In order to protect ourselves, we must first comprehend the extent and nature of the hacker threat. This volume explores and explains this threat and how to protect ourselves from it. The biggest misconception about hackers is they conform to a particular mould. Nothing is further from the truth. A hacker and a cracker, for instance, are diametrically opposed. A hacker shall do no harm is the first credo of hacking. A true hacker passes through the network without a trace. A cracker's expertise is manifested by data theft, ...
Read More
In order to protect ourselves, we must first comprehend the extent and nature of the hacker threat. This volume explores and explains this threat and how to protect ourselves from it. The biggest misconception about hackers is they conform to a particular mould. Nothing is further from the truth. A hacker and a cracker, for instance, are diametrically opposed. A hacker shall do no harm is the first credo of hacking. A true hacker passes through the network without a trace. A cracker's expertise is manifested by data theft, sabotage, espionage and national security threats. Their mission is to wreak havoc.
Read Less
Add this copy of Invasion of Privacy! Big Brother and the Company to cart. $13.61, fair condition, Sold by ThriftBooks-Atlanta rated 5.0 out of 5 stars, ships from Brownstown, MI, UNITED STATES, published 2003 by Course Technology.
Add this copy of Invasion of Privacy! Big Brother and the Company to cart. $13.61, fair condition, Sold by ThriftBooks-Baltimore rated 4.0 out of 5 stars, ships from Halethorpe, MD, UNITED STATES, published 2003 by Course Technology.
Add this copy of Invasion of Privacy! Big Brother and the Company to cart. $53.95, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Newport Coast, CA, UNITED STATES, published 2003 by Course Technology PTR.