Ethical Hacking: The Personality and Impacts
Abstract
Keywords
Full Text:
PDFReferences
Charles C. Palmer IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001.
Mr. Sushant Mangasuli ISSN 2277-1956/V1N3-1446-1448 www.ijecse.org
Regina D. HartleyEthical Hacking: Rationale for a hacking methodological Ethical Hacking: Rationale for a hacking methodological approach to network security,East Carolina University
http://www.symantec.com/specprog/threatreport/entwhitepaper_symantec_internet_security_ Symantec Internet Security Threat Report, Trends for January 06–June 06, Volume X. Sep. 2006.
E. S. Raymond, The New Hacker's Dictionary, MIT Press, Cambridge, MA (1991).
The ®rst use of the term ªethical hackersº appears to have been in an interview with John Patrick of IBM by Gary An- thens that appeared in a June 1995 issue of Computer World
P. A. Karger and R. R. Schell, Multics Security Evaluation: Vulnerability Analysis, ESD-TR-74-193, Vol. II, Headquar- ters Electronic Systems Division, Hanscom Air Force Base
Ethical Hacking: Student courseware. Ec-Council. www.eccouncil.org
Laudon, K. C. (1995). Ethical concepts and information technology. Communicationsof the ACM, 38, 33-39
Carl Endorf, Eugene Schultz and Jim Mellander "Intrusion Detection and Prevention", pp 215, 2004.
Guang Yang Introduction to TCP/IP Network Attacksunlight@cs.iastate.edu, Department of Computer Science, Iowa State University Ames, IA 50011
Clay Wilson, 2008, Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division.
James M. (2007), Ten Ways Hackers Breach Security, Global Knowledge Instructor. 1-800-COURSES www.globalknowledge.com.
A. Durant, "The Enemy Within", BusinessXL, pp 48-51, 2007.
RD. Hartley, “Ethical Hacking: Teaching Students to Hack”, EastCarolina University, http://www.techspot.com/news/21942- universityoffers-ethical-hacking-course.html, , 2002.
T. Wulf, “Teaching ethics in undergraduate network”, Consortium forComputing Sciences in College, Vol 19 Issue 1, 2003.
Lin, Y. “The Institutionalisation of Hacking Practices”. In Ubiquity 4(4), 18-24 March 2003. http://www.acm.org/ubiquity/views/y_lin_1.html.
Adorno, T.W. “Culture Industry Reconsidered”. In J.M. Bernstein (ed.), The Culture Industry ( Routledge, 2001, London) pp. 98-106.
SA. Saleem, Ethical Hacking as a risk management technique, ACM New York, NY, USA, 2006.
N.B. Sukhai, “Hacking And Cybercrime”, AT&T, 2005.
Levy, Steven. Hacking: Heroes of the Computer Revolution. Garden City, N.Y.: Anchor/Doubleday, 1984..
Slatalla, Michelle. A Brief History of Hacking. Online. Discovery Communications, 28 Oct.2003. .
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.