...C O D E C ODE v e r s i o n 2 . 0 L A W R E N C E L E S S I G A Member of the Perseus Books Group New York Copyright © 2006 by Lawrence Lessig CC Attribution-ShareAlike Published by Basic Books A Member of the Perseus Books Group Printed in the United States of America. For information, address Basic Books, 387 Park Avenue South, New York, NY 10016–8810. Books published by Basic Books are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate...
Words: 190498 - Pages: 762
...THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak Scanned by kineticstomp, revised and enlarged by swift For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources...
Words: 125733 - Pages: 503
...e eBook Collection This is a Protected PDF document. Please enter your user name and password to unlock the text. User Name: Password: Unlock Remember my user name and password. If you are experiencing problems unlocking this document or you have questions regarding Protectedpdf files please contact a Technical Support representative: In the United States: 1-877-832-4867 In Canada: 1-800-859-3682 Outside the U.S. and Canada: 1-602-387-2222 Email: technicalsupport@apollogrp.edu. This document is published by:Apollo Group, Inc. ISBN 1-256-49231-0 joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka jokaGlossary joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka joka ...
Words: 153006 - Pages: 613