Search Results - hacker (computer security)
Suggested Topics within your search.
Suggested Topics within your search.
- Computer crimes
- Computer hackers 4
- Prevention 4
- Security measures 4
- Computer networks 3
- Computer security 2
- Penetration testing (Computer security) 2
- Computer software 1
- Cyberspace 1
- Hackers 1
- Identity theft 1
- Internet 1
- Investigation 1
- Moral and ethical aspects 1
- Professions 1
- Psychology 1
- Supply and demand 1
- Testing 1
- Web applications 1
- Web sites 1
-
1
Web application defender's cookbook battling hackers and protecting users /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Stealing the network how to own an identity /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
The basics of web hacking tools and techniques to attack the Web /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
H4ckers5 wanted : an examination of the cybersecurity labor market /
Published 2014Subjects: “…Computer crimes Prevention.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7