This is a free sample excerpt of the paper. Join to view the full essay
Hackers
Part 1 of Paper .... . . 6
What is the Computer Underground? . . . . . . . . 11
Topography of the Computer Underground . . . . . . 20
Hacking . . . . . . . . . . . . . . . . . 20
Phreaking . . . . . . . . . . . . . . . . . . 21
Pirating . . . . . . . . . . . . . . . . . 24
Social Organization and Deviant Associations . . . 28
Mutu.... Part 2 of Paper ....computer hackers." "Hackers" are computer aficionados who "break in" to corporate and government computer systems using their home computer and a telephone modem. The prevalence of the problem has been dramatized by the media and enforcement agents, and evidenced by the rise of specialized private security firms to confront the "hackers." But despite this flurry of attention, little research has examined the social world of the "computer hacker." Our current knowledge in this regard derives from.... |
Number of words: 10104 - Approximate pages: 37 |
|
Here are PaperHelp we are used to dealing with students in a rush to complete their research papers on a tight deadline. That is why when you
join our site, your account is activated immediately enabling you to get the information you need as quickly as possible. We also know that
students usually are on a tight budget, which is why we give you access to a large number of papers, 45,000+ to exact, for one low monthly
price. With so many essays available, there is a very good chance you'll be able to find what you need. So join today and get your paper
done.
Length |
Membership Type |
Price |
Register |
30 days |
recurring |
$19.95 |
90 days |
recurring |
$39.95 |
180 days |
non-recurring |
$69.95 |
|
|
|