Hacker culture
Sábháilte in:
Príomhchruthaitheoir: | Thomas, Douglas, 1966- |
---|---|
Údar corparáideach: | ebrary, Inc |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Minneapolis :
University of Minnesota Press,
c2002.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Dear hacker letters to the editor of 2600 /
de réir: Goldstein, Emmanuel J.
Foilsithe / Cruthaithe: (2010)
de réir: Goldstein, Emmanuel J.
Foilsithe / Cruthaithe: (2010)
Game console hacking have fun while voiding your warranty /
de réir: Grand, Joe
Foilsithe / Cruthaithe: (2004)
de réir: Grand, Joe
Foilsithe / Cruthaithe: (2004)
The browser hacker's handbook /
de réir: Alcorn, Wade
Foilsithe / Cruthaithe: (2014)
de réir: Alcorn, Wade
Foilsithe / Cruthaithe: (2014)
Stealing the network how to own a continent /
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
InfoSec career hacking sell your skillz, not your soul /
de réir: Bayles, Aaron W.
Foilsithe / Cruthaithe: (2005)
de réir: Bayles, Aaron W.
Foilsithe / Cruthaithe: (2005)
Culture Hacker : reprogramming your employee experience to improve customer service, retention, and performance /
de réir: Green, Shane
Foilsithe / Cruthaithe: (2017)
de réir: Green, Shane
Foilsithe / Cruthaithe: (2017)
The Antivirus hacker's handbook /
de réir: Koret, Joxean, et al.
Foilsithe / Cruthaithe: (2015)
de réir: Koret, Joxean, et al.
Foilsithe / Cruthaithe: (2015)
A hacker manifesto
de réir: Wark, McKenzie, 1961-
Foilsithe / Cruthaithe: (2004)
de réir: Wark, McKenzie, 1961-
Foilsithe / Cruthaithe: (2004)
Web application defender's cookbook battling hackers and protecting users /
de réir: Barnett, Ryan C.
Foilsithe / Cruthaithe: (2013)
de réir: Barnett, Ryan C.
Foilsithe / Cruthaithe: (2013)
Medieval Hackers /
de réir: Kennedy, Kathleen E., 1975-
Foilsithe / Cruthaithe: (2020)
de réir: Kennedy, Kathleen E., 1975-
Foilsithe / Cruthaithe: (2020)
Hacking the art of exploitation /
de réir: Erickson, Jon, 1977-
Foilsithe / Cruthaithe: (2003)
de réir: Erickson, Jon, 1977-
Foilsithe / Cruthaithe: (2003)
Hacking the art of exploitation /
de réir: Erickson, Jon, 1977-
Foilsithe / Cruthaithe: (2008)
de réir: Erickson, Jon, 1977-
Foilsithe / Cruthaithe: (2008)
Hacking point of sale : payment application secrets, threats, and solutions /
de réir: Gomzin, Slava
Foilsithe / Cruthaithe: (2014)
de réir: Gomzin, Slava
Foilsithe / Cruthaithe: (2014)
Hacking for dummies
de réir: Beaver, Kevin
Foilsithe / Cruthaithe: (2013)
de réir: Beaver, Kevin
Foilsithe / Cruthaithe: (2013)
Social engineering the art of human hacking /
de réir: Hadnagy, Christopher
Foilsithe / Cruthaithe: (2011)
de réir: Hadnagy, Christopher
Foilsithe / Cruthaithe: (2011)
Stealing the network how to own a shadow /
de réir: Long, Johnny
Foilsithe / Cruthaithe: (2007)
de réir: Long, Johnny
Foilsithe / Cruthaithe: (2007)
Penetration testing : a hands-on introduction to hacking /
de réir: Weidman, Georgia
Foilsithe / Cruthaithe: (2014)
de réir: Weidman, Georgia
Foilsithe / Cruthaithe: (2014)
Defense against the black arts : how hackers do what they do and how to protect against it /
de réir: Varsalone, Jesse, et al.
Foilsithe / Cruthaithe: (2017)
de réir: Varsalone, Jesse, et al.
Foilsithe / Cruthaithe: (2017)
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
de réir: Engebretson, Pat (Patrick Henry), 1974-
Foilsithe / Cruthaithe: (2013)
de réir: Engebretson, Pat (Patrick Henry), 1974-
Foilsithe / Cruthaithe: (2013)
The ethics of cyberspace /
de réir: Hamelink, Cees J.
Foilsithe / Cruthaithe: (2000)
de réir: Hamelink, Cees J.
Foilsithe / Cruthaithe: (2000)
Wireless hacking projects for Wi-Fi enthusiasts /
de réir: Barken, Lee
Foilsithe / Cruthaithe: (2004)
de réir: Barken, Lee
Foilsithe / Cruthaithe: (2004)
Kali Linux social engineering /
de réir: Patel, Rahul Singh
Foilsithe / Cruthaithe: (2013)
de réir: Patel, Rahul Singh
Foilsithe / Cruthaithe: (2013)
CEH certified ethical hacker study guide /
de réir: Graves, Kimberly, 1974-
Foilsithe / Cruthaithe: (2010)
de réir: Graves, Kimberly, 1974-
Foilsithe / Cruthaithe: (2010)
Penetration tester's open source toolkit
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Stealing the network how to own an identity /
Foilsithe / Cruthaithe: (2005)
Foilsithe / Cruthaithe: (2005)
The ethics of cyberspace
de réir: Hamelink, Cees J., 1940-
Foilsithe / Cruthaithe: (2000)
de réir: Hamelink, Cees J., 1940-
Foilsithe / Cruthaithe: (2000)
Code hacking a developer's guide to network security /
de réir: Conway, Richard, 1974-
Foilsithe / Cruthaithe: (2004)
de réir: Conway, Richard, 1974-
Foilsithe / Cruthaithe: (2004)
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures /
de réir: Contos, Brian T.
Foilsithe / Cruthaithe: (2006)
de réir: Contos, Brian T.
Foilsithe / Cruthaithe: (2006)
Biohackers the politics of open science /
de réir: Delfanti, Alessandro
Foilsithe / Cruthaithe: (2013)
de réir: Delfanti, Alessandro
Foilsithe / Cruthaithe: (2013)
Hacking the hacker /
de réir: Grimes, Roger A.
Foilsithe / Cruthaithe: (2017)
de réir: Grimes, Roger A.
Foilsithe / Cruthaithe: (2017)
Respawn : gamers, hackers, and technogenic life /
de réir: Milburn, Colin, 1975-
Foilsithe / Cruthaithe: (2018)
de réir: Milburn, Colin, 1975-
Foilsithe / Cruthaithe: (2018)
Insider threat protecting the enterprise from sabotage, spying, and theft /
de réir: Cole, Eric
Foilsithe / Cruthaithe: (2006)
de réir: Cole, Eric
Foilsithe / Cruthaithe: (2006)
The CEH prep guide the comprehensive guide to certified ethical hacking /
de réir: Krutz, Ronald L., 1938-
Foilsithe / Cruthaithe: (2007)
de réir: Krutz, Ronald L., 1938-
Foilsithe / Cruthaithe: (2007)
Professional penetration testing creating and learning in a hacking lab /
de réir: Wilhelm, Thomas
Foilsithe / Cruthaithe: (2013)
de réir: Wilhelm, Thomas
Foilsithe / Cruthaithe: (2013)
Informatics in the Future Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015 /
Foilsithe / Cruthaithe: (2017)
Foilsithe / Cruthaithe: (2017)
Ethics in the virtual world the morality and psychology of gaming /
de réir: Young, Garry, 1966-
Foilsithe / Cruthaithe: (2013)
de réir: Young, Garry, 1966-
Foilsithe / Cruthaithe: (2013)
OS X for hackers at heart
Foilsithe / Cruthaithe: (2005)
Foilsithe / Cruthaithe: (2005)
Black hat Python : Python programming for hackers and pentesters /
de réir: Seitz, Justin
Foilsithe / Cruthaithe: (2015)
de réir: Seitz, Justin
Foilsithe / Cruthaithe: (2015)
God and the chip religion and the culture of technology /
de réir: Stahl, William A. (William Austin)
Foilsithe / Cruthaithe: (1999)
de réir: Stahl, William A. (William Austin)
Foilsithe / Cruthaithe: (1999)
Gray hat Python Python programming for hackers and reverse engineers /
de réir: Seitz, Justin
Foilsithe / Cruthaithe: (2009)
de réir: Seitz, Justin
Foilsithe / Cruthaithe: (2009)
Míreanna comhchosúla
-
Dear hacker letters to the editor of 2600 /
de réir: Goldstein, Emmanuel J.
Foilsithe / Cruthaithe: (2010) -
Game console hacking have fun while voiding your warranty /
de réir: Grand, Joe
Foilsithe / Cruthaithe: (2004) -
The browser hacker's handbook /
de réir: Alcorn, Wade
Foilsithe / Cruthaithe: (2014) -
Stealing the network how to own a continent /
Foilsithe / Cruthaithe: (2004) -
InfoSec career hacking sell your skillz, not your soul /
de réir: Bayles, Aaron W.
Foilsithe / Cruthaithe: (2005)