Hacking ebook unauthorizedaccess

381 59 0
Hacking ebook unauthorizedaccess

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

UNAUTHORIZED ACCESS ––––––––––––––––––––––––––––––––––––––––––––––––– The Crisis in Online Privacy and Security UNAUTHORIZED ACCESS ––––––––––––––––––––––––––––––––––––––––––––––––– The Crisis in Online Privacy and Security Robert H Sloan • Richard Warner CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2014 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S Government works Version Date: 20130208 International Standard Book Number-13: 978-1-4398-3014-7 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint Except as permitted under U.S Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers For permission to photocopy or use material electronically from this work, please access www.copyright com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400 CCC is a not-for-profit organization that provides licenses and registration for a variety of users For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents at a Glance Preface, xix Acknowledgments, xxi Authors, xxiii CHAPTER 1   ◾   Introduction 1 CHAPTER 2   ◾   An Explanation of the Internet, Computers, and Data Mining 13 CHAPTER 3   ◾   Norms and Markets 53 CHAPTER 4   ◾   Informational Privacy: The General Theory 75 CHAPTER 5   ◾   Informational Privacy: Norms and Value Optimality 95 CHAPTER 6   ◾   Software Vulnerabilities and the Low-Priced Software Norm 125 CHAPTER 7   ◾   Software Vulnerabilities: Creating Best Practices 157 CHAPTER 8   ◾   Computers and Networks: Attack and Defense 181 CHAPTER 9   ◾   Malware, Norms, and ISPs 221 v vi    ◾    Contents at a Glance CHAPTER 10   ◾   Malware: Creating a Best Practices Norm 251 CHAPTER 11   ◾   Tracking, Contracting, and Behavioral Advertising 273 CHAPTER 12   ◾   From One-Sided Chicken to Value Optimal Norms 303 Contents Preface, xix Acknowledgments, xxi Authors, xxiii CHAPTER 1   ◾   Introduction 1 INTRODUCTION 1 THE GOOD, THE BAD, AND THE IN BETWEEN 2 The Good The Bad The In Between MAKING TRADE-OFFS 4 VALUES 7 Profit-Motive-Driven Businesses POLITICS 9 TODAY AND TOMORROW: WEB 1.0, 2.0, 3.0 10 A LOOK AHEAD 11 NOTES AND REFERENCES 11 FURTHER READING 12 CHAPTER 2   ◾   An Explanation of the Internet, Computers, and Data Mining 13 INTRODUCTION 13 PRIMER ON THE INTERNET 13 History 15 vii viii    ◾    Contents Nature of the Internet: Packet-Switched Network 17 End-to-End Principle and the “Stupid” Network 19 A More Technical View 22 Horizontal View: One Home’s LAN to the Backbone 22 Vertical View: Internet Protocol Suite 24 Internet Layer 25 Transport Layer 26 Application Layer 28 How the Layers Work Together: Packet Encapsulation 28 Numerical Addresses to Names: DNS 30 Putting It All Together 30 PRIMER ON COMPUTERS 31 Basic Elements of a Computer 33 Operating Systems 38 PRIMER ON DATA, DATABASES, AND DATA MINING 40 Data and Their Representation 40 Databases 43 Information Extraction or Data Mining 43 NOTES AND REFERENCES 48 FURTHER READING 49 CHAPTER 3   ◾   Norms and Markets 53 INTRODUCTION 53 NORMS DEFINED 53 The Examples 53 The Definition 54 Why People Conform to Norms 54 Ought or Self-Interest? 55 How Do Norms Get Started? 55 COORDINATION NORMS 56 Examples 56 Definition of a Coordination Norm 58 ... to Buyers’ Preferences 314 Norms? Yes Value Optimal? Yes, but… 315 DOES FACEBOOK PLAY ONE-SIDED CHICKEN? 316 As Goes Facebook, So Goes Google? 317 DO-NOT-TRACK INITIATIVES 318 MORE “BUYER POWER”... Government works Version Date: 20130208 International Standard Book Number-13: 978-1-4398-3014-7 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources... IF WE FAIL TO CREATE NORMS 340 THE BIG DATA FUTURE 341 APPENDIX: A GAME THEORETIC ANALYSIS OF FACEBOOK’S PRIVACY SETTINGS 344 NOTES AND REFERENCES 349 FURTHER READING 352 Preface T his book grew

Ngày đăng: 05/11/2019, 21:35

Mục lục

  • Front Cover

  • Contents at a Glance

  • Contents

  • Preface

  • Acknowledgments

  • Authors

  • Chapter 1 - Introduction

  • Chapter 2 - An Explanation of the Internet, Computers, and Data Mining

  • Chapter 3 - Norms and Markets

  • Chapter 4 - Informational Privacy: The General Theory

  • Chapter 5 - Informational Privacy: Norms and Value Optimality

  • Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm

  • Chapter 7 - Software Vulnerabilities: Creating Best Practices

  • Chapter 8 - Computers and Networks: Attack and Defense

  • Chapter 9 - Malware, Norms, and ISPs

  • Chapter 10 - Malware: Creating a Best Practices Norm

  • Chapter 11 - Tracking, Contracting, and Behavioral Advertising

  • Chapter 12 - From One-Sided Chicken to Value Optimal Norms

  • Back Cover

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan