Why hackers win: power and disruption in the network society

When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Burkart, Patrick 1969- (VerfasserIn)
Beteiligte: McCourt, Tom 1958-
Medienart: Elektronisch Buch
Sprache:Englisch
Veröffentlicht: Berkeley University of California Press [2019]
In:Jahr: 2019
Online-Zugang: Volltext (lizenzpflichtig)
Verfügbarkeit prüfen: HBZ Gateway
Subito Bestelldienst: Jetzt bestellen.
Schlagwörter:
Parallele Ausgabe:Nicht-Elektronisch

MARC

LEADER 00000cam a22000002c 4500
001 1788841379
003 DE-627
005 20250106002800.0
007 cr uuu---uuuuu
008 220208s2019 xxu|||||o 00| ||eng c
020 |a 0520971655  |c electronic book  |9 0-520-97165-5 
020 |a 9780520971653  |c electronic book  |9 978-0-520-97165-3 
035 |a (DE-627)1788841379 
035 |a (DE-599)KEP048411000 
035 |a (EbpS)2265808 
035 |a (DE-627-1)048411000 
040 |a DE-627  |b eng  |c DE-627  |e rda 
041 |a eng 
044 |c XD-US 
050 0 |a QA76.9.A25 
082 0 |a 005.8 
084 |a 2,1  |2 ssgn 
084 |a SR 8500  |q SEPA  |2 rvk  |0 (DE-625)rvk/143366: 
084 |a 54.08  |2 bkl 
100 1 |8 1\p  |a Burkart, Patrick  |d 1969-  |e VerfasserIn  |0 (DE-588)143737325  |0 (DE-627)654329982  |0 (DE-576)338643451  |4 aut 
109 |a Burkart, Patrick 1969- 
245 1 0 |a Why hackers win  |b power and disruption in the network society  |c Patrick Burkart and Tom McCourt 
264 1 |a Berkeley  |b University of California Press  |c [2019] 
300 |a 1 Online-Ressource (xix, 197 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the ""trusted systems"" underlying our everyday use of technology 
650 0 |a Computer security  |x Law and legislation  |z United States 
650 0 |a Computer security  |x Law and legislation  |z European Union countries 
650 0 |a Hacking 
650 0 |a Computer security 
650 4 |a Computer security ; Law and legislation 
651 4 |a European Union Countries 
651 4 |a United States 
689 0 0 |d s  |0 (DE-588)4113821-1  |0 (DE-627)105826642  |0 (DE-576)209479604  |a Hacker  |2 gnd 
689 0 1 |d s  |0 (DE-588)4046514-7  |0 (DE-627)104152206  |0 (DE-576)209069945  |a Politik  |2 gnd 
689 0 |5 (DE-627) 
700 1 |8 2\p  |a McCourt, Tom  |d 1958-  |e VerfasserIn  |0 (DE-588)1020592559  |0 (DE-627)688361021  |0 (DE-576)361425651  |4 aut 
776 1 |z 0520300122 
776 1 |z 9780520300125 
776 1 |z 0520300130 
776 1 |z 9780520300132 
776 1 |z 9780520300125 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |a Burkart, Patrick, 1969 -   |t Why hackers win  |d Oakland, California : University of California Press, 2019  |h xix, 197 Seiten  |w (DE-627)1693630346  |z 9780520300125  |z 9780520300132  |k Non-Electronic 
787 0 8 |i Rezensiert in  |a Albanese, Jay S., 1953 -   |t [Rezension von: Burkart, Patrick, 1969-, Why hackers win]  |d 2024  |w (DE-627)1906276048 
856 4 0 |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2265808  |m X:EBSCO  |x Aggregator  |z lizenzpflichtig 
883 |8 1  |a cgwrk  |d 20241001  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 |8 2  |a cgwrk  |d 20241001  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
912 |a ZDB-4-EBA 
912 |a ZDB-4-NLEBK 
936 r v |a SR 8500  |b Gesellschaftliche Folgen der Informatik  |k Informatik  |k Allgemeines, Organisation, Ausbildung  |k Informatik in Wirtschaft und Gesellschaft  |k Gesellschaftliche Folgen der Informatik  |0 (DE-627)1271485230  |0 (DE-625)rvk/143366:  |0 (DE-576)201485230 
936 b k |a 54.08  |j Informatik in Beziehung zu Mensch und Gesellschaft  |q SEPA  |0 (DE-627)106418807 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4053108594 
LOK |0 003 DE-627 
LOK |0 004 1788841379 
LOK |0 005 20220208100751 
LOK |0 008 220208||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 092   |o n 
LOK |0 689   |a s  |a eBook-EBSCO-eBook-Academic-Collection 
LOK |0 852   |a DE-21 
LOK |0 852 1  |9 00 
LOK |0 85640  |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2265808  |z Zugriff für die Universität Tübingen 
LOK |0 912   |a ZDB-4-EBA 
LOK |0 935   |a ebok  |a lbok 
ORI |a SA-MARC-krimdoka001.raw