رکورد قبلیرکورد بعدی

" The best of 2600 : "


Document Type : BL
Record Number : 986565
Doc. No : b740935
Main Entry : Goldstein, Emmanuel,1959-
Title & Author : The best of 2600 : : a hacker odyssey /\ Emmanuel Goldstein.
Publication Statement : Indianapolis, IN :: Wiley Pub.,, ©2008.
Page. NO : xvi, 871 pages :: illustrations ;; 24 cm
ISBN : 0470294191
: : 9780470294192
Notes : Author Biographies. Introduction. 1. Stories and Adventures. 2. The Last Days of Ma Bell. 3. Fun Toys to Play With. 4. The Early Days of the Net. 5. Corporate History. 6. Raids. 7. The Hacker Philosophy. 8. Pop Culture and the Hacker World. 9. The Computer Revolution. 10. Learning to Hack Other Things. 11. More Hacker Stories and Adventures. 12. The Changing of the Telephone. 13. Hackers and the Law.00s14. The Lawsuits. 15. Still More Hacker Stories. 16. A New Era of Telephony. 17. Retail Hacking. 18. Toys of the Twenty-first Century. Index.
: Includes index.
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Author Biographies. Introduction. 1. Stories and Adventures. 2. The Last Days of Ma Bell. 3. Fun Toys to Play With. 4. The Early Days of the Net. 5. Corporate History. 6. Raids. 7. The Hacker Philosophy. 8. Pop Culture and the Hacker World. 9. The Computer Revolution. 10. Learning to Hack Other Things. 11. More Hacker Stories and Adventures. 12. The Changing of the Telephone. 13. Hackers and the Law.00s14. The Lawsuits. 15. Still More Hacker Stories. 16. A New Era of Telephony. 17. Retail Hacking. 18. Toys of the Twenty-first Century. Index.
Abstract : "Since its birth in 1984, 2600: The Hacker Quarterly has published the discoveries and adventures of hackers worldwide. Now you can enjoy the best of them all in this collection. From the first curious and intrepid souls who discovered they could outwit Ma Bell to those who've hacked the Department of Defense and ParadisePoker.com, they're all here, telling their stories in their own words."--Jacket.
Subject : Computer crimes-- History.
Subject : Computer security-- History.
Subject : Hackers-- History.
Subject : Telecommunication-- Security measures-- History.
Subject : Wiretapping-- History.
Subject : Computer crimes.
Subject : Computer security.
Subject : criminalité informatique-- 1980-- 2008.
Subject : écoute clandestine-- 1980-- 2008.
Subject : hacker-- 1980-- 2008.
Subject : Hackers.
Subject : sécurité informatique-- télécommunications-- 1980-- 2008.
Subject : sécurité informatique-- 1980-- 2008.
Subject : Telecommunication-- Security measures.
Subject : Wiretapping.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬‭G643 2008‬
NLM classification : ‭54.01‬bcl
: ‭54.38‬bcl
: ‭ST 277‬rvk
Parallel Title : Best of 2,600
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟