The Hacker's Handbook

The Hacker's Handbook

"The Hacker's Handbook" is a legendary non-fiction book from the 1980s effectively explaining how computer systems of the period were hacked. It contains candid and personal comments from the book's British author, Hugo Cornwall, a pseudonym of Peter Sommer who is now a Research Fellow in Information Systems Security at the London School of Economics and frequently appears in the UK courts as an expert on digital evidence and computer forensics as well as media pundit and author on information security topics.

One popular aspect of the book is the salacious printouts of actual hacking attempts (although confidential details, such as passwords, are blacked out).

The first edition, which is the version most easily available for download, was published in 1985 and the last of four editions (edited by Steve Gold) appeared in 1989. In 1990 the UK Parliament passed the Computer Misuse Act - publication of additional editions would likely have been considered an incitement to commit an offence under that Act.

ee also

*Timeline of hacker history

Further reading

* [http://www.textfiles.com/etext/MODERN/hhbk The full text] of this book is available online.

*cite book | author=Steve Gold | title=Hugo Cornwall's New Hacker's Handbook | year=1989 | publisher=Century Hutchinson Ltd | isbn=0-7126-3454-1 | location=London


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • The Hacker\'s Handbook — Руководство Хакера (The Hacker’s Handbook) является легендарной книгой научной литературы с 1980 х, эффективно объясняя, как компьютерные системы периода были взломаны. Издание содержит искренние и личные комментарии от британского автора книги,… …   Википедия

  • The Hacker's Handbook — Руководство Хакера (The Hacker’s Handbook) является легендарным образцом научной литературы 1980 х, эффективно объясняя, как были взломаны компьютерные системы того периода. Издание содержит искренние комментарии британского автора книги, Хьюго… …   Википедия

  • Hacker (computer security) — This article is part of a series on …   Wikipedia

  • The Illuminatus! Trilogy — Illuminatus redirects here. For other uses, see Illuminati (disambiguation). The Illuminatus! Trilogy …   Wikipedia

  • Timeline of computer security hacker history — This is a timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.1970s1971* John T. Draper (later nicknamed… …   Wikipedia

  • Hacker (card game) — Hacker is a card game (not a trading card game) made by Steve Jackson Games (SJG). Published in 1992, the players impersonate hackers fighting for the control of computer networks. It is based primarily on interlocking access to different… …   Wikipedia

  • The Bedford Handbook — Infobox Book | name = The Bedford Handbook image caption = The Bedford Handbook , Seventh Edition author = Diana Hacker illustrator = cover artist = country = United States language = English series = genre = Non Fiction publisher =… …   Wikipedia

  • Battle of the North Fork of the Red River — Infobox Military Conflict conflict=Battle of North Fork of Red River, 1872 partof=the Indian Wars caption=Cavalry Charge on the Southern Plains date=September 28, 1872 place= near McClellan Creek in Gray County, Texas result=Decisive U.S. victory …   Wikipedia

  • Who's Who in the DC Universe — Cover to issue #1 of Who s Who in the DC Universe (March 1985). Art by George Pérez. Who s Who: The Definitive Directory of the DC Universe (usually referred to as Who s Who) is the umbrella title for a number of comic book series which DC Comics …   Wikipedia

  • Pornography in the United States — On the set of a pornographic film …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”