Logo

Underground: Tales of hacking, madness, and obsession

Large book cover: Underground: Tales of hacking, madness, and obsession

Underground: Tales of hacking, madness, and obsession
by

Publisher: Mandarin
ISBN/ASIN: 1863305955
ISBN-13: 9781863305952
Number of pages: 321

Description:
This book provides a great overview of a number of computer intrusion incidents and links them through not only the technical nature of the activity but the persons behind them. UNDERGROUND provides an excellent overview of intrusion activities focusing on the UK, Australia, and the United States.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Download mirrors:
Mirror 1
Mirror 2

Similar books

Book cover: Protecting Children Online?: Cyberbullying Policies of Social Media CompaniesProtecting Children Online?: Cyberbullying Policies of Social Media Companies
by - The MIT Press
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.
(459 views)
Book cover: The Transnational Dimension of Cyber Crime and TerrorismThe Transnational Dimension of Cyber Crime and Terrorism
by - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(7611 views)
Book cover: Security and Privacy: Global Standards for Ethical Identity ManagementSecurity and Privacy: Global Standards for Ethical Identity Management
by - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(4292 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(11396 views)