crime

View Paper
ESSAY DETAILS Words: 8407
Pages: 31
(approximately 235 words/page)

Essay Database > Literature > English
computer underground By: steve schmidt E-mail: testcard2@excite.com The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of …

showed first 75 words of 8407 total
Sign up for EssayTask and enjoy a huge collection of student essays, term papers and research papers. Improve your grade with our unique database!
showed last 75 words of 8407 total
…-126. Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution. New York: Dell Publishing. Message Logs from a variety of computer underground bulletin board systems, 1988-1989. NBC-TV. 1988. Hour Magazine. November 2, 1988. Bill Lan! dreth, 1985, Outside the Inner Circle. Microsoft publishing Parker, Donn B. 1983. Fighting Computer Crime. New York: Charles Scribner's Sons. Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box ." Esquire October, pp. 116-125. Small, David. 1988. Personal communication to Gordon Meyer. WGN-Radio. 1988. Ed Schwartz Show. September 27, 1988. ------------------------------------------------------------------------ **Bibliography**