Warehouse Stock Clearance Sale

Grab a bargain today!


Webster's New World Hacker Dictionary
By

Rating

Product Description
Product Details

Table of Contents

Preface. Acknowledgments. Introduction. Hacker Dictionary A-Z . Appendix A: How Do Hackers Break into Computers? by Carolyn Meinel. Appendix B: Resource Guide.

About the Author

Bernadette H. Schell is dean of the Faculty of Business and Information Technology at Ontario's only laptop university, the University of Ontario Institute of Technology in Oshawa, Ontario, Canada. Dr. Schell is the 2000 recipient of the University Research Excellence Award from Laurentian University, where she was previously director of the School of Commerce and Administration in Sudbury, Ontario, Canada. Dr. Schell has written numerous journal articles on industrial psychology and cybercrime topics. She has written four books with Quorum Books in Westport, Connecticut, on such topics as organizational and personal stress, corporate leader stress and emotional dysfunction, stalking, and computer hackers. She has also published two books on cybercrime and the impact of the Internet on society with ABC-CLIO in Santa Barbara, California. Clemens Martin is the previous director of IT programs at the Faculty of Business and Information Technology at the University of Ontario Institute of Technology, where he is jointly appointed to the Faculty of Engineering and Applied Science. Before joining this university, Dr. Martin was partner and managing director of an information technology consulting company and Internet Service Provider, based in Neuss, Germany. He was responsible for various security and consulting projects, including the implementation of Java-based health care cards for Taiwanese citizens. Dr. Martin currently holds a Bell University Labs (BUL) research grant in IT Security. He is the coauthor with Dr. Schell of the cybercrime book published by ABC-CLIO in Santa Barbara, California.

Ask a Question About this Product More...
 
Look for similar items by category
Home » Books » Computers
Home » Books » Computers » Security » Networking
Home » Books » Computers » Networking » General
People also searched for
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top