Bibliographic record and links to related information available from the Library of Congress catalog. Note: Electronic data is machine generated. May be incomplete or contain other coding.
Part I Hacker Basics 1 Chapter 1 Introduction: Fears About Hackers and Why This Book Was Written 3 Case 1: Kevin Mitnick 13 Chapter 2 Hackerdom History, Highlights, Facts, and Headline Makers 21 Case 2: Susan Thunder 35 Chapter 3 A Balanced View About Hackers: The Good Side 39 Case 3: Neil Barrett 50 Chapter 4 A Balanced View About Hackers: The Bad Side 55 Case 4: How to Break into Computers 75 Part II Hacker Study Findings and Related Topics 99 Chapter 5 The Demographic Profile of J. Random Hacker: What the Literature Says and What Our Study Found 101 Chapter 6 The Psychological Aspects of Hackers: What the Literature Says 115 Case 6. Carolyn P. Meinel 146 Chapter 7 The Psychological Aspects of Hackers: What Our Study Found 151 Case 7: Geeks vs. G-men 162 Chapter 8 The Social Characteristics of Hackers: What the Literature Says and What Our Study Found 165 Case 8: Life in Cyberspace 184 Chapter 9 The Black Hat Cyberterrorists: What the Literature Says 187 Case 9: Mohammed Atta and Ziad Zarrah 213 Chapter 10 The Black Hat Cyberstalkers: What the Literature Says and What Our Study Found 217 Case 10: Zyklon 232 Part III Remedies for Black Hat Hacking 239 Chapter 11 Social Controls on Hackers: Court Remedies and Legislation in North America and Britain 241 Case 11: Bernie S. 265 Chapter 12 The Ethics and Morality of Hackers: Are Present Remedies Working? 279