Underground: Tales of hacking, madness, and obsession
by Suelette Dreyfus
Publisher: Mandarin 1997
ISBN/ASIN: 1863305955
ISBN-13: 9781863305952
Number of pages: 321
Description:
This book provides a great overview of a number of computer intrusion incidents and links them through not only the technical nature of the activity but the persons behind them. UNDERGROUND provides an excellent overview of intrusion activities focusing on the UK, Australia, and the United States.
Download or read it online for free here:
Download link
(multiple formats)
Download mirrors:
Mirror 1
Similar books
![Book cover: Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World](images/6677.jpg)
by Lorna Stefanick - AU Press
Who controls our access to information, and who decides what others have a right to know about us? Lorna Stefanick offers a user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy.
(9460 views)
![Book cover: Open Source Security Tools: Practical Guide to Security Applications](images/1272.jpg)
by Tony Howlett - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(17216 views)
![Book cover: The Transnational Dimension of Cyber Crime and Terrorism](images/4545.jpg)
by Abraham D. Sofaer, Seymour E. Goodman - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(12797 views)
![Book cover: Protecting Children Online?: Cyberbullying Policies of Social Media Companies](images/11967.jpg)
by Tijana Milosevic - The MIT Press
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.
(4342 views)