Hacking ebook unauthorizedaccess

381 5 0
  • Loading ...
1/381 trang
Tải xuống

Thông tin tài liệu

Ngày đăng: 05/11/2019, 21:35

UNAUTHORIZED ACCESS ––––––––––––––––––––––––––––––––––––––––––––––––– The Crisis in Online Privacy and Security UNAUTHORIZED ACCESS ––––––––––––––––––––––––––––––––––––––––––––––––– The Crisis in Online Privacy and Security Robert H Sloan • Richard Warner CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2014 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S Government works Version Date: 20130208 International Standard Book Number-13: 978-1-4398-3014-7 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint Except as permitted under U.S Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers For permission to photocopy or use material electronically from this work, please access www.copyright com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400 CCC is a not-for-profit organization that provides licenses and registration for a variety of users For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents at a Glance Preface, xix Acknowledgments, xxi Authors, xxiii CHAPTER 1   ◾   Introduction1 CHAPTER 2   ◾   An Explanation of the Internet, Computers, and Data Mining 13 CHAPTER 3   ◾   Norms and Markets 53 CHAPTER 4   ◾   Informational Privacy: The General Theory 75 CHAPTER 5   ◾   Informational Privacy: Norms and Value Optimality95 CHAPTER 6   ◾   Software Vulnerabilities and the Low-Priced Software Norm 125 CHAPTER 7   ◾   Software Vulnerabilities: Creating Best Practices 157 CHAPTER 8   ◾   Computers and Networks: Attack and Defense 181 CHAPTER 9   ◾   Malware, Norms, and ISPs 221 v vi    ◾    Contents at a Glance CHAPTER 10   ◾   Malware: Creating a Best Practices Norm 251 CHAPTER 11   ◾   Tracking, Contracting, and Behavioral Advertising273 CHAPTER 12   ◾   From One-Sided Chicken to Value Optimal Norms303 Contents Preface, xix Acknowledgments, xxi Authors, xxiii CHAPTER 1   ◾   Introduction1 INTRODUCTION1 THE GOOD, THE BAD, AND THE IN BETWEEN2 The Good The Bad The In Between MAKING TRADE-OFFS4 VALUES7 Profit-Motive-Driven Businesses POLITICS9 TODAY AND TOMORROW: WEB 1.0, 2.0, 3.010 A LOOK AHEAD11 NOTES AND REFERENCES11 FURTHER READING12 CHAPTER 2   ◾   An Explanation of the Internet, Computers, and Data Mining 13 INTRODUCTION13 PRIMER ON THE INTERNET13 History15 vii viii    ◾    Contents Nature of the Internet: Packet-Switched Network 17 End-to-End Principle and the “Stupid” Network 19 A More Technical View 22 Horizontal View: One Home’s LAN to the Backbone22 Vertical View: Internet Protocol Suite24 Internet Layer 25 Transport Layer 26 Application Layer 28 How the Layers Work Together: Packet Encapsulation 28 Numerical Addresses to Names: DNS 30 Putting It All Together 30 PRIMER ON COMPUTERS31 Basic Elements of a Computer 33 Operating Systems 38 PRIMER ON DATA, DATABASES, AND DATA MINING40 Data and Their Representation 40 Databases43 Information Extraction or Data Mining 43 NOTES AND REFERENCES48 FURTHER READING49 CHAPTER 3   ◾   Norms and Markets 53 INTRODUCTION53 NORMS DEFINED53 The Examples 53 The Definition 54 Why People Conform to Norms 54 Ought or Self-Interest? 55 How Do Norms Get Started? 55 COORDINATION NORMS56 Examples56 Definition of a Coordination Norm 58 ... to Buyers’ Preferences 314 Norms? Yes Value Optimal? Yes, but… 315 DOES FACEBOOK PLAY ONE-SIDED CHICKEN?316 As Goes Facebook, So Goes Google? 317 DO-NOT-TRACK INITIATIVES318 MORE “BUYER POWER”... Government works Version Date: 20130208 International Standard Book Number-13: 978-1-4398-3014-7 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources... IF WE FAIL TO CREATE NORMS340 THE BIG DATA FUTURE341 APPENDIX: A GAME THEORETIC ANALYSIS OF FACEBOOK’S PRIVACY SETTINGS344 NOTES AND REFERENCES349 FURTHER READING352 Preface T his book grew
- Xem thêm -

Xem thêm: Hacking ebook unauthorizedaccess , Hacking ebook unauthorizedaccess

Gợi ý tài liệu liên quan cho bạn