between video games, hacking, and science fiction that galvanize technological activism and technological communities. Discussing a wide range of games, from Portal and Final Fantasy VII to Super Mario Sunshine and Shadow of the Colossus, Milburn illustrates how they impact the lives of gamers and non-gamers alike. They also serve as resources for critique, resistance, and insurgency, offering a space for players and hacktivist groups such as Anonymous to challenge obstinate systems and experiment with alternative futures. Providing an essential walkthrough guide to our digital culture and its high-tech controversies, Milburn shows how games and playable media spawn new modes of engagement in a computerized world.
Video games. --- Hackers. --- Technology --- Social aspects. --- Computer hackers --- Computer programmers --- Computer users --- Television games --- Videogames --- Electronic games --- Computer games --- Internet games --- Games --- video games --- hacking --- science fiction
Choose an application
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon
Computer hackers. --- Computer networks --- Computer security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer hackers --- Computer programmers --- Computer users --- Protection --- Security measures
Choose an application
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
Computer crimes -- Prevention. --- Cyber intelligence (Computer security). --- Cyberspace -- Security measures,. --- Hackers. --- Professions -- Supply and demand. --- Computer crimes --- Cyber intelligence (Computer security) --- Cyberspace --- Professions --- Hackers --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Prevention --- Security measures, --- Supply and demand --- Prevention. --- Security measures. --- Supply and demand. --- Computer security. --- Computer hackers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer programmers --- Computer users --- Data protection --- Security systems --- Hacking --- Space and time --- Telematics --- E-books --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security
Listing 1 - 3 of 3 |
Sort by
|