Logo

Approaching Zero by Paul Mungo, Bryan Glough

Large book cover: Approaching Zero

Approaching Zero
by

Publisher: ManyBooks
ISBN/ASIN: 0679409386
Number of pages: 235

Description:
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on interviews and technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers, which took place in Amsterdam in 1989.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: The Future of Reputation: Gossip, Rumor, and Privacy on the InternetThe Future of Reputation: Gossip, Rumor, and Privacy on the Internet
by - Yale University Press
A fascinating account of how the Internet is transforming gossip and our ability to protect our own reputations. The author shows that the unconstrained flow of information on the Internet may impede opportunities for self-development and freedom.
(16146 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(9510 views)
Book cover: The Transnational Dimension of Cyber Crime and TerrorismThe Transnational Dimension of Cyber Crime and Terrorism
by - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(12256 views)
Book cover: Underground: Tales of hacking, madness, and obsessionUnderground: Tales of hacking, madness, and obsession
by - Mandarin
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
(14094 views)