skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 99180 Find in a Library
Title: Out of the Inner Circle - A Hacker's Guide to Computer Security
Author(s): B Landreth
Date Published: 1985
Page Count: 230
Sponsoring Agency: Microsoft Press
Bellevue, WA 98009
Sale Source: Microsoft Press
10700 Northrup Way
Box 97200
Bellevue, WA 98009
United States of America
Language: English
Country: United States of America
Annotation: This book -- written by a former member of an elite group (the 'Inner Circle') of computer 'hackers' commited to penetrating some of the Nation's most protected computer systems -- profiles hackers, their goals, and methods and suggests steps for defeating their attacks on computer security systems.
Abstract: The author explains how he was caught tapping into GTE Telenet Corporations' Telemail electronic mail system, which serves security-conscious government and business clients. He also recounts his experiences after he was arrested. For system operators who know their systems are being penetrated, the book provides a step-by-step method for determining what the hacker has done and how to defeat such intrusion into the system. Signs of the teenage hacker syndrome are highlighted. To prevent hacker intrusions, designers of computer security systems are told to think like hackers so as to rid their systems of common security loopholes known to every hacker. Practical advice is offered for making computer systems tamperproof at minimal cost. The book also analyzes the cost effectiveness of external security devices and discusses necessary inhouse steps to protect valuable data. Particular attention is given to microcomputer security. The appendix contains an evaluation of some available security equipment. A subject index is provided.
Index Term(s): Computer abuse; Computer privacy and security; Computer related crime; Criminal methods; Industrial espionage; Offender profiles
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.