December 2006
Beginner to intermediate
384 pages
10h 39m
English
A clever or elegant modification to computer software to gain unauthorized access or otherwise cause computer software to malfunction.
A person able to exploit a computer system or gain unauthorized access, usually by creating or modifying computer software.
A wireless network available for use in a public place such as a coffee shop or airport.
HTTP (Hypertext Transfer Protocol)
The computer network protocol used to retrieve information from web pages written in certain “markup” languages.