Hackers

  • Hackers: Crime in the Digital Sublime
    By Paul A. Taylor

    In this text the author looks at the battle between the computer underground and the security industry. He talks to people on both sides of the law about the practicalities, objectives and wider implications of what they do.

  • Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
    By Steven Levy

    But Paul Graham sees it as a humming economic engine. The forty-five-year-old Internet guru, himself a fanatic engineer in his day, is a cofounder of Y Combina tor, an incubator for Internet startups. Twice a year, his company runs Amer ...

  • Hackers
    By Gianluigi Fioriglio

    La realtà fattuale dimostra che le più gravi falle di sicurezza sono dovute non tanto a difetti progettuali dei sistemi elettronici, ma piuttosto a 42 K.D. MITNICK, L'arte dell'inganno. I consigli dell'hacker più famoso del mondo, ...

  • Hackers
    By Anna van der Veen

    Hij liep om het huis heen en zag de tweeling en Kilian proberen weg te glippen door het raam. Dante sloeg zijn armen over elkaar en ... 'Ik zoek jullie ouders, waar kan ik ze vinden? ... Kilian wilde al te lang voor zijn gezin zorgen.

  • Hackers: A Novel
    By David Bischoff, Rafael Moreu

    Hackers: A Novel

  • Hackers: Storia e pratiche di una cultura
    By Federico Mazzini

    Degli hackers black hat [...] cedono un exploit che non è più finanziariamente proficuo o donano le loro botnets. Vanno su [vari fora e canali chat] e spargono la voce che un raid epico sta per cominciare.

  • Hackers: Heroes Of The Computer Revolution
    By Steven Levy

    Hackers: Heroes Of The Computer Revolution

  • Hackers: Crime in the Digital Sublime
    By Paul A. Taylor

    In this text the author looks at the battle between the computer underground and the security industry. He talks to people on both sides of the law about the practicalities, objectives and wider implications of what they do.

  • Hackers: Crime and the Digital Sublime
    By Paul Taylor

    Using a wealth of material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a uniquely revealing and richly sourced account of the ...