Here is a free sample preview of the paper
Hackers
Beginning of paper
Introduction . . . . . . . . . . . . . . . . . . . 1
Methodology . . . . . . . . . . . . . . . . . . . 6
What is the Computer Underground? . . . . . . . . 11
Topography of the Computer Underground . . . . . . 20
Hacking . . . . . . . . . . . . . . . . . 20
Phreaking . . . . . . . . . . . . . . . . . . 21
Pirating . . . . . . . . . . . . . . ....
Middle of paper ....n dramatized by the media and enforcement agents, and evidenced by the rise of specialized private security firms to confront the "hackers." But despite this flurry of attention, little research has examined the social world of the "computer hacker." Our current knowledge in this regard derives from hackers who have been caught, from enforcement ag.... |
Word count: 10104 |
Page count: 37 |
|
Paper due soon? Running out of time and need help? If you are tired of coming across sites that charge big $$$$ per page for a paper,
TermPaperLand.com is the solution. Get immediate access to our database of over 40,000+ papers and essays for one low price
that won't break your bank account. Upon registering, you can download and print any of our papers at no additional charge. You
read right - view and print any of the 40,000+ papers you want.
Membership Option |
Price |
Credit Card |
Online Check |
PayPal |
30 days (recurring) |
$19.95 |
90 days (recurring) |
$39.95 |
180 days (non-recurring) |
$69.95 |
|
|
|