Publisher's Synopsis
Provides step-by-step instructions for entering supposedly secure computer systems, along with a summary of the laws covering this generally illegal activity and an explanation of the role of hackers in maintaining computer security.