To deal with hackers who break through office systems through the Internet it is important for information managers to understand their enemy well. If they have sound background knowledge about hackers, they might be prepared to deal with them in a much more effective method. Hackers are very educated often mostly university or high school students who try to break through systems for which they have no authorization. They deal poorly with people, have few
showed first 75 words of 1869 total
showed last 75 words of 1869 total
Computer Crime. California: O’Reilly & Associates, Inc., 1995.
Pfleeger, Charles P. Security in Computing. New Jersey: Prentice-Hall International, Inc., 1989.
Ray, Charles, Janet Palmer, and Amy Wohl. Office Automation : A Systems Approach. 2nd ed. Ohio: South-Western Publishing Co., 1991.
Rothfeder, Jeffery. “No Privacy on the Net.” PC World, February 1997: pp.223-229.
Vijayan, Jaikumar. “Making the Web a safer place.” Computer World, April 1996: p. 45.
Wagner, Mitch. “Firms spell out appropriate use of Internet for employees.” Computer World, February 1996: pp.55,58.