Up late at night with your essay due tomorrow morning and you are out of ideas to write about? Don't worry, EssayZoom is here!
We have a database of over 40,000 essays that are available immediately for you to search and print. Get enough examples and ideas
from tens of thousands of other writers to make your own term paper stand out above the rest of the class. Join now
for instant access to the essays
Here is a short summary of the essay
Hackers
Beginning of Essay
Introduction . . . . . . . . . . . . . . . . . . . 1
Methodology . . . . . . . . . . . . . . . . . . . 6
What is the Computer Underground? . . . . . . . . 11
Topography of the Computer Underground . . . . . . 20
Hacking . . . . . . . . . . . . . . . . . 20
Ph .... Middle of Essay .... A. COMPUTER UNDERGROUND PSEUDONYMS . . . 76
APPENDIX B. NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77
Introduction
The proliferation of home computers has been accompanied by a corresponding social problem involving the activities of so-called "computer hackers." "Hackers" are computer aficionados who "break in" to corporate and government computer systems using their home computer and a telephone modem. The prevalence of the problem has been dramatized by the media and enforcement agents, and evidenced by the rise of specialized private security firms to confront the "hackers." But despite this flurry of attention, little research ....
Membership Type |
Price |
Instant Access |
30 days (recurring) |
$19.95 |
90 days (recurring) |
$39.95 |
180 days (non-recurring) |
$69.95 |
|
|
|
Words: 10104 - Pages: 37
|