An exploration of controversies related to computer hacking that discusses the origins of the problem of hacking; provides varying perspectives on how hacking causes harm to individuals, businesses, and countries, and discusses whether legislation to prevent hacking is economically and politically feasible.
hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
547018 | 4324508 | 2289 | 185437 | 277926 | WCOH | 475 | T 419574 | 364.16 NET | 364.16 | 1577459752 | 1709567815 |
1330087 | 4994390 | 2323 | 185437 | 277926 | PIBR | 382 | PIBR076180 | 364.16 NET | 364.16 | 1581465224 | 1736518457 |
1361520 | 5023987 | 2329 | 185437 | 277926 | PISH | 388 | PISH64332 | 364.16 Net | 364.16 | 1581465224 | 1736518457 |
1549953 | 5178333 | 2347 | 185437 | 277926 | WESP | 492 | WESP2015045 | 364.168 NET | 364.16 | 1581465224 | 1736518457 |
1816636 | 5418431 | 2438 | 185437 | 277926 | CCHS | 138 | CCJH093251 | 364.16 NET | 364.16 | 1582575937 | 1742569409 |
3444950 | 6822675 | 1593 | 185437 | 277926 | Edison | 169 | 700122663 | 364.16 NET | 364.16 | 1640729255 | 1640729255 |