Search Results - hacker (computer security)

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Hacking the art of exploitation / by Erickson, Jon, 1977-

    Published 2003
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 2

    Code hacking a developer's guide to network security / by Conway, Richard, 1974-

    Published 2004
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3

    Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures / by Contos, Brian T.

    Published 2006
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 4

    Hacking the art of exploitation / by Erickson, Jon, 1977-

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5

    Hacking for dummies by Beaver, Kevin

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Biohackers the politics of open science / by Delfanti, Alessandro

    Published 2013
    Subjects: “…Computer hackers.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7

    Hacking point of sale : payment application secrets, threats, and solutions / by Gomzin, Slava

    Published 2014
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8
  9. 9
  10. 10
  11. 11

    Web application defender's cookbook battling hackers and protecting users / by Barnett, Ryan C.

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 12

    Information security a manager's guide to thwarting data thieves and hackers / by Alexander, Philip, 1963-

    Published 2008
    Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 13

    Professional penetration testing creating and learning in a hacking lab / by Wilhelm, Thomas

    Published 2013
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14

    Penetration tester's open source toolkit

    Published 2006
    Subjects: “…Computer hackers.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 15
  16. 16
  17. 17

    The CEH prep guide the comprehensive guide to certified ethical hacking / by Krutz, Ronald L., 1938-

    Published 2007
    Subjects: “…Computer security Testing Examinations Study guides.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 18

    Cybersecurity ethics : an introduction / by Manjikian, Mary

    Published 2018
    Click here to view.
    eBook