Profiling Hackers

Author:   Raoul Chiesa ,  Stefania Ducci ,  Silvio Ciappi
Publisher:   Taylor & Francis Ltd
ISBN:  

9781420086935


Pages:   279
Publication Date:   26 November 2008
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $137.15 Quantity:  
Add to Cart

Share |

Profiling Hackers


Add your own review!

Overview

Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art. Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators. The authors reveal hidden aspects of the cyber-crime underground, answering questions such as: Who is a real hacker? What life does a hacker lead when not on-line? Is it possible to determine a hacker’s profile on the basis of his behavior or types of intrusion? What is the motive behind phishing, pharming, viruses, and worms? After gaining notoriety for breaking into many high-profile computer systems, the Italian hacker Raoul Chiesa turned to ethical hacking in 1995. Today he uses his skills and abilities to find ways to protect networks and computer systems. Stefania Ducci is a member of the Counter Human Trafficking and Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). Silvio Ciappi is a criminologist who lectures at the University of Pisa and studies criminal profiling. These three experts with vastly different backgrounds explore the clandestine network of cyber-criminals, providing an unparalleled glimpse into the secret lives of these malevolent individuals.

Full Product Details

Author:   Raoul Chiesa ,  Stefania Ducci ,  Silvio Ciappi
Publisher:   Taylor & Francis Ltd
Imprint:   Auerbach
Dimensions:   Width: 15.60cm , Height: 1.80cm , Length: 23.40cm
Weight:   0.408kg
ISBN:  

9781420086935


ISBN 10:   1420086936
Pages:   279
Publication Date:   26 November 2008
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

"Introduction to Criminal Profiling Brief History of Criminal Profiling Serial Crimes and Criminal Profiling: How to Interpret Them Criminal Profiling: Applying it to Study Hackers Introducing ""Cybercrime"" Information Technology and Digital Crimes 1980, 1990, 2000: Three Ways of Looking at Cybercrime Mr. Smith, Hackers and Digital Crimes in the IT Society Digital Crimes vs. Hacking: Terminology and Definitions Conclusions To Be, Think, and Live as a Hacker Evolution of the Term The Artifacts of the Hacker Culture One Ethics or More? Understanding Hackers: How Far Have We Gone? What are the Motives Behind Hacking? The Colours of the Underground Commonly Recognized Hacker Categories The HPP Project The Planning Phase The Questionnaires First Level Analysis Second Level Analysis Who are Hackers? Part 1 What are We Trying to Understand? Gender and Age Group Background and Place of Residence How Hackers View Themselves Family Background Socio-Economic Background Social Relationships Leisure Activities Education Professional Environment Psychological Traits To Be or to Appear: the Level of Self-Esteem Presence of Multiple Personalities Psychophysical Conditions Alcohol & Drug Abuse and Dependencies Definition or Self-Definition: What is a Real Hacker? Relationship Data Who are Hackers? Part 2 Handle and Nickname Starting Age Learning and Training Modalities The Mentor's Role Technical Capacities (Know-How) Hacking, Phreaking or Carding: the Reasons Behind the Choice Networks, Technologies and Operating Systems Techniques Used to Penetrate a System Individual and Group Attacks The Art of War: Examples of Attack Techniques Operating Inside a Target System The Hacker’s Signature Relationships with the System Administrators Motivations The Power Trip Lone Hackers Hacker Groups Favourite Targets and Reasons Specializations Principles of the Hacker Ethics Acceptance or Refusal of the Hacker Ethics Crashed Systems Hacking/Phreaking Addiction Perception of the Illegality of Their Actions Offences Perpetrated with the Aid of IT Devices Offences Perpetrated without the Use of IT Devices Fear of Discovery, Arrest and Conviction The Law as Deterrent Effect of Convictions Leaving the Hacker Scene Beyond Hacking Conclusions Appendices"

Reviews

Author Information

Mediaservice.net, Italy United Nations Interregional Crime and Justice Research Institute, Turin, Italy University of Pisa, Italy

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List