Logo

Approaching Zero by Paul Mungo, Bryan Glough

Large book cover: Approaching Zero

Approaching Zero
by

Publisher: ManyBooks
ISBN/ASIN: 0679409386
Number of pages: 235

Description:
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on interviews and technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers, which took place in Amsterdam in 1989.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: The Transnational Dimension of Cyber Crime and TerrorismThe Transnational Dimension of Cyber Crime and Terrorism
by - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(12797 views)
Book cover: Protecting Children Online?: Cyberbullying Policies of Social Media CompaniesProtecting Children Online?: Cyberbullying Policies of Social Media Companies
by - The MIT Press
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.
(4342 views)
Book cover: Lessons from the Identity TrailLessons from the Identity Trail
by - Oxford University Press
The authors explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.
(13612 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18746 views)