Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Series page Title page Copyright page FOREWORD INTRODUCTION
I.1 WHAT’S THE DARK SIDE?
Part 1: DARK SIDE ISSUES
CHAPTER 1 SUBVERSION
1.1 INTRODUCTORY CASE STUDIES AND ANECDOTES 1.2 THE SURVEY: IMPACT OF SUBVERSIVE STAKEHOLDERS ON SOFTWARE PROJECTS 1.3 SELECTED RESPONSES 1.4 A FOLLOW-UP TO THE SURVEY: SOME HYPOTHESES AND RELATED SURVEY FINDINGS
CHAPTER 2 LYING
2.1 INTRODUCTORY CASE STUDIES AND ANECDOTES 2.2 INCIDENTS OF LYING: THE SURVEY 2.3 QUALITATIVE SURVEY RESPONSES ON LYING 2.4 WHAT CAN BE DONE ABOUT LYING? 2.5 THE QUESTIONNAIRE USED IN THE SURVEY
CHAPTER 3 HACKING
3.1 CASE STUDIES OF ATTACKS AND BIOGRAPHIES OF HACKERS 3.2 CYBER TERRORISM AND GOVERNMENT-SPONSORED HACKING 3.3 THE HACKER SUBCULTURE 3.4 HOW A HACKER IS IDENTIFIED 3.5 TIME LINE OF A TYPICAL MALWARE ATTACK 3.6 HACKER ECONOMY: HOW DOES A HACKER MAKE MONEY? 3.7 SOCIAL ENGINEERING 3.8 A LINGERING QUESTION 3.9 LATE-BREAKING NEWS
CHAPTER 4 THEFT OF INFORMATION
4.1 INTRODUCTION 4.2 CASE STUDIES 4.3 HOW DO THE VICTIMS FIND OUT THAT THEIR SECRETS ARE STOLEN? 4.4 INTELLECTUAL PROPERTY PROTECTION 4.5 OPEN VERSUS CLOSED SOURCE
CHAPTER 5 ESPIONAGE
5.1 INTRODUCTION 5.2 WHAT IS ESPIONAGE? 5.3 CASE STUDIES 5.4 CYBER WARFARE
CHAPTER 6 DISGRUNTLED EMPLOYEES AND SABOTAGE
6.1 INTRODUCTION AND BACKGROUND 6.2 DISGRUNTLED EMPLOYEE DATA ISSUES 6.3 DISGRUNTLED EMPLOYEE SOFTWARE ISSUES 6.4 DISGRUNTLED EMPLOYEE SYSTEM ISSUES 6.5 WHAT TO DO ABOUT DISGRUNTLED EMPLOYEE ACTS 6.6 SABOTAGE
CHAPTER 7 WHISTLE-BLOWING
7.1 A HYPOTHETICAL SCENARIO 7.2 WHISTLE-BLOWING AND SOFTWARE ENGINEERING 7.3 MORE CASE STUDIES AND ANECDOTES Appendix to Chapter 7 PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING
Part 2: VIEWPOINTS ON DARK SIDE ISSUES
CHAPTER 8 OPINIONS, PREDICTIONS, AND BELIEFS 8.1 AUTOMATED CRIME 8.2 LET’S PLAY MAKE BELIEVE 8.3 DARK, LIGHT, OR JUST ANOTHER SHADE OF GREY? 8.4 RATIONAL SOFTWARE DEVELOPERS AS PATHOLOGICAL CODE HACKERS CHAPTER 9 PERSONAL ANECDOTES 9.1 AN OFFICER AND A GENTLEMAN CONFRONTS THE DARK SIDE 9.2 LESS CARROT AND MORE STICK 9.3 “THEM AND US”: DISPATCHES FROM THE VIRTUAL SOFTWARE TEAM TRENCHES 9.4 WHAT IS IT TO LIE ON A SOFTWARE PROJECT? 9.5 “MERCILESS CONTROL INSTRUMENT” AND THE MYSTERIOUS MISSING FAX 9.6 FOREST OF ARDEN 9.7 HARD-HEADED HARDWARE HIT MAN 9.8 A LIGHTHEARTED ANECDOTE
CONCLUSIONS Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion