Toggle navigation
Computing Now
Store
Join
Log in
Help
Contact
About
Digital Library
Publications
Conferences & Events
Membership
Communities
Jobs Board
Professional Education
Corporate Programs
Volunteers & Governance
About
About the Computer Society
Vision & Commitment
Press Room
IEEE CS History
Executive Staff
Board of Governors
What's New
Society Representatives
Contact Us
Digital Library
CS Digital Library Home
About the CSDL
Institutions & Libraries
Subscribe
Search
RSS Feeds
Publications
Publications Home
Magazines
Transactions
Computing Edge
myCS
myComputer App
Computing Now
ComputingEdge eNewsletter
Peer Review
Author Resources
Subscribe
Advertise
Publications Board
Conferences & Events
Conferences Home
Conference Publishing Services
Sponsorship Info
Organizer Resources
Conference Calendar
IEEE Search
Membership
Membership Home
Join or Renew
CS Learning Webinars
Benefits of Membership
Student Benefits
CS Email Alias
Membership Categories
Membership FAQ
INTERFACE
Communities
Communities Home
Chapters
Sister Societies
Special Technical Communities
Student Activities
Technical Committees
Women in Computing
Jobs Board
Jobs Board Home
Build Your Career eNewsletter
Professional Education
Professional Education Home
Certification Credentials
Online Courses
Online Books
Bodies of Knowledge
Skillsoft
Corporate Programs
Corporate Programs Home
TechLeader Training Program
Custom Events
Custom Training
Webinars & White Papers
myComputer: Enterprise
Volunteers & Governance
Volunteers & Governance
Awards & Fellows
Boards & Committees
Board of Governors
Standards Activities
Technical Activities
Professional & Educational Activities
Get Involved
Governance Docs
Election & Nominations
Society Representatives
0
CART
Total
$0.00
Continue shopping
Log in to rate this article.
Average (2 Votes)
Log in to comment on this article.
Dejan Milojicic
I always found hacking fascinating, an untapped opportunity that can drive our technology further. I am glad that this article addresses in a more comprehensive way all aspects of hacking, their venues, approaches, and tools. Hopefully it can bring some of this experience back to academia and industry.
Sign in to vote.
Top
Posted on 8/5/08 6:37 PM.
Keith Farkas
I believe the author is correct in advocating for a greater "hacking" content in the traditional software engineering curriculum. Today, we are surrounded by increasingly complex and sophisticated software systems, systems that are developed and maintained by armies of software engineers. While each of these engineers requires a solid understanding of the "developer" curriculum described in this paper, it is arguably even more important that each engineer be an expert in the "hacker" skills -- troubleshooting, reasoning through complex interactions to uncover root causes, second guess existing code, etc. Further, new college graduates without much "hacker" expertise are at a disadvantage in many software companies because such graduates typically spend the first year or two at the company fixing/modifying existing features rather than developing new ones.
Sign in to vote.
Top
Posted on 8/6/08 2:49 AM.
Computing Now
Marketing Automation Platform
×
We Value Your Feedback
Name
Email
Address
Member
Yes
No
Affiliation
Industry
Academic
Primary Responsibility
Work Environment
Comments
500 characters or less.