Human Hacked My Life and Lessons As the World's First Augmented Ethical Hacker
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, NJ :
John Wiley & Sons, Inc
[2025]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009853631206719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents at a Glance
- Contents
- Introduction
- What to Expect
- Chapter 1 The Human Years
- The Odyssey 2
- The Commodore 64
- Newb Before It Was a Thing
- Windows into the Corporate World
- A Hacker Is Born
- A Life Divided
- Flesh Is Stronger Than Steel
- Chapter 2 A Change in Direction
- Into the Light
- Road Warrior
- Chapter 3 Symbiotic Attack Vector
- Tap-to-Pwn
- My First Attack: Dinner and a Show
- Chapter 4 Transhumanism: We Who Are Not As Others
- A Brief History of Transhumanism
- I, Cyborg
- Bad Intentions
- Notes
- Chapter 5 Using Their Laws Against Them
- Prepare for Takeoff Seat Backs and Tray Tables
- Obfuscation by Law
- Chapter 6 A Technological Rebirth
- Finding My Techno-shaman
- Honey, We Need to Talk
- Chapter 7 My First Installs
- Human MFA
- Touching Digital
- Cyberpunk in Downtown Austin
- I Am Machine
- Physical Meets Biological
- Digital Lockpicks
- Magnetic Vision
- My Tools
- Note
- Chapter 8 I Am the Cyber Threat
- Mobile Devices
- L3pr@cy Attack
- Fl3h-H00k Attack
- Implant a Man-in-the-Middle Attack
- Implant Phishing/Smishing Attack
- Implant Automation Attack
- Physical Access
- H@nd-h@k3
- Magnetic Tracing
- Notes
- Chapter 9 Living the Transhuman Life
- VivoKey Chips
- VivoKey Spark 2
- VivoKey Apex
- Cheeseburger Use Cases
- Walletmor
- NeXT Chip and BioMagnet
- Chapter 10 I'm Hackable
- Identity Evolution
- Cultural Significance
- What Is "Acceptable"?
- Am I an Abomination?
- Note
- Chapter 11 Here There Be Grinders
- The PirateBox and PegLeg
- The HakLeg
- HakLeg Antenna
- A Grinder After All
- Why Me?
- Note
- Chapter 12 Current Limitations of Transhuman Technology
- Cyber Defense Against Humans
- Technological Identification and Mitigation
- Phishing Attack Defense.
- Smishing Attack Defense
- MitM Defense
- Technological Work-Life Balance
- Physical Access Attacks
- Specialized K9 Detection
- Notes
- Chapter 13 The Future of Transhuman Technology
- Brain-Computer Interfaces
- Invasive BCIs
- Early Issues in the Neuralink BCI
- Neuro Rights
- Partially Invasive BCIs
- Noninvasive BCIs
- Smart Devices
- Internal Power
- Sound Power
- Glucose-Powered Metabolic Fuel Cell
- Kinetic Power
- Thermal Power
- Batteries
- AI: A Necessary Evil
- Military Defense/Espionage
- Haptics
- Notes
- Chapter 14 Transhuman Rights Are Human Rights
- Transhuman Discrimination
- The Hypocritic Oath
- Transhuman, but Still Human
- Notes
- Chapter 15 My Future as a Transhuman
- Final Thoughts
- Notes
- Appendix A: My Hardware
- NExT
- VivoKey Spark 2 (Cryptobionic)
- flexNExT
- flexM1 "Magic" 1k
- flexEM T5577
- Titan-Sensing Biomagnet
- Walletmor
- flexDF2 DESFire
- VivoKey Apex
- flexClass (HID iClass)
- Appendix B: FAQs
- Appendix C: Resources
- My Body Mechanics
- Organizations, Clubs, and Information Hubs
- Implant Distributors
- GitHub Repos
- Open-Source Tools
- Acknowledgments
- About the Author
- Index
- EULA.