Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
OK
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking 1st Edition
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art.
Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators. The authors reveal hidden aspects of the cyber-crime underground, answering questions such as: Who is a real hacker? What life does a hacker lead when not on-line? Is it possible to determine a hacker’s profile on the basis of his behavior or types of intrusion? What is the motive behind phishing, pharming, viruses, and worms?
After gaining notoriety for breaking into many high-profile computer systems, the Italian hacker Raoul Chiesa turned to ethical hacking in 1995. Today he uses his skills and abilities to find ways to protect networks and computer systems. Stefania Ducci is a member of the Counter Human Trafficking and Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). Silvio Ciappi is a criminologist who lectures at the University of Pisa and studies criminal profiling. These three experts with vastly different backgrounds explore the clandestine network of cyber-criminals, providing an unparalleled glimpse into the secret lives of these malevolent individuals.
- ISBN-101420086936
- ISBN-13978-1420086935
- Edition1st
- PublisherAuerbach Publications
- Publication dateDecember 11, 2008
- LanguageEnglish
- Dimensions6 x 0.75 x 9 inches
- Print length279 pages
Books with Buzz
Discover the latest buzz-worthy books, from mysteries and romance to humor and nonfiction. Explore more
Product details
- Publisher : Auerbach Publications; 1st edition (December 11, 2008)
- Language : English
- Paperback : 279 pages
- ISBN-10 : 1420086936
- ISBN-13 : 978-1420086935
- Item Weight : 14.4 ounces
- Dimensions : 6 x 0.75 x 9 inches
- Best Sellers Rank: #8,507,599 in Books (See Top 100 in Books)
- #3,563 in Forensic Science Law
- #4,374 in Computer Hacking
- #6,335 in Information Management (Books)
- Customer Reviews:
About the author
Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
This book discusses a taxonomy for profiling intrusion actors. Historically, the psychological profiling of criminals was adapted for cybercrime. Psychological profiling is not well suited to theoretical concepts since it is a practical application of psychology and cannot encompass the entire range of human functioning. For instance, Costa and McCrae's Five Factor Theory includes numerous factors tethered to personality and properties reliant on it, however, certain aspects of criminal behavior such as modus operandi are excluded. Such limitations in differing approaches exacerbate the schism that exists in profiling cybercriminals.
This book relies on the research conducted during the Hacker's Profiling Project (HPP) (which is still ongoing) that seeks to add other dimension(s) to profiling. Promoters of the HPP assert that further exploration is needed in profiling actors since such an undertaking is more multifaceted than previous models reveal. Rather than use a taxonomy that segregates actors by skills, knowledge, and motive, HPP adds both deductive methods (crime "scene" observations) and inductive methods (compiling data from biographical, questionnaires) as well as interviews of both former and current actors.
I recommend this book to anyone who is seeking to learn more about the hurdles in profiling cyberspace intrusion actors.
The principal reason for this review is so others won't buy the kindle book thinking it has updated material from the 2009 paperback version. I bought the Kindle book thinking they updated it, but it seems to be the same 2009 version I already have. This book contains a lot of information derived from hackers, honey-pot networks, and profiling techniques to understand hackers. Despite being 11 years old, it still contains relevant information about a variety of hacker related topics. All traces from the HPP project have dried up on the Internet except for what is in the Internet archive; I hoped this kindle book contained updated material. If someone has additional information please update it here.