Book description
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.
If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones.
- Understand the relationship between hacker culture and cybersecurity
- Get to know the ideas behind the hacker ethos, like "knowledge should be free"
- Explore topics and publications central to hacker culture, including 2600 Magazine
- Appreciate the history of cybersecurity
- Learn about key figures in the history of hacker culture
- Understand the difference between hackers and cybercriminals
Publisher resources
Table of contents
- Preface
-
1. A
- Abacus
- Abandonware
- Activision
- Adleman, Leonard
- Advanced persistent threat (APT)
- Agile methodology
- Airgapping
- Akihabara, Tokyo
- Alderson, Elliot
- Alphabet Inc.
- Amazon Web Services (AWS)
- AMD (Advanced Micro Devices)
- Amiga
- Android operating system
- Anonymous
- Apache/Apache License
- Apple
- ARM (Advanced RISC Machines)
- ARPAnet
- Artificial intelligence (AI)
- Assange, Julian
- Assembly
- Atari
- Atlus
- Augmented and virtual reality
- Autistic
- AWS
- Azure
- 2. B
-
3. C
- Calce, Michael “MafiaBoy”
- Cama, Amat
- Captain Crunch (John Draper)
- Capture the Flag
- Carnegie Mellon University
- Carr, Iris
- The Cathedral and the Bazaar (1999 book)
- Certificates (cryptography)
- Certificates (professional credentials)
- ChatGPT
- CIA (Central Intelligence Agency)
- CIA triad (confidentiality, integrity, availability)
- CISSP
- C languages
- Cleartext
- Closed source software
- Cloud
- Comic-Con
- Commodore
- Common Vulnerabilities and Exposures (CVE)
- Consumer Electronics Show (CES)
- Copyleft
- CPU (Central processing unit)
- Cray, Seymour
- Creative Commons licenses
- Crunch time
- Cryptocurrency
- Cryptography
- Cult of the Dead Cow (cDc)
- Cyberpunk
- Cybersecurity
-
4. D
- Dark.Fail
- Dark Web/darknet
- DARPA (Defense Advanced Research Projects Agency)
- Data
- Da Vinci, Leonardo
- Debian
- DEC (Digital Equipment Corporation)
- Deep Web
- DEF CON
- Demoscene
- Denial-of-service (DoS, DDoS) attacks
- Developers
- DevOps
- Diffie, Whitfield
- Diffie-Hellman key exchange
- Disk, disc
- DOOM (video game)
- DOS (Disk Operating System)
- Draper, John
- Dread forums
- DRM (Digital Rights Management)
- Dungeons & Dragons (game franchise)
- 5. E
- 6. F
- 7. G
-
8. H
- Hacker
- Hackers (1995 film)
- Hackers: Heroes of the Computer Revolution (2010 book)
- Hackers on Planet Earth (HOPE)
- Hacking Is Not a Crime
- Hack the Box
- Hacktivism
- Hak5
- Ham radio
- Hardware
- Hellman, Martin
- Hello World
- Hewlett-Packard (HP)
- Hexadecimal numbering
- Hidden Figures (2017 film)
- Homebrew Computer Club
- Hopper, Grace
- HTML (HyperText Markup Language)
- 9. I
- 10. J
- 11. K
- 12. L
-
13. M
- Macintosh
- macOS
- Malware
- Manning, Chelsea
- Massachusetts Institute of Technology (MIT)
- Meta
- Metasploit Framework
- Microcomputers
- Microsoft
- Minicomputers
- Mitnick, Kevin
- Miyamoto, Shigeru
- MMO (Massively Multiplayer Online) games
- Moore’s law
- Morse code
- Mr. Robot (TV show)
- MS-DOS (Microsoft Disk Operating System)
- Multics
- 14. N
- 15. O
- 16. P
- 17. Q
- 18. R
-
19. S
- Sakura, Futaba
- Salander, Lisbeth
- SCADA (Supervisory control and data acquisition)
- Schneier, Bruce
- Script kiddie
- Search engines
- Sega
- Semiconductors
- Shamir, Adi
- Shareware/freeware/abandonware
- Signal (messaging app)
- Silicon Valley
- Silk Road
- Smartphone
- Snowden, Edward
- Social media
- Spyware
- Stallman, Richard
- Stanford University
- Startups
- Steam
- Stuxnet
- Sun Microsystems
- Supercomputers
- Swartz, Aaron
- Syntax
-
20. T
- TCP/IP (Transmission Control Protocol/Internet Protocol)
- Tech Model Railroad Club
- Telephones
- Texas Instruments
- Thompson, Ken
- Threat actor
- Timesharing
- Tokyo Denki University
- Tor (The Onion Router)
- Torvalds, Linus
- Tramiel, Jack
- Transistor
- Tribe of Hackers
- Turing, Alan
- 2600 (Twenty-Six Hundred): The Hacker Quarterly (magazine)
- 21. U
- 22. V
- 23. W
- 24. X
- 25. Y
- 26. Z
- About the Author
Product information
- Title: Hacker Culture A to Z
- Author(s):
- Release date: November 2023
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098145675
You might also like
book
Hacking APIs
An Application Programming Interface (API) is a software connection that allows applications to communicate and share …
book
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …
book
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource …
book
Security in Computing, 6th Edition
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to …