Hack Attacks Encyclopedia: A Complete History of Hacks,Cracks, Phreaks, and Spies Over Time
×
Success!
×
Error!
×
Information !
Rights Contact Login For More Details
More About This Title Hack Attacks Encyclopedia: A Complete History of Hacks,Cracks, Phreaks, and Spies Over Time
- English
English
JOHN CHIRILLO is Senior Internetworking Engineer at a technology management company in Illinois. His consulting work includes breaking into Fortune 1000 company networks to evaluate their security policies and other award-winning projects assisting security managers. He is a frequent speaker at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco security candidates.
- English
English
Acknowledgments.
A Note to the Reader.
Introduction.
About the Author.
A Historical Synopsis.
PART I: THE SEVENTIES.
The Beginning of Hacks.
PART II: THE EIGHTIES.
The Evolution of Hacks.
Collected Hacks.
Phreaker Philes.
Hacker Spies and Virus Hacking.
PART III: THE NINETIES.
Hacking and Cracking.
Phreaking and Virus Hacking.
PART IV: THE MILLENNIUM.
Hack Progression.
Appendix A: Exploits.
Appendix B: The TigerTools.net Message Board.
Glossary.
Index.
A Note to the Reader.
Introduction.
About the Author.
A Historical Synopsis.
PART I: THE SEVENTIES.
The Beginning of Hacks.
PART II: THE EIGHTIES.
The Evolution of Hacks.
Collected Hacks.
Phreaker Philes.
Hacker Spies and Virus Hacking.
PART III: THE NINETIES.
Hacking and Cracking.
Phreaking and Virus Hacking.
PART IV: THE MILLENNIUM.
Hack Progression.
Appendix A: Exploits.
Appendix B: The TigerTools.net Message Board.
Glossary.
Index.
- English
English
" The author has amassed an enormous amount of material and it is supplemented by a bound-in CD-ROM in each book". (Software World, May 2002)