000 | 05832cam a2200577 i 4500 | ||
---|---|---|---|
001 | 23260898 | ||
003 | BJBSDDR | ||
005 | 20250225155615.0 | ||
007 | ta | ||
008 | 230804s2023 nyu e b 001 0 eng d | ||
010 | _a 2023278604 | ||
015 |
_aGBC2M6745 _2bnb |
||
016 | 7 |
_a020842608 _2Uk |
|
020 | _a9780393866667 (hardcover) | ||
020 | _a0393866661 (hardcover) | ||
020 |
_z9780393866674 _q(electronic publication) |
||
035 | _a(OCoLC)on1356959814 | ||
040 |
_aUKMGB _beng _erda _cUKMGB _dLMJ _dYDX _dVIA _dDLC |
||
041 | _aeng | ||
042 | _alccopycat | ||
050 | 1 | 4 |
_aHV 6773 _bS359h 2023 |
082 | 0 | 0 | _a364.16/8 |
100 | 1 |
_aSchneier, Bruce, _d1963- _925474 |
|
245 | 1 | 2 |
_aA hacker's mind : _bhow the powerful bend society's rules, and how to bend them back / _cBruce Schneier. |
246 | 3 | 0 | _aHow the powerful bend society's rules, and how to bend them back |
250 | _aFirst edition. | ||
264 | 1 |
_aNew York, NY : _bW.W. Norton & Company, _c2023. |
|
300 |
_a284 pages ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 255-276) and index. | ||
505 | 0 | 0 |
_gIntroduction -- _gPart 1. _tHacking 101. What is hacking? -- _tHacking systems -- _tWhat is a system? -- _tThe hacking life cycle -- _tThe ubiquity of hacking -- _gPart 2. _tBasic hacks and defenses. ATM hacks -- _tCasino hacks -- _tAirline frequent-flier hacks -- _tSports hacks -- _tDefending against hacks -- _tMore subtle hacking defenses -- _tRemoving potential hacks in the design phase -- _tThe economics of defense -- _tResilience -- _gPart 3. _tHacking financial systems. Hacking heaven -- _tHacking banking -- _tHacking financial exchanges -- _tHacking computerized financial exchanges -- _tLuxury real estate -- _tSocietal hacks are often normalized -- _tHacking the market -- _t"Too big to fail" -- _tVenture capital and private equity -- _tHacking and wealth -- _gPart 4. _tHacking legal systems. Hacking laws -- _tLegal loopholes -- _tHacking bureaucracy -- _tHacking and power -- _tUndermining regulations -- _tJurisdictional interactions -- _tAdministrative burdens -- _tHacking common law -- _tHacking as evolution -- _gPart 5. _tHacking political systems. Hidden provisions in legislation -- _tMust-pass legislation -- _tDelegating and delaying legislation -- _tThe context of a hack -- _tHacking voting eligibility -- _tOther election hacks -- _tMoney in politics -- _tHacking to destruction -- _gPart 6. _tHacking cognitive systems. Cognitive hacks -- _tAttention and addiction -- _tPersuasion -- _tTrust and authority -- _tFear and risk -- _tDefending against cognitive hacks -- _tA hierarchy of hacking -- _gPart 7. _tHacking AI systems. Artificial intelligence and robotics -- _tHacking AI -- _tThe explainability problem -- _tHumanizing AI -- _tAI and robots hacking us -- _tComputers and AI are accelerating societal hacking -- _tWhen AIs become hackers -- _tReward hacking -- _tDefending against AI hackers -- _tA future of AI hackers -- _tGovernance systems for hacking -- _tConcluding thoughts. |
520 | _aIt's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world. | ||
520 |
_a"It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world. A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them 'loopholes.' We call exploits 'tax avoidance strategies.' And there is an entire industry of 'black hat' hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys. In A Hacker's Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else. Once you learn how to notice hacks, you'll start seeing them everywhere--and you'll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you. Unchecked, these hacks threaten to upend our financial markets, weaken our democracy, and even affect the way we think. And when artificial intelligence starts thinking like a hacker--at inhuman speed and scale--the results could be catastrophic. But for those who would don the "white hat," we can understand the hacking mindset and rebuild our economic, political, and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks, and realize a more equitable world." -- _cdescription from publisher's website. |
||
650 | 0 |
_aHacking _xSocial aspects. |
|
650 | 0 |
_aHacking _xPolitical aspects. |
|
650 | 0 |
_aHacking _xEconomic aspects. |
|
650 | 0 | _aHackers. | |
650 | 4 |
_aHackers (Informática) _91354 |
|
650 | 0 | _aArtificial intelligence. | |
650 | 4 |
_aInteligencia artificial _92016 |
|
650 | 4 |
_aDelitos por internet _940861 |
|
650 | 4 |
_aPiratería _xAspectos sociales _940862 |
|
650 | 4 |
_aPiratería (Derechos de autor) _933867 |
|
776 | 0 | 8 |
_iebook version : _z9780393866674 |
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBK |
||
946 | _idpf | ||
999 |
_c122835 _d122835 |