Search results
Results from the WOW.Com Content Network
The book was chronicled in an episode of WGBH's NOVA entitled "The KGB, the Computer, and Me", which aired on PBS stations on October 3, 1990. Stoll and several of his co-workers participated in re-enactments of the events described. [citation needed] [1] Another documentary, Spycatcher, was made by Yorkshire Television. [1]
Computer Security Management (Reston Publishing, 1983) [9] Ethical Conflicts in Information and Computer Science, Technology, and Business (QED Information Sciences, 1990) [9] Computer Security Reference Book (Butterworth, 1993) [9] Fighting Computer Crime, a New Framework for Protecting Information (John Wiley & Son, 1998) [9]
The book also mentions other hackers who had contacts with the protagonists, among them Erik Bloodaxe of the Legion of Doom and Corrupt of the Masters of Deception. The first chapter of Underground relates the diffusion and reactions of the computer security community to the WANK worm that attacked DEC VMS computers over the DECnet in 1989 and ...
Deaver's 2001 book The Blue Nowhere features criminal hackers (one using social engineering to commit murder), as well as a law enforcement computer crime unit. In this book, Deaver gives credit to Lee de Forest, the inventor of the Audion (also known as the triode tube), who is thus considered to have opened the world to electronic development ...
This is an accepted version of this page This is the latest accepted revision, reviewed on 12 January 2025. American hacker (1963–2023) Kevin Mitnick Mitnick in 2010 Born Kevin David Mitnick (1963-08-06) August 6, 1963 Los Angeles, California, U.S. Died July 16, 2023 (2023-07-16) (aged 59) Pittsburgh, Pennsylvania, U.S. Other names The Condor, The Darkside Hacker Occupations Information ...
Pages in category "Books about computer hacking" The following 20 pages are in this category, out of 20 total. This list may not reflect recent changes. A.
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks.These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts.
Pages in category "Computer security books" The following 16 pages are in this category, out of 16 total. This list may not reflect recent changes. A.