Logo

Approaching Zero by Paul Mungo, Bryan Glough

Large book cover: Approaching Zero

Approaching Zero
by

Publisher: ManyBooks
ISBN/ASIN: 0679409386
Number of pages: 235

Description:
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on interviews and technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers, which took place in Amsterdam in 1989.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Security and Privacy: Global Standards for Ethical Identity ManagementSecurity and Privacy: Global Standards for Ethical Identity Management
by - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(4095 views)
Book cover: The Transnational Dimension of Cyber Crime and TerrorismThe Transnational Dimension of Cyber Crime and Terrorism
by - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(7354 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(5157 views)
Book cover: Underground: Tales of hacking, madness, and obsessionUnderground: Tales of hacking, madness, and obsession
by - Mandarin
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
(9451 views)