Search Results - hacker (computer security)
Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Security measures 17
- Computer security 15
- Computer hackers 14
- Computer crimes 3
- Examinations 2
- Penetration testing (Computer security) 2
- Prevention 2
- Testing 2
- Access control 1
- Business enterprises 1
- Certification 1
- Commercial crimes 1
- Data protection 1
- Electronic data processing personnel 1
- Electronic information resources 1
- Information technology 1
- Internet 1
- Moral and ethical aspects 1
- Web applications 1
- Web sites 1
-
1
Hacking the art of exploitation /
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Code hacking a developer's guide to network security /
Published 2004Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures /
Published 2006Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Hacking the art of exploitation /
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Hacking for dummies
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Biohackers the politics of open science /
Published 2013Subjects: “…Computer hackers.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Hacking point of sale : payment application secrets, threats, and solutions /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Cyber adversary characterization auditing the hacker mind /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Invasion of privacy! big brother and the company hackers /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Insider threat protecting the enterprise from sabotage, spying, and theft /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Web application defender's cookbook battling hackers and protecting users /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Information security a manager's guide to thwarting data thieves and hackers /
Published 2008Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Professional penetration testing creating and learning in a hacking lab /
Published 2013Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Penetration tester's open source toolkit
Published 2006Subjects: “…Computer hackers.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
CEH certified ethical hacker study guide /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
The basics of web hacking tools and techniques to attack the Web /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
The CEH prep guide the comprehensive guide to certified ethical hacking /
Published 2007Subjects: “…Computer security Testing Examinations Study guides.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18