Search results
Results from the WOW.Com Content Network
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers is a book by Kevin Mitnick that is a collection of stories about social engineering as performed by other hackers. Each story ends by summarizing insight into the attack as well as measures to defend against it.
The Hacker Bible is a compendium of documents and stories from the hacker scene, for example the instruction guide to the acoustic coupler named “Data-loo”(Germ.:Datenklo).
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at Lawrence Berkeley National Laboratory (LBNL). Stoll's use of the term extended the metaphor Cuckoo's egg from brood parasitism in birds to ...
One popular aspect of the book is the apparently salacious printouts of actual hacking attempts (although confidential details, such as passwords, are blacked out). [citation needed] The first edition, the version most easily available for download, was published in 1985.
AOL latest headlines, entertainment, sports, articles for business, health and world news.
"Hacking, The art of exploitation" Hacking: The Art of Exploitation (ISBN 1-59327-007-0) is a book by Jon "Smibbs" Erickson about computer security and network security. [1] It was published by No Starch Press in 2003, [2] [3] with a second edition in 2008. [4] [5] All the examples in the book were developed, compiled, and tested on Gentoo ...
Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Pages for logged out editors learn more
Discover the best free online games at AOL.com - Play board, card, casino, puzzle and many more online games while chatting with others in real-time.