Warehouse Stock Clearance Sale

Grab a bargain today!

The Hacker Diaries


Product Description
Product Details

Table of Contents

1: "Genocide": From Columbine to Hacking 2: Rebels: Joe Magee and "Noid" 3: The Hunt for Mafiaboy: Operation Claymore 4: A Tale of Two Script Kiddies: Pr0metheus and Explotion 5: World of Hell 6: Cyberchic: Starla Pureheart 7: Unlikely White Hat: Willie Gonzalez 8: Tinker, Teenager, Hacker, Spy: The H.D. Moore Story Afterword A: Two Decades of Teenage Hacking B: Making Headlines Over the Years C: Hacking on the Web

About the Author

Dan Verton (Burke, VA) is a senior writer at Computerworld, specializing in Internet security, national security, critical infrastructure protection, and corporate information security policies. He has written hundreds of news stories, profiles of government and industry leaders, and feature-length stories related to Internet security, defense, and intelligence matters. He is also the former Associate Editor, Defense, for the trade publication Federal Computer Week. Other publication credits include stories on information warfare and corporate espionage for Business2.0, various Internet security news stories for Information Security Magazine, CNN.com, The Industry Standard, InfoWorld, and PC World.Dan has been asked to speak at various Internet security conferences, including a recent event at the United Nations in New York, where he moderated an expert panel on security issues.Dan is a former intelligence officer in the U.S. Marine Corps. While in the military, he served as an information systems security officer and training officer for various CIA and DIA database systems. Dan is also a former imagery intelligence analyst with the U.S. Army Reserve.


"Terrorists are strategic actors. They choose their targets deliberately based on the weakness they observe in our defenses and our preparedness. We must defend ourselves against a wide range of means and methods of attack. Terrorists continue to employ conventional means of attack, while at the same time gaining in expertise in less traditional means, such as cyber attacks."

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 8% commission by selling The Hacker Diaries on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond.com, Inc.
Back to top