Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
5,802 result(s) for "Hacking."
Sort by:
A hacker's mind : how the powerful bend society's rules, and how to bend them back
It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.
Hackathons and the Making of Entrepreneurial Citizenship
Today the halls of Technology, Entertainment, and Design (TED) and Davos reverberate with optimism that hacking, brainstorming, and crowdsourcing can transform citizenship, development, and education alike. This article examines these claims ethnographically and historically with an eye toward the kinds of social orders such practices produce. This article focuses on a hackathon, one emblematic site of social practice where techniques from information technology (IT) production become ways of remaking culture. Hackathons sometimes produce technologies, and they always, however, produce subjects. This article argues that the hackathon rehearses an entrepreneurial citizenship celebrated in transnational cultures that orient toward Silicon Valley for models of social change. Such optimistic, high-velocity practice aligns, in India, with middle-class politics that favor quick and forceful action with socially similar collaborators over the contestations of mass democracy or the slow construction of coalition across difference.
Hacking for dummies
\"Prevent Windows 10®, Linux®, and macOS® attacks; use the latest tools and techniques; develop a security testing plan\"--Cover.
The Societalization of Social Problems
This article develops a theory of “societalization,” demonstrating its plausibility through empirical analyses of church pedophilia, media phone-hacking, and the financial crisis. Although these strains were endemic for decades, they had failed to generate broad crises. Reactions were confined inside institutional boundaries and handled by intra-institutional elites according to the cultural logics of their particular spheres. The theory proposes that boundaries between spheres can be breached only if there is code switching. When strains become subject to the cultural logics of the civil sphere, widespread anguish emerges about social justice and concern for the future of democratic society. Once admired institutional elites come to be depicted as perpetrators, and the civil sphere becomes intrusive legally and organizationally, leading to repairs that aim for civil purification. Institutional elites soon engage in backlash efforts to resist reform, and a war of the spheres ensues. After developing this macro-institutional model, I conceptualize civil sphere agents, the journalists and legal investigators upon whose successful performances the actual unfolding of societalization depends. I also explore “limit conditions,” the structures that block societalization. I conclude by examining societalization, not in society but in social theory, contrasting the model with social constructionism, on the one hand, and broad traditions of macro-sociological theory, on the other.
Why hackers win : power and disruption in the network society
\"When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the 'trusted systems' underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking\"-- Provided by publisher.
Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
Health information systems (HISs) are continuously targeted by hackers, who aim to bring down critical health infrastructure. This study was motivated by recent attacks on health care organizations that have resulted in the compromise of sensitive data held in HISs. Existing research on cybersecurity in the health care domain places an imbalanced focus on protecting medical devices and data. There is a lack of a systematic way to investigate how attackers may breach an HIS and access health care records. This study aimed to provide new insights into HIS cybersecurity protection. We propose a systematic, novel, and optimized (artificial intelligence-based) ethical hacking method tailored specifically for HISs, and we compared it with the traditional unoptimized ethical hacking method. This allows researchers and practitioners to identify the points and attack pathways of possible penetration attacks on the HIS more efficiently. In this study, we propose a novel methodological approach to ethical hacking in HISs. We implemented ethical hacking using both optimized and unoptimized methods in an experimental setting. Specifically, we set up an HIS simulation environment by implementing the open-source electronic medical record (OpenEMR) system and followed the National Institute of Standards and Technology's ethical hacking framework to launch the attacks. In the experiment, we launched 50 rounds of attacks using both unoptimized and optimized ethical hacking methods. Ethical hacking was successfully conducted using both optimized and unoptimized methods. The results show that the optimized ethical hacking method outperforms the unoptimized method in terms of average time used, the average success rate of exploit, the number of exploits launched, and the number of successful exploits. We were able to identify the successful attack paths and exploits that are related to remote code execution, cross-site request forgery, improper authentication, vulnerability in the Oracle Business Intelligence Publisher, an elevation of privilege vulnerability (in MediaTek), and remote access backdoor (in the web graphical user interface for the Linux Virtual Server). This research demonstrates systematic ethical hacking against an HIS using optimized and unoptimized methods, together with a set of penetration testing tools to identify exploits and combining them to perform ethical hacking. The findings contribute to the HIS literature, ethical hacking methodology, and mainstream artificial intelligence-based ethical hacking methods because they address some key weaknesses of these research fields. These findings also have great significance for the health care sector, as OpenEMR is widely adopted by health care organizations. Our findings offer novel insights for the protection of HISs and allow researchers to conduct further research in the HIS cybersecurity domain.
The Iot hacker's handbook : a practical guide to hacking the Internet of things
Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely. What You'll Learn: Perform a threat model of a real-world IoT device and locate all possible attacker entry points -- Use reverse engineering of firmware binaries to identify security issues -- Analyze, assess, and identify security issues in exploited ARM and MIPS based binaries -- Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee.
Replicator degrees of freedom allow publication of misleading failures to replicate
In recent years, the field of psychology has begun to conduct replication tests on a large scale. Here, we show that “replicator degrees of freedom” make it far too easy to obtain and publish false-negative replication results, even while appearing to adhere to strict methodological standards. Specifically, using data from an ongoing debate, we show that commonly exercised flexibility at the experimental design and data analysis stages of replication testing can make it appear that a finding was not replicated when, in fact, it was. The debate that we focus on is representative, on key dimensions, of a large number of other replication tests in psychology that have been published in recent years, suggesting that the lessons of this analysis may be far reaching. The problems with current practice in replication science that we uncover here are particularly worrisome because they are not adequately addressed by the field’s standard remedies, including preregistration. Implications for how the field could develop more effective methodological standards for replication are discussed.
The Lazarus heist : from Hollywood to high finance : inside North Korea's global cyber war
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. They form one of the most effective criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets include central banks, cryptocurrency companies, film studios and even the British National Health Service. Geoff White examines how the North Korean regime has harnessed cutting-edge technology to launch a decade-long campaign of brazen and merciless raids on its richer, more powerful adversaries.
Fairness Hacking: The Malicious Practice of Shrouding Unfairness in Algorithms
Fairness in machine learning (ML) is an ever-growing field of research due to the manifold potential for harm from algorithmic discrimination. To prevent such harm, a large body of literature develops new approaches to quantify fairness. Here, we investigate how one can divert the quantification of fairness by describing a practice we call “fairness hacking” for the purpose of shrouding unfairness in algorithms. This impacts end-users who rely on learning algorithms, as well as the broader community interested in fair AI practices. We introduce two different categories of fairness hacking in reference to the established concept of p-hacking. The first category, intra-metric fairness hacking, describes the misuse of a particular metric by adding or removing sensitive attributes from the analysis. In this context, countermeasures that have been developed to prevent or reduce p-hacking can be applied to similarly prevent or reduce fairness hacking. The second category of fairness hacking is inter-metric fairness hacking. Inter-metric fairness hacking is the search for a specific fair metric with given attributes. We argue that countermeasures to prevent or reduce inter-metric fairness hacking are still in their infancy. Finally, we demonstrate both types of fairness hacking using real datasets. Our paper intends to serve as a guidance for discussions within the fair ML community to prevent or reduce the misuse of fairness metrics, and thus reduce overall harm from ML applications.