by Paul Mungo, Bryan Glough
Publisher: ManyBooks 1993
Number of pages: 235
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on interviews and technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers, which took place in Amsterdam in 1989.
Home page url
Download or read it online for free here:
by John Kleinig, et al. - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
by Abraham D. Sofaer, Seymour E. Goodman - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
by Suelette Dreyfus - Mandarin
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.