|
|
|
|
|
|
| | Practical Hacking Techniques and CountermeasuresExamining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.
It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to... | | Cyberspace Textuality: Computer Technology and Literary TheoryComputers were once thought of as number-crunching machines; but for most of us it is their ability to create worlds and process words that have made them into a nearly indispensable part of life. As Jacques Leslie puts it, if computers are everywhere, it is because they have grown into "poetry machines." The term "cyberspace"... |
|
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 |