HOME | BESTSELLERS | NEW RELEASES | PRICE WATCH | FICTION | BIOGRAPHIES | E-BOOKS |
+ PRICE WATCH
* Amazon pricing is not included in price watch
High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front Book
Stories about hacking, stolen credit card numbers, computer viruses, andidentity theft are all around us, but what do they really mean to us? The goal ofthis book, quite simply, is to help educate people on the issues with high-techcrimes, to help answer that question. The goal being not to only talk aboutthese issues, but understand them.There are many books on the market that explain how hackers exploitcomputer and networks. They explain the details of the exploits and methodsto protect against them, and as such are targeted for those with strong technicalknowledge. That is *not* the case here. Readers will not learn the intricacies ofthe latest hacking attack. Readers will learn how hackers use these exploits, whythey use them, and in some cases how they get caught.With Branigan's background as a sworn law-enforcement officer (cop), systemadministrator (geek), computer programmer (geek), Internet security consultant(geek with tie), and network security researcher (geek in shorts), he offers aunique perspective to help people better understand the many issues with hightechcrime and how they might be affected.Read More
from£N/A | RRP: * Excludes Voucher Code Discount Also available Used from £N/A
- 0321218736
- 9780321218735
- Steven Branigan
- 27 August 2004
- Addison Wesley
- Paperback (Book)
- 448
- 1
As an Amazon Associate we earn from qualifying purchases. If you click through any of the links below and make a purchase we may earn a small commission (at no extra cost to you). Click here to learn more.
Would you like your name to appear with the review?
We will post your book review within a day or so as long as it meets our guidelines and terms and conditions. All reviews submitted become the licensed property of www.find-book.co.uk as written in our terms and conditions. None of your personal details will be passed on to any other third party.
All form fields are required.