How hackers break in⦠and how they are c
β
Helen Meye
π
Article
π
1998
π
Elsevier Science
π
English
β 111 KB
The author gives a fictionalized account which is a composite of many incidents that have occurred somewhere in cyberspace. The names and other details have been changed, but the technologies and software exist. Some of the events reported are drawn from the firsthand experiences of the author.