O'Reilly logo

Low Tech Hacking by Sean Lowther, Russ Rogers, Jennifer Jabbusch, Terry Gudaitis, Jack Wiles

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Low tech hacking and the law
Where can you go for help?
Information in this chapter
• Meet Mr. Tony Marino
• Meet Special Agent (SA) Gregory K. Baker, FBI
A computer can be used to commit a crime—for instance, people can use a computer to download child pornography. But that same computer can also be the victim of a crime—if, for example, an attacker attempts to break into the computer to gain access to intellectual property. Because the computer plays such an integral role in the daily activities of individuals and corporations alike, it is important to understand the crimes associated with computers and to know the law enforcement agencies to contact for help should the need arise. With that in mind, this chapter introduces readers to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required