Books, Workbooks and Study Guides
How the Hacker Stole ChristmasAuthored by Pete Herzog
Illustrated by Ayla Madison Herzog Barceló, Carmen Sullo
Producer Marta Barceló Jordan
For Children Everywhere
who aren’t staring at a screen.
That's how this book begins. It's a playful, funny parody of the Christmas classic with a modern setting, a modern theme, and a modern villain.
The Hacker hated the holidays! The whole holiday break!
Her reasons lacked specifics but she found it incredibly fake.
It could be blamed on teenage hormonal change,
Or a not fully developed emotional range.
But I think that the most likely reason of all
May have been, due to teasing, she’d put up a wall.
In this story a sad, angry teen lashes out against her classmates on Christmas break because she's sick of how they act and how they treat her. She's sick of them staring at their phone screens, bullying her, taking selfies, their addiction to likes and everything that's wrong around the social use of technology today. So she does something about it.
Watch how the traditional themes of Christmas explode apart in this funny, touching, technologically correct (we get the hacking bits right), and a little too realistic story of Christmas.
So what happens when this hacker takes out electronic distractions on Christmas Eve? What happens when the teens can't post pictures of their presents on Christmas day? Does the town get together and learn the meaning of Christmas? Or did the hacker steal that too?
This story has been created by the team behind Hacker Highschool, a non-profit initiative to use hacking as a learning methodology to engage teens, improve cybersafety awareness, and train the next generation of cybersecurity professionals. In this project we see teens freely using technology that they have no understanding of the risks consequences. So this story was written as a fun and informative way to bring attention to the drowning effect of technology in the hands of kids today and how nobody is teaching them to swim.
The book has been co-illustrated by Carmen Sullo, an ontological leadership coach with a special interest in all things art and family, and the (then) 13-year-old Ayla Madison of Youtube and Instagram's Happy Mopey which gives it that authentic teenage feel.
This book is fun for everyone and it has many learning points about hacking, technology, society, and self esteem.
- Publication Date: Dec 20 2016
- ISBN/EAN13: 0978520793 / 9780978520793
- Page Count: 58
- Binding Type: US Trade Paper
- Trim Size: 6.14" x 9.21"
- Language: English
- Color: Full Color
- Related Categories: Humor / Form / Parodies
The Network Security Essentials by Pete Herzog, Marta Barceló Jordan & Bob Monroe
Study Guide & Workbook - Volume 1 - Second Edition
Young people today are expected to use technology safely but don't have the knowledge or skills to really do that. This compact guide is the first step to giving them the cybersecurity awareness and know-how they really need.
Learn and reinforce essential security skills quickly with this straight-forward guide designed to speed learning and information retention. With clear explanations, stories, and interesting exercises from hacking to security analysis you will quickly grasp and use important security techniques.
As a textbook, workbook, and study guide for both directed and self-learning, this is the ultimate textbook for cybersecurity awareness and skill-building designed for all high school and college students. More than just cybersecurity, each chapter contains lessons to strengthen resourcefulness, creativity, and empathy in the student. Ideal for any classroom or home-schooling.
It is based on the open source Hacker Highschool project and expanded to provide for a wide range of technology skill levels. The guide uses research from the Open Source Security Testing Methodology (OSSTMM) to assure this is the newest security research and concepts.
- Publication Date: Jan 20 2017
ISBN/EAN13: 0978520718 / 9780978520717
Page Count: 142 Trim Size: 8.5" x 11"
Color: Black and White
Hacking Exposed Linux, 3rd Edition
The Latest Linux Security Solutions
This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.
- Secure Linux by using attacks and countermeasures from the latest OSSTMM research
- Follow attack techniques of PSTN, ISDN, and PSDN over Linux
- Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
- Block Linux signal jamming, cloning, and eavesdropping attacks
- Apply Trusted Computing and cryptography tools for your best defense
- Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
- Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
- Find and repair errors in C code with static analysis and Hoare Logic