SUBJECTS
  American History
  Biographies
  Book Reports
  Computers
  Economics
  English
  Geography
  Government
  Health
  Miscellaneous
  Movies & Plays
  Music
  Poetry
  Religion
  Science
  Social Issues
  World History

  MEMBERS
  Login Here
  Forgot Password


Home / Register / Custom Writing / Contact Us

The below is a sample preview of the full essay that is available in our database. To see the full paper, just register for a free account. You get access to thousands of example term papers in our super free essay database without paying a cent.

SPONSORED PAPERS

Beginning of Paper
TABLE OF CONTENTS Introduction . . . . . . . . . . . . . . . . . . . 1

Methodology . . . . . . . . . . . . . . . . . . . 6 What is the Computer Underground? . . . . . . . . 11 Topography of the Computer Underground . . . . . . 20 Hacking . . . . . . . . . . . . . . . . . 20 Phreaking . . . . . . . . . . . . . . . . ....

Middle of Paper
.... rise of specialized private security firms to confront the "hackers." But despite this flurry of attention, little research has examined the social world of the "computer hacker." Our current knowledge in this regard derives from hackers who have been caught, from enforcement agents, and from computer security specialists. The everyday world and activities of the "computer hacker" remain largely unknown. This study examines the way actors in the "computer underground" (CU) organize to perform their acts. The computer underground, as it is called by those who particip ....

Words: 10082   Pages: 41 Register To View Full Essay


MORE SPONSORED ESSAYS