Ads
related to: computer hacking introduction book
Search results
Results From The WOW.Com Content Network
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at Lawrence Berkeley National Laboratory (LBNL). Stoll's use of the term extended the metaphor Cuckoo's egg from brood parasitism in birds to ...
The Hacker's Handbook is a non-fiction book in four editions, each reprinted numerous times between 1985 and 1990, and explaining how phone and computer systems of the period could be 'hacked'.
Steven Levy - Hackers: Heroes of the Computer Revolution; Douglas Thomas - Hacker Culture; Open Sources: Voices from the Open Source Revolution; Suelette Dreyfus - Underground: Hacking, Madness and Obsession on the Electronic Frontier; Eric S. Raymond - The New Hacker's Dictionary; Sam Williams - Free as in Freedom; Bruce Sterling - The Hacker ...
Fancy Bear discussed Dark Avenger, the pseudonym of a computer virus writer from Bulgaria who had a very signature style of writing computer viruses. In the discussion of Dark Avenger, Shapiro examines the use of Internet forums used by typical computer hackers in exchanging their ideas and viruses. Shapiro also examines the typical ...
Hackers: Heroes of the Computer Revolution (ISBN 0-385-19195-2) is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City , New York by Doubleday . Levy describes the people, the machines, and the events that defined the Hacker culture and the Hacker Ethic , from the early mainframe hackers at MIT , to the self-made ...
"Hacking, The art of exploitation" Hacking: The Art of Exploitation (ISBN 1-59327-007-0) is a book by Jon "Smibbs" Erickson about computer security and network security. [1] It was published by No Starch Press in 2003, [2] [3] with a second edition in 2008. [4] [5] All the examples in the book were developed, compiled, and tested on Gentoo ...
Pages in category "Books about computer hacking" The following 20 pages are in this category, out of 20 total. This list may not reflect recent changes. A.
The book discusses watershed events in the hacker subculture in the early 1990s. The most notable topic covered is Operation Sundevil and the events surrounding the 1987–1990 war on the Legion of Doom network: the raid on Steve Jackson Games , the trial of " Knight Lightning " (one of the original journalists of Phrack ), and the subsequent ...