Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. Used book that is in clean, average condition without any missing pages.
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects.
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Hardcover. Condition: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Seller: suffolkbooks, Center moriches, NY, U.S.A.
hardcover. Condition: Very Good. Fast Shipping - Safe and Secure 7 days a week!
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Condition: New.
Language: English
Published by ABC-Clio, Incorporated, 2013
ISBN 10: 1610692764 ISBN 13: 9781610692762
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 320.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Language: English
Published by Bloomsbury Publishing Plc, Santa Barbara, 2013
ISBN 10: 1610692764 ISBN 13: 9781610692762
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Hardcover. Condition: new. Hardcover. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraudacts that can have devastating effects upon our modern information society. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 84.42
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 84.40
Quantity: Over 20 available
Add to basketCondition: New.
Language: English
Published by Bloomsbury Publishing Plc, US, 2013
ISBN 10: 1610692764 ISBN 13: 9781610692762
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
US$ 104.70
Quantity: Over 20 available
Add to basketHardback. Condition: New. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 95.35
Quantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Revaluation Books, Exeter, United Kingdom
US$ 121.89
Quantity: 2 available
Add to basketHardcover. Condition: Brand New. 300 pages. 9.10x6.20x1.30 inches. In Stock.
Language: English
Published by Bloomsbury Publishing Plc, US, 2013
ISBN 10: 1610692764 ISBN 13: 9781610692762
Seller: Rarewaves.com UK, London, United Kingdom
US$ 102.05
Quantity: Over 20 available
Add to basketHardback. Condition: New. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society.
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
HRD. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
US$ 87.04
Quantity: Over 20 available
Add to basketHRD. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Language: English
Published by ABC-Clio, Incorporated, 2013
ISBN 10: 1610692764 ISBN 13: 9781610692762
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 320.
Language: English
Published by ABC-Clio, Incorporated, 2013
ISBN 10: 1610692764 ISBN 13: 9781610692762
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND pp. 320.
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
US$ 101.94
Quantity: Over 20 available
Add to basketHardback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Language: English
Published by Bloomsbury Publishing Plc, Santa Barbara, 2013
ISBN 10: 1610692764 ISBN 13: 9781610692762
Seller: CitiRetail, Stevenage, United Kingdom
US$ 94.77
Quantity: 1 available
Add to basketHardcover. Condition: new. Hardcover. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraudacts that can have devastating effects upon our modern information society. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.Über den AutorThomas .
Seller: preigu, Osnabrück, Germany
Buch. Condition: Neu. Hackers and Hacking | A Reference Handbook | Thomas Holt (u. a.) | Buch | Gebunden | Englisch | 2013 | ABC-CLIO | EAN 9781610692762 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.
Seller: AHA-BUCH GmbH, Einbeck, Germany
Buch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.What defines the social world of hackers How do individuals utilize hacking techniques against corporations, governments, and the general public And what motivates them to do so This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society.