The AT&T long-distance network crashes, and millions of calls go unanswered. A computer hacker reprograms a switching station, and calls to a Florida probation office are shunted to a New York phone-sex hotline. An underground computer bulletin board publishes a pilfered BellSouth document on the 911 emergency system, making it available to anyone who dials up. How did so much illicit power reach the hands of an undisciplined few - and what should be done about it? You are about to descend into a strange netherworld - one that sprang into existence when computers were first connected to telephones. Like any frontier, it is home to a wide range of personalities, from legitimate computer professionals to those known only by their noms de net; denizens like Knight Lightning, Leftist, Compu-Phreak, Major Havoc, and Silver Spy; groups like the Lords of Chaos, Phantom Access Associates, Shadow Brotherhood, and the Coalition of Hi-Tech Pirates. In the massive "hacker crackdowns" of 1990, law enforcement officers executed search warrants across the country against lawbreakers - and suspected lawbreakers - in the computer underground.
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer crimes-- United States.
موضوع مستند نشده
Computer programming-- Corrupt practices.
موضوع مستند نشده
Telephone-- Corrupt practices-- United States.
موضوع مستند نشده
Computer crimes.
موضوع مستند نشده
Computer programming-- Corrupt practices.
موضوع مستند نشده
Telephone-- Corrupt practices.
نام جغرافیایی به منزله موضوع
موضوع مستند نشده
United States.
بدون عنوان
7
رده بندی ديویی
شماره
364
.
1/68
ويراست
20
رده بندی کنگره
شماره رده
HV6773
نشانه اثر
.
S74
1993
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )