Show Summary Details

Quick Reference

Taking advantage of the security holes in a computer system in order to enter the system illegally. Often such an intrusion is carried out for non-criminal reasons such as gaining a vicarious thrill or annoying a system administrator.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.