Search Results - hacker (computer security)
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 28
- Computer hackers 20
- Security measures 18
- Computer networks 16
- Computer crimes 5
- Penetration testing (Computer security) 3
- Prevention 3
- Testing 3
- Application software 2
- Examinations 2
- Internet 2
- Python (Computer program language) 2
- Web sites 2
- Access control 1
- Business enterprises 1
- Certification 1
- Commercial crimes 1
- Computer software 1
- Cyberterrorism 1
- Data protection 1
- Design 1
- Development 1
- Electronic commerce 1
- Electronic data processing personnel 1
- Electronic information resources 1
- Human-computer interaction 1
- Identity theft 1
- Information technology 1
- Investigation 1
- Operating systems (Computers) 1
-
1
Dear hacker letters to the editor of 2600 /
Published 2010Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
-
3
Stealing the network how to own a continent /
Published 2004Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
InfoSec career hacking sell your skillz, not your soul /
Published 2005Subjects: “…Computer hackers.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Hacking the art of exploitation /
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Code hacking a developer's guide to network security /
Published 2004Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures /
Published 2006Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Hacking the art of exploitation /
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Hacking for dummies
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Biohackers the politics of open science /
Published 2013Subjects: “…Computer hackers.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Cyber adversary characterization auditing the hacker mind /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Invasion of privacy! big brother and the company hackers /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Insider threat protecting the enterprise from sabotage, spying, and theft /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Oracle 11g anti-hacker's cookbook
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Web application defender's cookbook battling hackers and protecting users /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
iOS hacker's handbook
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Information security a manager's guide to thwarting data thieves and hackers /
Published 2008Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Stealing the network how to own a shadow /
Published 2007Subjects: “…Computer hackers Fiction.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Social engineering the art of human hacking /
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Professional penetration testing creating and learning in a hacking lab /
Published 2013Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook