Hacking the Academy

Hacking the Academy
Author: Daniel J. Cohen
Publisher: University of Michigan Press
Total Pages: 177
Release: 2013-05-13
Genre: Social Science
ISBN: 0472029479

On May 21, 2010, Daniel J. Cohen and Tom Scheinfeldt posted the following provocative questions online: “Can an algorithm edit a journal? Can a library exist without books? Can students build and manage their own learning management platforms? Can a conference be held without a program? Can Twitter replace a scholarly society?” As recently as the mid-2000s, questions like these would have been unthinkable. But today serious scholars are asking whether the institutions of the academy as they have existed for decades, even centuries, aren’t becoming obsolete. Every aspect of scholarly infrastructure is being questioned, and even more importantly, being hacked. Sympathetic scholars of traditionally disparate disciplines are canceling their association memberships and building their own networks on Facebook and Twitter. Journals are being compiled automatically from self-published blog posts. Newly minted PhDs are forgoing the tenure track for alternative academic careers that blur the lines between research, teaching, and service. Graduate students are looking beyond the categories of the traditional CV and building expansive professional identities and popular followings through social media. Educational technologists are “punking” established technology vendors by rolling out their own open source infrastructure. Here, in Hacking the Academy, Daniel J. Cohen and Tom Scheinfeldt have gathered a sampling of the answers to their initial questions from scores of engaged academics who care deeply about higher education. These are the responses from a wide array of scholars, presenting their thoughts and approaches with a vibrant intensity, as they explore and contribute to ongoing efforts to rebuild scholarly infrastructure for a new millennium.

Hack Attack!

Hack Attack!
Author: Kirsty Holmes
Publisher: Code Academy
Total Pages: 0
Release: 2019
Genre: Juvenile Nonfiction
ISBN: 9780778763307

When their robot classmate, Ro-Bud, gets a computer virus, the Code Academy gang is determined to help her. Along the way, they learn what a virus is, and how "hackers" break into computers to steal information or cause damage. This easy-to-follow book simplifies computer concepts to help readers learn why it's important to keep passwords secret to protect computers.

Hands on Hacking

Hands on Hacking
Author: Matthew Hickey
Publisher: John Wiley & Sons
Total Pages: 608
Release: 2020-09-16
Genre: Computers
ISBN: 1119561450

A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you’ll look for flaws and their known exploits—including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.

Alice and Bob Learn Application Security

Alice and Bob Learn Application Security
Author: Tanya Janca
Publisher: John Wiley & Sons
Total Pages: 288
Release: 2020-11-10
Genre: Computers
ISBN: 1119687357

Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.

Raven

Raven
Author: Sue Loh
Publisher:
Total Pages:
Release: 2020-05-05
Genre:
ISBN: 9780578579467

How do you fix a computer glitch that disappears before you get a good look at it? How do you negotiate with a hacker who doesn't seem to want anything?Colorful sixteen-year-old Fireball and her elite team of classmates from Cinzento Secure's corporate academy must do exactly that. They're investigating a hack at a prestigious bank, and the bizarre network issues they've observed are turning out to be something stranger than Team Raven has ever encountered.That Something grows more serious by the minute, reaching tendrils outside the bank and into critical infrastructure. As the team races to keep the hack from costing lives, a new question is added to the mix: why is someone stalking their newest team member?

Hack Music Theory, Part 1

Hack Music Theory, Part 1
Author: Ray Harmony
Publisher: eBook Partnership
Total Pages: 113
Release: 2016-06-24
Genre: Chords (Music)
ISBN: 1988410029

Theory is a six-letter dirty word to most musicians, but hey, musicians love dirty words, right? And just like all the other dirty words, theory is easy to learn and fun to use! After studying 'popular' and 'classical' music theory, Ray Harmony created a unique approach that he uses to compose his songs, which feature multi-platinum Grammy winners Serj Tankian (System of a Down), Tom Morello (Rage Against the Machine), and many more. Ray Harmony is an award-winning music lecturer and multi-instrumentalist, who is now sharing his top-secret music theory and songwriting hacks through this book series. Drawing on his two decades of teaching experience combined with his minimalist methods of explaining, Ray breaks down music theory into its simplest form via a series of simple hacks, deep insights, and bad jokes. Tuck in at HackMusicTheory.com"e;The most brilliant, fast, easy, and fun music theory book I've ever seen!"e; -DEREK SIVERS, CD Baby founder, TED speaker, musician, author of Anything You Want"e;This is the kind of book I wish I had when I first started out."e; -IHSAHN, Emperor"e;Trust Ray, and in no time you'll have a watertight music theory skillset you once thought impossible to obtain."e; -PAT LUNDY, Modestep, ex-Funeral for a Friend"e;Ray manages to make learning music theory fascinating, digestible, and damn right cool!"e; -JOE COPCUTT, AxeWound, Zoax"e;If you have been put off music theory in the past, then this is the book to inspire and empower you."e; -VICTORIA WILLIAMSON, PhD, Vice Chancellor's Fellow Researcher and Lecturer in Music at the University of Sheffield, UK, author of You Are the Music"e;Ray has a totally unique approach of hacking music theory, which gives you the essentials in a fraction of the time."e; -VESPERS, Warp Academy founder, music producer

What Would Google Do?

What Would Google Do?
Author: Jeff Jarvis
Publisher: Harper Collins
Total Pages: 290
Release: 2011-09-20
Genre: Business & Economics
ISBN: 0061709697

In a book that’s one part prophecy, one part thought experiment, one part manifesto, and one part survival manual, internet impresario and blogging pioneer Jeff Jarvis reverse-engineers Google, the fastest-growing company in history, to discover forty clear and straightforward rules to manage and live by. At the same time, he illuminates the new worldview of the internet generation: how it challenges and destroys—but also opens up—vast new opportunities. His findings are counterintuitive, imaginative, practical, and above all visionary, giving readers a glimpse of how everyone and everything—from corporations to governments, nations to individuals—must evolve in the Google era. What Would Google Do? is an astonishing, mind-opening book that, in the end, is not about Google. It’s about you.

The War on Learning

The War on Learning
Author: Elizabeth Losh
Publisher: MIT Press
Total Pages: 315
Release: 2024-02-06
Genre: Education
ISBN: 0262551241

An examination of technology-based education initiatives—from MOOCs to virtual worlds—that argues against treating education as a product rather than a process. Behind the lectern stands the professor, deploying course management systems, online quizzes, wireless clickers, PowerPoint slides, podcasts, and plagiarism-detection software. In the seats are the students, armed with smartphones, laptops, tablets, music players, and social networking. Although these two forces seem poised to do battle with each other, they are really both taking part in a war on learning itself. In this book, Elizabeth Losh examines current efforts to “reform” higher education by applying technological solutions to problems in teaching and learning. She finds that many of these initiatives fail because they treat education as a product rather than a process. Highly touted schemes—video games for the classroom, for example, or the distribution of iPads—let students down because they promote consumption rather than intellectual development. Losh analyzes recent trends in postsecondary education and the rhetoric around them, often drawing on first-person accounts. In an effort to identify educational technologies that might actually work, she looks at strategies including MOOCs (massive open online courses), the gamification of subject matter, remix pedagogy, video lectures (from Randy Pausch to “the Baked Professor”), and educational virtual worlds. Finally, Losh outlines six basic principles of digital learning and describes several successful university-based initiatives. Her book will be essential reading for campus decision makers—and for anyone who cares about education and technology.

Hacking the Electorate

Hacking the Electorate
Author: Eitan Hersh
Publisher: Cambridge University Press
Total Pages: 273
Release: 2015-06-09
Genre: Political Science
ISBN: 1107102898

Hacking the Electorate focuses on the consequences of campaigns using microtargeting databases to mobilize voters in elections. Eitan Hersh shows that most of what campaigns know about voters comes from a core set of public records, and the content of public records varies from state to state. This variation accounts for differences in campaign strategies and voter coalitions across the nation.

Debates in the Digital Humanities

Debates in the Digital Humanities
Author: Matthew K. Gold
Publisher: U of Minnesota Press
Total Pages: 534
Release: 2012
Genre: Computers
ISBN: 0816677948

Leading figures in the digital humanities explore the field's rapid revolution