Logo

Underground: Tales of hacking, madness, and obsession

Large book cover: Underground: Tales of hacking, madness, and obsession

Underground: Tales of hacking, madness, and obsession
by

Publisher: Mandarin
ISBN/ASIN: 1863305955
ISBN-13: 9781863305952
Number of pages: 321

Description:
This book provides a great overview of a number of computer intrusion incidents and links them through not only the technical nature of the activity but the persons behind them. UNDERGROUND provides an excellent overview of intrusion activities focusing on the UK, Australia, and the United States.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Download mirrors:
Mirror 1

Similar books

Book cover: The Future of Reputation: Gossip, Rumor, and Privacy on the InternetThe Future of Reputation: Gossip, Rumor, and Privacy on the Internet
by - Yale University Press
A fascinating account of how the Internet is transforming gossip and our ability to protect our own reputations. The author shows that the unconstrained flow of information on the Internet may impede opportunities for self-development and freedom.
(17870 views)
Book cover: Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked WorldControlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
by - AU Press
Who controls our access to information, and who decides what others have a right to know about us? Lorna Stefanick offers a user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy.
(10138 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(10639 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(19793 views)