Search Results - hacker (computer security)
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 33
- Security measures 22
- Computer hackers 21
- Computer networks 17
- Computer crimes 6
- Prevention 6
- Penetration testing (Computer security) 4
- Python (Computer program language) 3
- Testing 3
- Application software 2
- Cyberspace 2
- Cyberterrorism 2
- Examinations 2
- Hackers 2
- Hacking 2
- Information technology 2
- Internet 2
- Operating systems (Computers) 2
- Social engineering 2
- Web sites 2
- Access control 1
- Android (Electronic resource) 1
- Biological laboratories 1
- Business enterprises 1
- COMPUTERS / Cryptography 1
- COMPUTERS / Internet / Security 1
- COMPUTERS / Networking / Security 1
- COVID-19 Pandemic, 2020- 1
- Certification 1
- Civil rights 1
-
1
Dear hacker letters to the editor of 2600 /
Published 2010Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Hacking the hacker /
Published 2017An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
-
4
Stealing the network how to own a continent /
Published 2004Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
InfoSec career hacking sell your skillz, not your soul /
Published 2005Subjects: “…Computer hackers.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Hacking the art of exploitation /
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Code hacking a developer's guide to network security /
Published 2004Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures /
Published 2006Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Hacking the art of exploitation /
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Hacking for dummies
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Biohackers the politics of open science /
Published 2013Subjects: “…Computer hackers.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Hacking point of sale : payment application secrets, threats, and solutions /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Cyber adversary characterization auditing the hacker mind /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Invasion of privacy! big brother and the company hackers /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Insider threat protecting the enterprise from sabotage, spying, and theft /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Oracle 11g anti-hacker's cookbook
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Web application defender's cookbook battling hackers and protecting users /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
iOS hacker's handbook
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Information security a manager's guide to thwarting data thieves and hackers /
Published 2008Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Stealing the network how to own a shadow /
Published 2007Subjects: “…Computer hackers Fiction.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook