- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
This item may be
Check for Availability
The Complete Hacker's Handbook: Everything You Need to Know about Hacking in the Age of the Web
Synopses & Reviews
Everything you need to know about hacking in the Age of the Web
No area of computing has generated as much mythology, speculation and sheer fascination as hacking. From Hollywood's perception of hackers as sinister, threatening cyberwizards to the computer trades' claim that such people are nothing more than criminal nerds, misunderstandings abound.
A Complete Hacker's Handbook looks at the phenomenon of hacking from its beginnings in the computer networks of the early '80s, through some of the legendary hackers and their exploits, to the basic tools that hackers use today. This book will tell you everything you need to know about information retrieval. Use it to improve your computer security and learn how to guard against hackers.
Tracing computer hacking from its beginnings in the 1980s to today, this book guides readers through the basic tools hackers use and how to guard against them. Also includes hints and tips for getting the most out of basic Internet tools, the Web, and more. Photos and illustrations.
For the first time in the 90s, The Hacker's Handbook looks at the whole phenomenon of computer hacking, from its beginning in the computer networks of the early 80s, through the basic tools that hacker's use today.
About the Author
The author, Dr. K, got his first computer in 1983. He soon found that access to large computers was strictly limited and began finding ways to evade them, a step that lead to many years of exploring and understanding computer systems and networks. After attending a Dutch hacker conference in 1993, Dr. K dedicated most of his spare time to hacking on the Internet and soon after started the UK hacker e-zine Phreak/Hack-United Kingdom (P/H-UK). He dropped out of the hacker scene soon after the high profile prosecutions of Datastream Cowboy and Maelstrom and now works as a computer networking and security consultant.
What Our Readers Are Saying