Search by :
Last search:
"From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception to gain access to sensitive information"--OCLC-licensed vendor bibliographic record.