版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.youkuaiyun.com/topmvp - topmvp
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace
Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.
Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime-crackers have accessed information in the records of large, respected organizations, institutions, and even the military.
This is your guide to understanding hacker terminology. It's up to date and comprehensive, with:
* Clear, concise, and accurate definitions of more than 875 hacker terms
* Entries spanning key information-technology security concepts, organizations, case studies, laws, theories, and tools
* Entries covering general terms, legal terms, legal cases, and people
* Suggested further reading for definitions
This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is identified as today's Fear of a Cyber-Apocalypse Era. An appendix entitled "How Do Hackers Break into Computers?" details some of the ways crackers access and steal information.
http://rapidshare.com/files/50344762/0470047526.rar
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace
Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.
Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime-crackers have accessed information in the records of large, respected organizations, institutions, and even the military.
This is your guide to understanding hacker terminology. It's up to date and comprehensive, with:
* Clear, concise, and accurate definitions of more than 875 hacker terms
* Entries spanning key information-technology security concepts, organizations, case studies, laws, theories, and tools
* Entries covering general terms, legal terms, legal cases, and people
* Suggested further reading for definitions
This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is identified as today's Fear of a Cyber-Apocalypse Era. An appendix entitled "How Do Hackers Break into Computers?" details some of the ways crackers access and steal information.
http://rapidshare.com/files/50344762/0470047526.rar
本书全面解读了875个黑客术语,覆盖了信息技术安全概念、组织机构、案例研究、法律法规及理论工具等内容。旨在帮助关注互联网安全、国家安全乃至个人安全的专业人士理解网络空间特有的语言。
9510

被折叠的 条评论
为什么被折叠?



