Underground: Tales of hacking, madness, and obsession
by Suelette Dreyfus
Publisher: Mandarin 1997
Number of pages: 321
This book provides a great overview of a number of computer intrusion incidents and links them through not only the technical nature of the activity but the persons behind them. UNDERGROUND provides an excellent overview of intrusion activities focusing on the UK, Australia, and the United States.
Home page url
Download or read it online for free here:
by Abraham D. Sofaer, Seymour E. Goodman - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
by Amy Awol - Smashwords
This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources.
by John Kleinig, et al. - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.