Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
THE DARK SIDE
by
Glenny, Misha
in
Butler, Max Ray
/ Computers
/ Crime
/ Criminal investigations
/ Cybercrime
/ Hackers
/ Military bases
/ Prisons
2011
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
THE DARK SIDE
by
Glenny, Misha
in
Butler, Max Ray
/ Computers
/ Crime
/ Criminal investigations
/ Cybercrime
/ Hackers
/ Military bases
/ Prisons
2011
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Magazine Article
THE DARK SIDE
2011
Request Book From Autostore
and Choose the Collection Method
Overview
Max Vision was surprised when Chris and Mike, his two contacts from the FBI office in San Francisco, turned up at his front door in Santa Clara, CA, in October 1998. He didn't recognize the man with them, although later he learned it was the FBI's computer-crime boss. But then this was not a social call. They're building a case on you, Max, they said. You've really screwed up on this one. In a state of mild shock, Vision turned over his computer and everything else -- he did not want to appear to be obstructing justice, though he was not yet sure what the problem was. In order to protect yourself from criminal or \"blackhat\" hackers, it was sometimes necessary as a \"whitehat\" hacker to ascertain how to break into systems -- an act that might in itself have been illegal.
Publisher
St. Joseph Communications
Subject
This website uses cookies to ensure you get the best experience on our website.