The most relevant fixed price listing that has been used or worn previously.The item may have some signs of cosmetic wear, but is fully operational and functions as intended. This item may be a floor model or store return that has been used.See details for description of any imperfections.
This offbeat, n-technical book looks at what hackers do, how they do it, and how you can protect yourself. The third edition of this bestseller (over 150,000 copies sold) adopts the same informative, irreverent, and entertaining style that made the first two editions a huge success. Thoroughly updated, this edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.