Search Results - hacker (computer security)

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Biohackers the politics of open science / by Delfanti, Alessandro

    Published 2013
    Subjects: “…Computer hackers.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 2

    Information security a manager's guide to thwarting data thieves and hackers / by Alexander, Philip, 1963-

    Published 2008
    Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3

    H4ckers5 wanted : an examination of the cybersecurity labor market / by Libicki, Martin C., Senty, David, Pollak, Julia

    Published 2014
    Subjects: “…Computer crimes Prevention.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 4

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook