Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking 1st Edition
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
- Item Weight : 14.4 ounces
- Paperback : 279 pages
- ISBN-10 : 1420086936
- ISBN-13 : 978-1420086935
- Dimensions : 6 x 0.75 x 9 inches
- Publisher : Auerbach Publications; 1st edition (December 11, 2008)
- Language: : English
- Best Sellers Rank: #1,079,165 in Books (See Top 100 in Books)
- Customer Reviews:
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The principal reason for this review is so others won't buy the kindle book thinking it has updated material from the 2009 paperback version. I bought the Kindle book thinking they updated it, but it seems to be the same 2009 version I already have. This book contains a lot of information derived from hackers, honey-pot networks, and profiling techniques to understand hackers. Despite being 11 years old, it still contains relevant information about a variety of hacker related topics. All traces from the HPP project have dried up on the Internet except for what is in the Internet archive; I hoped this kindle book contained updated material. If someone has additional information please update it here.
This book discusses a taxonomy for profiling intrusion actors. Historically, the psychological profiling of criminals was adapted for cybercrime. Psychological profiling is not well suited to theoretical concepts since it is a practical application of psychology and cannot encompass the entire range of human functioning. For instance, Costa and McCrae's Five Factor Theory includes numerous factors tethered to personality and properties reliant on it, however, certain aspects of criminal behavior such as modus operandi are excluded. Such limitations in differing approaches exacerbate the schism that exists in profiling cybercriminals.
This book relies on the research conducted during the Hacker's Profiling Project (HPP) (which is still ongoing) that seeks to add other dimension(s) to profiling. Promoters of the HPP assert that further exploration is needed in profiling actors since such an undertaking is more multifaceted than previous models reveal. Rather than use a taxonomy that segregates actors by skills, knowledge, and motive, HPP adds both deductive methods (crime "scene" observations) and inductive methods (compiling data from biographical, questionnaires) as well as interviews of both former and current actors.
I recommend this book to anyone who is seeking to learn more about the hurdles in profiling cyberspace intrusion actors.
some good articles are:
If you want a good book about hackers Paul Graham's book "Hackers and Painters" is a great read.