買這商品的人也買了...
-
$980$774 -
$650$618 -
$580$493 -
$1,127CMOS VLSI Design: A Circuits and Systems Perspective, 3/e(IE)(美國版ISBN:0321149017)
-
$1,078Operating System Principles, 7/e(IE) (美國版ISBN:0471694665-Operating System Concepts, 7/e) (平裝)
-
$590$531 -
$490$382 -
$880$695 -
$860$731 -
$680$537 -
$780$702 -
$650$507 -
$680$578 -
$600$540 -
$399$359 -
$450$351 -
$600$570 -
$750$593 -
$490$382 -
$780$616 -
$720$569 -
$550$495 -
$800$632 -
$650$553 -
$490$382
相關主題
商品描述
Description
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace
Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.
Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime-crackers have accessed information in the records of large, respected organizations, institutions, and even the military.
This is your guide to understanding hacker terminology. It's up to date and comprehensive, with:
* Clear, concise, and accurate definitions of more than 875 hacker terms
* Entries spanning key information-technology security concepts, organizations, case studies, laws, theories, and tools
* Entries covering general terms, legal terms, legal cases, and people
* Suggested further reading for definitions
This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is identified as today's Fear of a Cyber-Apocalypse Era. An appendix entitled "How Do Hackers Break into Computers?" details some of the ways crackers access and steal information.
Knowledge is power. With this dictionary, you're better equipped to be a white hat and guard against cybercrime.
Table of Contents
Preface.
Acknowledgments.
Introduction.
Hacker Dictionary A–Z .
Appendix A: How Do Hackers Break into Computers? by Carolyn Meinel.
Appendix B: Resource Guide.