Cover image for Everything you need to know about the dangers of computer hacking
Everything you need to know about the dangers of computer hacking
Knittel, John, 1973-
Personal Author:
First edition.
Publication Information:
New York : Rosen Pub. Group, [2000]

Physical Description:
63 pages, 1 unnumbered page : illustrations (some color) ; 25 cm.
Explains what computer hacking is, who does it, and how dangerous it can be.
Program Information:
Accelerated Reader AR UG 8.0 1.0 2717.
Added Author:
Format :


Call Number
Material Type
Home Location
Item Holds
HV6773 .K55 2000 Adult Non-Fiction Non-Fiction Area

On Order



Accelerated Reader is a program based on the fact that students become more motivated to read if they are tested on the content of the books they have read and are rewarded for correct answers. Students read each book, individually take the test on the computer, and receive gratification when they score well. Schools using the Accelerated Reader program have seen a significant increase in reading among their students.

These new titles are valuable resources to help reluctant readers get the guidance they need.

Reviews 2

Booklist Review

Gr. 5^-8. The authors make the fundamental distinction between a hacker, a "person who uses his or her skills to find new and innovative solutions to computer problems," and a cracker, a "person who illegally breaks into people's computers." The book discusses both beneficial and malicious computer actions and encourages readers interested in computers to study computer programming and security through recommended books and Web sites. Discussions include the history of computer hacking, psychological profiles of crackers, legal issues, cases of people convicted of computer crimes, and ways to practice "safe hacking." Though the text makes interesting reading, the book has a lackluster format, with black-and-white and color photos of indifferent quality. This competently written volume from the Everything You Need to Know About series may fill a gap in library collections. --Carolyn Phelan

School Library Journal Review

Gr 5-9-Knittel and Soto define the term "hacking" and detail the work of "good hackers" or "white hats," people they usually refer to as computer experts, and those who are "crackers" or "black hats," individuals who illegally break into other people's computers. The authors use real-life examples of hackers who have been caught and punished for breaking the law. They give examples of good hackers as well, such as Bill Gates, Steve Wozniak, and Steve Jobs. The book offers a thorough history of hacking, beginning with "phreaking" over phone lines and the movie War Games. It examines the social and economic repercussions of damaging high-level computers and addresses breaches in military security. The authors encourage readers to become good hackers. They give advice regarding how and where to learn more about computers and programming. Average-quality, black-and-white photos appear throughout.-Yapha Nussbaum Mason, Brentwood Lower School, Los Angeles (c) Copyright 2010. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.