Description |
xx, 359 pages : illustrations ; 23 cm |
Contents |
A. Software -- B. A Hacker's Gallery of Rogue Tools -- C. A Bit of History: Phone Phreaking and Other Phun |
|
Pt. 1. Information Overload (Lies, Damn Lies, and Statistics) -- 1. Finding what you Need: The Magic of Search Engines -- 2. Alternative Sources of News and Information -- 3. Censoring Information (We Know what's Best for you) -- 4. Hacktivism: Online Activism -- 5. Pledging Allegiance: Hatred as Patriotism -- 6. Where the Hackers are -- Pt. 2. Dangerous Threats on the Internet -- 7. Viruses and Worms -- 8. Trojan Horses: Beware of Geeks Bearing Gifts -- 9. Con Games on the Internet -- 10. Online Stalkers -- Pt. 3. Breaking and Entering Computers -- 11. Probing a Target -- 12. Sneaking into a Computer -- 13. Digging in -- Pt. 4. Protecting Yourself -- 14. Computing on a Shoestring -- 15. Protecting your Data and your Privacy -- 16. Waging War on Spam -- 17. Web Bugs, Adware, Pop-Ups, and Spyware -- Pt. 5. Protecting your Computer -- 18. Firewalls, Intrusion-Detection Systems, and Honeypots -- 19. Computer Forensics: Recovering and Deleting Data -- 20. Protecting your Computer |
Subject |
Hackers -- Handbooks, manuals, etc.
|
|
Internet -- Handbooks, manuals, etc.
|
|
Subculture -- Computer network resources.
|
Genre/Form |
Handbooks and manuals.
|
Author |
Wang, Wally.
Steal this computer book
|
LC no. |
2003000475 |
ISBN |
1593270003 |
|