LEADER 03428nim a22005177i 4500001 16987381 005 20240214162315.0 006 m o h 007 sz zunnnnnuneu 007 cr nnannnuuuuu 008 240117s2024 xx nnnn o z n eng d 035 (OCoLC)on1417409069 040 ORMDA |beng |erda |epn |cORMDA |dOCLCO 020 9781663732552 |q(electronic audio bk.) 020 1663732558 |q(electronic audio bk.) 037 9781663732552 |bO'Reilly Media 050 4 TK5105.59 100 1 Crawley, Kim, |eauthor. |0http://id.loc.gov/authorities/names/no2023100299 245 10 Hacker culture A to Z : |ba fun guide to the people, ideas, and gadgets that made the tech world / |cKim Crawley 250 [First edition]. 264 1 [Place of publication not identified] : |bAscent Audio, |c2024. 300 1 online resource (1 sound file (11 hr., 18 min.)) 306 111800 336 spoken word |bspw |2rdacontent 337 computer |bc |2rdamedia 338 online resource |bcr |2rdacarrier 344 digital |2rdatr 347 audio file |2rdaft 506 Access restricted by licensing agreement. 511 0 Read by Jen Jayden. 520 "Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like ""knowledge should be free""; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminals.". 588 Online resource; title from title details screen (O'Reilly, viewed January 17, 2024). 590 Access is available to the Yale community. 650 0 Computer literacy. |0http://id.loc.gov/authorities/subjects/sh85029509 650 0 Computer science. |0http://id.loc.gov/authorities/subjects/sh89003285 655 7 Audiobooks. |2lcgft |0http://id.loc.gov/authorities/genreForms/gf2011026063 700 1 Jayden, Jen, |enarrator. 730 0 O'Reilly Safari. |gOCLC KB. 852 80 |byulint |hNone |zOnline resource 852 80 |zOnline resource 856 40 |yStreaming audio |uhttps://go.oreilly.com/yale-university/library/view/-/9781663732552/?ar 901 TK5105.59 902 Yale Internet Resource |bYale Internet Resource >> None|DELIM|16867659 905 online resource 907 2024-02-14T16:23:15.000Z 946 DO NOT EDIT. DO NOT EXPORT.