When.com Web Search

  1. Ads

    related to: computer hacking introduction book

Search results

  1. Results From The WOW.Com Content Network
  2. The Cuckoo's Egg (book) - Wikipedia

    en.wikipedia.org/wiki/The_Cuckoo's_Egg_(book)

    The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at Lawrence Berkeley National Laboratory (LBNL). Stoll's use of the term extended the metaphor Cuckoo's egg from brood parasitism in birds to ...

  3. The Hacker's Handbook - Wikipedia

    en.wikipedia.org/wiki/The_Hacker's_Handbook

    The Hacker's Handbook is a non-fiction book in four editions, each reprinted numerous times between 1985 and 1990, and explaining how phone and computer systems of the period could be 'hacked'.

  4. List of computer books - Wikipedia

    en.wikipedia.org/wiki/List_of_Computer_books

    Steven Levy - Hackers: Heroes of the Computer Revolution; Douglas Thomas - Hacker Culture; Open Sources: Voices from the Open Source Revolution; Suelette Dreyfus - Underground: Hacking, Madness and Obsession on the Electronic Frontier; Eric S. Raymond - The New Hacker's Dictionary; Sam Williams - Free as in Freedom; Bruce Sterling - The Hacker ...

  5. Fancy Bear Goes Phishing - Wikipedia

    en.wikipedia.org/wiki/Fancy_Bear_Goes_Phishing

    Fancy Bear discussed Dark Avenger, the pseudonym of a computer virus writer from Bulgaria who had a very signature style of writing computer viruses. In the discussion of Dark Avenger, Shapiro examines the use of Internet forums used by typical computer hackers in exchanging their ideas and viruses. Shapiro also examines the typical ...

  6. Hackers: Heroes of the Computer Revolution - Wikipedia

    en.wikipedia.org/wiki/Hackers:_Heroes_of_the...

    Hackers: Heroes of the Computer Revolution (ISBN 0-385-19195-2) is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City , New York by Doubleday . Levy describes the people, the machines, and the events that defined the Hacker culture and the Hacker Ethic , from the early mainframe hackers at MIT , to the self-made ...

  7. Hacking: The Art of Exploitation - Wikipedia

    en.wikipedia.org/wiki/Hacking:_The_Art_of...

    "Hacking, The art of exploitation" Hacking: The Art of Exploitation (ISBN 1-59327-007-0) is a book by Jon "Smibbs" Erickson about computer security and network security. [1] It was published by No Starch Press in 2003, [2] [3] with a second edition in 2008. [4] [5] All the examples in the book were developed, compiled, and tested on Gentoo ...

  8. Category:Books about computer hacking - Wikipedia

    en.wikipedia.org/wiki/Category:Books_about...

    Pages in category "Books about computer hacking" The following 20 pages are in this category, out of 20 total. This list may not reflect recent changes. A.

  9. The Hacker Crackdown - Wikipedia

    en.wikipedia.org/wiki/The_Hacker_Crackdown

    The book discusses watershed events in the hacker subculture in the early 1990s. The most notable topic covered is Operation Sundevil and the events surrounding the 1987–1990 war on the Legion of Doom network: the raid on Steve Jackson Games , the trial of " Knight Lightning " (one of the original journalists of Phrack ), and the subsequent ...