Figure Sources Figure 2.3: A picture of computer pioneers Ken Thompson and Dennis Ritchie (pic. bmp) opened with an image viewer (left) and a hex editor (right). https://commons.wikimedia.org/wiki/File:Ken_Thompson_and_Dennis_ Ritchie--1973.jpg Figure 3.1: Roy Rogers wearing a white hat in an old western movie poster. https://commons.wikimedia.org/wiki/File:The_Arizona_Kid.jpg Figure 3.2: USCYBERCOM seal. https://commons.wikimedia.org/wiki/File:Seal_of_the_United_States_Cyber_Command.svg Figure 3.4: A cyber forensics lab. https://commons.wikimedia.org/wiki/File:Digital_forensics_lab.jpg Figure 3.7: A portion of the title page from an issue of Phrack. https://commons.wikimedia.org/wiki/File:PwnPhrack.jpg Figure 3.8: The Cap’n Crunch toy whistle that triggered operator mode. https://commons.wikimedia.org/wiki/File:Cap%E2%80%99n_Crunch,_Spielzeugpfeife_(2600_Hz).jpg Figure 3.9: Gray hat and later white hat hackers Kevin Mitnick (left) and Kevin Poulsen (right). https://commons.wikimedia.org/wiki/File:Lamo-Mitnick-Poulsen.png Figure 3.10: An electronic DEF CON conference badge. https://commons.wikimedia.org/wiki/File:DEFCON_22_ Badge_%2814891107355%29.jpg Figure 4.1: A hardware-based keylogger. https://commons.wikimedia.org/wiki/File:USB_Hardware_Keylogger.jpg
RkJQdWJsaXNoZXIy MTM4ODY=