Explains what computer hacking is, who does it, and how dangerous it can be.
"synopsis" may belong to another edition of this title.
Grade 5-9-Knittel and Soto define the term "hacking" and detail the work of "good hackers" or "white hats," people they usually refer to as computer experts, and those who are "crackers" or "black hats," individuals who illegally break into other people's computers. The authors use real-life examples of hackers who have been caught and punished for breaking the law. They give examples of good hackers as well, such as Bill Gates, Steve Wozniak, and Steve Jobs. The book offers a thorough history of hacking, beginning with "phreaking" over phone lines and the movie War Games. It examines the social and economic repercussions of damaging high-level computers and addresses breaches in military security. The authors encourage readers to become good hackers. They give advice regarding how and where to learn more about computers and programming. Average-quality, black-and-white photos appear throughout.
Yapha Nussbaum Mason, Brentwood Lower School, Los Angeles
Copyright 2000 Reed Business Information, Inc.
The authors make the fundamental distinction between a hacker, a "person who uses his or her skills to find new and innovative solutions to computer problems," and a cracker, a "person who illegally breaks into people's computers." The book discusses both beneficial and malicious computer actions and encourages readers interested in computers to study computer programming and security through recommended books and Web sites. Discussions include the history of computer hacking, psychological profiles of crackers, legal issues, cases of people convicted of computer crimes, and ways to practice "safe hacking." Though the text makes interesting reading, the book has a lackluster format, with black-and-white and color photos of indifferent quality. This competently written volume from the Everything You Need to Know About series may fill a gap in library collections. Carolyn Phelan
"About this title" may belong to another edition of this title.
US$ 6.65 shipping from United Kingdom to U.S.A.
Destination, rates & speedsSeller: AwesomeBooks, Wallingford, United Kingdom
Library Binding. Condition: Very Good. Dangers of Computer Hacking (The Need to Know Library (1994-2004)) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 7719-9780823937646
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00073914818
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Library Binding. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 0.75. Seller Inventory # G082393764XI4N00
Quantity: 1 available
Seller: Bahamut Media, Reading, United Kingdom
Library Binding. Condition: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. Seller Inventory # 6545-9780823937646
Quantity: 1 available
Seller: Mispah books, Redhill, SURRE, United Kingdom
Library Binding. Condition: Like New. Like New. book. Seller Inventory # ERICA758082393764X5
Quantity: 1 available