Catalog

Record Details

Catalog Search



Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks  Cover Image Book Book

Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks / Scott J. Shapiro.

Shapiro, Scott J., (author.).

Summary:

It's a signal paradox of our time that we live in an information society but do not understand how it works. What is we knew better? In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to show that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and culture. He tells the tales of notable perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian "Dark Avenger," who invented the first mutating computer-virus engine. We also meet the sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to influence a U.S., election, and others. In relating their stories, Shapiro exposes the hackers' tool kits and reveals that cybercriminals do not just abuse computer code, they also exploit the philosophical principles of computation: the very features that make computers possible also make hacking possible. He explains how our information society actually works, the ways in which our data is stored and manipulated, and why it is so vulnerable to exploitation. Both intellectual romp and dramatic true-crime narrative, Fancy Bear Goes Phishing exposes the secrets of the digital age. Here are hacking, espionage, war, and cybercrime as you've never read about them before. -- Provided by publisher.

Record details

  • ISBN: 9780374601171
  • ISBN: 0374601178
  • Physical Description: 420 pages : illustrations ; 24 cm
  • Edition: First edition.
  • Publisher: New York : Farrar, Straus and Giroux, 2023.

Content descriptions

Bibliography, etc. Note:
Includes bibliographical references and index (pages 407-420).
Formatted Contents Note:
The brilliant project -- The great worm -- How the tortoise hacked Achilles -- The Bulgarian virus factory -- The father of dragons -- Winner take all -- Snoop Dogg does his laundry -- How to mudge -- Kill chain -- The Minecraft wars -- Attack of the killer toasters -- The death of solutionism.
Subject: Hacking > Case studies.
Phishing > Case studies.
Internet > Security measures.
Genre: Case studies.
True crime stories.

Available copies

  • 7 of 8 copies available at Missouri Evergreen.
  • 1 of 1 copy available at Camden County Library. (Show)

Holds

  • 0 current holds with 8 total copies.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Camden County Library District - Camdenton 364.168 Shapiro (Text) 31320003924359 Adult Nonfiction Available -
Carthage Public Library 364.168 Sh2f (Text) 34MO2001817256 Adult Nonfiction Available -
Jefferson County Library-Arnold 364.168 SHAPIRO (Text) 30061100179460 Non-Fiction Available -
Jefferson County Library-Northwest 364.168 SHAPIRO (Text) 30051100179479 Non-Fiction Checked out 04/20/2024
Polk County Library-Bolivar 364.168 SHA (Text) 34531000323918 Non-Fiction Available -
Ray County Library 364.168 SHA (Text) 2910027081 Adult Non-Fiction Available -
Stone County-Blue Eye 364.168 SHA (Text) 31358001421077 Adult Nonfiction Available -
Stone County-Galena 364.168 SHA (Text) 31358001421085 Adult Nonfiction Available -


Additional Resources