CTRL+ALT+PWN : The Hacker's Playbook (And How to Beat It)

個数:
  • 予約

CTRL+ALT+PWN : The Hacker's Playbook (And How to Beat It)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 352 p.
  • 言語 ENG
  • 商品コード 9798887981604

Full Description

As the prevalence of AI continues to grow, more and more people are worried about their online safety. New scams seem to be popping up every day, packaged in creative and terrifying ways. Rather than resign yourself to an inevitable fate or remove yourself from the online world entirely, learn the tricks of the trade to avoid being just another pwned noob.

From celebrity actors to professional athletes and even social media CEOs, anyone can be a hacker's target. What matters most is catching someone unprotected and unawares and pwning them—hacker slang for completely and humiliatingly beating someone. Leaving them with the kind of digital defeat that has them scrambling to recover stolen data, reputation, or worse. But that doesn't have to be you.

CTRL+ALT+PWN: The Hacker's Playbook (And How to Beat It) exposes the secret weapons, sneaky tactics, and psychological tricks used by hackers today—and shows you how to stop them. Whether it's setting traps with a Wi-Fi Pineapple or using malicious QR codes to send victims to phishing sites, modern hacking isn't just about code—it's about manipulating people. And it's getting more dangerous with the rise of AI, deepfakes, and advanced social engineering.

From headline-making ransomware attacks to celebrity data leaks and scams that start with a single swipe on a dating app, CTRL+ALT+PWN walks you through real-world cases and gives you the tools to stay one step ahead. Because no one is off-limits. But with the right knowledge, you don't have to be the next victim.

Contents

Table of Contents

Introduction: The Art of the Pwn

Chapter 1: How Do I Reuse Thee? Let Me Count the Ways!

Chapter 2: Hacking Tools: Everything Everywhere All at Once

Chapter 3: Hacking Tools Are Dangerous.  So What Can We Do About It?

Chapter 4: Your Smartphone is a Productivity Godsend. It's Also a Dystopian Wasteland Hell-Bent on Pwning You

Chapter 5: Hackers Gonna Hack: The Making of a Cybercriminal

Chapter 6: The Nigerian Prince Who Was the King of Phishing

Chapter 7: Is Your CEO Asking for Money? It Might Be A Deepfake!

Chapter 8: Is "Ethical Deepfake" An Oxymoron?

Chapter 9: Deepfake Videos, Cognitive Bias, and the Chico Marx Factor

Chapter 10: The Pernicious Threat of the Liar's Dividend

Chapter 11: Deepfake Detectors and the Coming Age of Deepfake Supremacy

Chapter 12: Cybercriminals Want to Pwn You With Deepfakes. This is How You Stop Them.

Chapter 13: "I Love You, Baby. Now Send Me More Bitcoin."

Chapter 14: Oops, That Breach is on You: The Finger-Pointing Art of Corporate Blame-Shifting

Conclusion: Smashmouth Cybersecurity—Never Get Pwned Again With This One Weird Trick!

Acknowledgements

Endnotes

About the Author

Index

最近チェックした商品