Logo

Approaching Zero by Paul Mungo, Bryan Glough

Large book cover: Approaching Zero

Approaching Zero
by

Publisher: ManyBooks
ISBN/ASIN: 0679409386
Number of pages: 235

Description:
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on interviews and technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers, which took place in Amsterdam in 1989.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked WorldControlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
by - AU Press
Who controls our access to information, and who decides what others have a right to know about us? Lorna Stefanick offers a user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy.
(5132 views)
Book cover: Open Source Security Tools: Practical Guide to Security ApplicationsOpen Source Security Tools: Practical Guide to Security Applications
by - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(11607 views)
Book cover: Lessons from the Identity TrailLessons from the Identity Trail
by - Oxford University Press
The authors explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.
(9612 views)
Book cover: Underground: Tales of hacking, madness, and obsessionUnderground: Tales of hacking, madness, and obsession
by - Mandarin
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
(10074 views)