Table of contents for The hacking of America : who's doing it, why, and how / Bernadette H. Schell, John L. Dodge, with Steve S. Moutsatsos.


Bibliographic record and links to related information available from the Library of Congress catalog. Note: Electronic data is machine generated. May be incomplete or contain other coding.


Counter




Part I        Hacker Basics                                   1

Chapter 1     Introduction: Fears About Hackers and Why This
              Book Was Written                                3
              Case 1: Kevin Mitnick                          13

Chapter 2     Hackerdom History, Highlights, Facts, and Headline
              Makers                                         21
              Case 2: Susan Thunder                          35

Chapter 3    A Balanced View About Hackers: The Good Side   39
              Case 3: Neil Barrett                           50

Chapter 4    A Balanced View About Hackers: The Bad Side    55
              Case 4: How to Break into Computers            75

Part II       Hacker Study Findings and Related Topics       99

Chapter 5     The Demographic Profile of J. Random Hacker: What
              the Literature Says and What Our Study Found  101



Chapter 6     The Psychological Aspects of Hackers: What the
               Literature Says                                115
               Case 6. Carolyn P. Meinel                      146

Chapter 7     The Psychological Aspects of Hackers: What Our
               Study Found                                    151
               Case 7: Geeks vs. G-men                        162

Chapter 8     The Social Characteristics of Hackers: What the
               Literature Says and What Our Study Found       165
               Case 8: Life in Cyberspace                     184

Chapter 9     The Black Hat Cyberterrorists: What the Literature
              Says                                           187
              Case 9: Mohammed Atta and Ziad Zarrah          213

Chapter 10    The Black Hat Cyberstalkers: What the Literature
              Says and What Our Study Found                  217
              Case 10: Zyklon                                232


Part III      Remedies for Black Hat Hacking                  239

Chapter 11    Social Controls on Hackers: Court Remedies and
              Legislation in North America and Britain       241
              Case 11: Bernie S.                             265

Chapter 12    The Ethics and Morality of Hackers: Are Present
              Remedies Working?                              279