In order to protect ourselves, we must first comprehend the extent and nature of the hacker threat. This volume explores and explains this threat and how to protect ourselves from it. The biggest misconception about hackers is they conform to a particular mould. Nothing is further from the truth. A hacker and a cracker, for instance, are diametrically opposed. A hacker shall do no harm is the first credo of hacking. A true hacker passes through the network without a trace. A cracker's expertise is manifested by data theft, ...
Read More
In order to protect ourselves, we must first comprehend the extent and nature of the hacker threat. This volume explores and explains this threat and how to protect ourselves from it. The biggest misconception about hackers is they conform to a particular mould. Nothing is further from the truth. A hacker and a cracker, for instance, are diametrically opposed. A hacker shall do no harm is the first credo of hacking. A true hacker passes through the network without a trace. A cracker's expertise is manifested by data theft, sabotage, espionage and national security threats. Their mission is to wreak havoc.
Read Less