Here are entered works on the practice of breaking into computer systems and using techniques such as defacing or disabling Web sites, redirects, denial-of-service attacks, information theft, Web site parodies, etc., for politically or socially motivated purposes
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Hacker, Marilyn, 1942- Boy : Poetry for students. Volume 19 : presenting analysis, context and criticism on commonly studied poetry / David Galens project editor ; foreword by David Kelly
Hackers -- Australia -- Biography. : Underground : tales of hacking, madness & obsession on the electronic frontier / Suelette Dreyfus ; with research by Julian Assange
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data