Condition: Good. Used book that is in clean, average condition without any missing pages.
Condition: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects.
Condition: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Hardcover. Condition: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Seller: suffolkbooks, Center moriches, NY, U.S.A.
hardcover. Condition: Very Good. Fast Shipping - Safe and Secure 7 days a week!
Condition: New.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New.
Condition: As New. Unread book in perfect condition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 81.86
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 81.85
Quantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 92.57
Quantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Hardcover. Condition: Brand New. 300 pages. 9.10x6.20x1.30 inches. In Stock.
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
US$ 99.04
Quantity: Over 20 available
Add to basketHardback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 734.
Seller: preigu, Osnabrück, Germany
Buch. Condition: Neu. Hackers and Hacking | A Reference Handbook | Thomas Holt (u. a.) | Buch | Gebunden | Englisch | 2013 | ABC-CLIO | EAN 9781610692762 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.
Seller: AHA-BUCH GmbH, Einbeck, Germany
Buch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.What defines the social world of hackers How do individuals utilize hacking techniques against corporations, governments, and the general public And what motivates them to do so This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society.