Cliquer sur une vignette pour aller sur Google Books.
Chargement... The Best of 2600: A Hacker Odyssey (2008)par Emmanuel Goldstein
Aucun Chargement...
Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre Actuellement, il n'y a pas de discussions au sujet de ce livre. Usually I hate glossaries. They're usually simple, insulting, and useless. This book needs one though, given the wide range of time and technical materials. I got it from the library, but due to it being heavily requested and my schedule didn't make it through. I should have paid closer attention to the table of contents before I started and read it non-linearly. I think this book probably should have been a series, not on large tome. At least they should have pulled out the editorials and legal battles into a separate book which I would imagine would be useful to a researcher. Nearly 20 years of a very specific part of computing history. If you are also interested in social and legal issues in terms of computer hacking and want to learn the details of famous cases such as the Mitnick case or DeCSS (DVD decryption) case this is a very good reference and a page turner. It also has quite technical bits which is definitely a plus. Natural intelligence recommendation: If you liked this book then you'll also like Phrack ;-) aucune critique | ajouter une critique
Appartient à la série2600: The Hacker Quarterly (Best Of)
Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks. Aucune description trouvée dans une bibliothèque |
Discussion en coursAucunCouvertures populaires
Google Books — Chargement... GenresClassification décimale de Melvil (CDD)005.8Information Computing and Information Computer programming, programs, data, security Computer SecurityClassification de la Bibliothèque du CongrèsÉvaluationMoyenne:
Est-ce vous ?Devenez un(e) auteur LibraryThing. |