|
This is a free sample preview of the essay
Hackers
Beginning of essay
Introduction . . . . . . . . . . . . . . . . . . . 1
Methodology . . . . . . . . . . . . . . . . . . . 6
What is the Computer Underground? . . . . . . . . 11
Topography of the Computer Underground . . . . . . 20
Hacking . . . . . . . . . . . . . . . . . 20
Phreaking . . . . . . . . . . . . . . ....
Middle of essay ....xamined the social world of the "computer hacker." Our current knowledge in this regard derives from hackers who have been caught, from enforcement agents, and from computer security specialists. The everyday world and activities of the "computer hacker" remain largely unknown. This study examines the way actors in the "computer underground" (CU) organize to perform their acts. The computer underground, as it is called by those who participate in it, is composed of actors adhering to one of thre.... |
Number of words: 10104 |
Approximate pages: 37 |
|
Need help with writing your essay? Sign up today to view the rest of this paper and get unlimited access to over 45000 other essays just
like it. Some other sites charge you for each essay, but here at EssayPal we give you full access to our entire database for one low subscription
fee. Thousands of other students around the world have realized what an affordable deal this is and have become members. Come see what
you are missing out on. Once you've become a member, you will not go back to the other term paper sites either.
Length |
Type |
Price |
PayPal |
30 days |
recurring |
$19.95 |
90 days |
recurring |
$39.95 |
180 days |
non-recurring |
$69.95 |
|
|
|