Author: Schoonmaker Sara
Publisher: Routledge Ltd
ISSN: 1468-4462
Source: Information, Communication and Society, Vol.15, Iss.4, 2012-05, pp. : 502-518
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
A Review of: “Hacking Cyberspace'
By Srinivas K.
The Information Society, Vol. 21, Iss. 3, 2005-07 ,pp. :
Googling for gold - Web crawlers, hacking and defense explained
Network Security, Vol. 2004, Iss. 1, 2004-01 ,pp. :
Penetration testing and social engineering - Hacking the weakest link
By Barrett N.
Information Security Technical Report, Vol. 8, Iss. 4, 2003-04 ,pp. :
Hacking Weber: legitimacy, critique, and trust in peer production
Information, Communication and Society, Vol. 17, Iss. 7, 2014-08 ,pp. :