Search Results - hacker (computer security)

Refine Results
  1. 1
  2. 2

    Hacking the art of exploitation / by Erickson, Jon, 1977-

    Published 2003
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3

    Code hacking a developer's guide to network security / by Conway, Richard, 1974-

    Published 2004
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 4

    Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures / by Contos, Brian T.

    Published 2006
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5

    Hacking the art of exploitation / by Erickson, Jon, 1977-

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Hacking for dummies by Beaver, Kevin

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7

    Biohackers the politics of open science / by Delfanti, Alessandro

    Published 2013
    Subjects: “…Computer hackers.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8

    Hacking point of sale : payment application secrets, threats, and solutions / by Gomzin, Slava

    Published 2014
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9
  10. 10
  11. 11
  12. 12

    Web application defender's cookbook battling hackers and protecting users / by Barnett, Ryan C.

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 13

    iOS hacker's handbook

    Published 2012
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14

    Information security a manager's guide to thwarting data thieves and hackers / by Alexander, Philip, 1963-

    Published 2008
    Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 15

    Professional penetration testing creating and learning in a hacking lab / by Wilhelm, Thomas

    Published 2013
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16

    Penetration tester's open source toolkit

    Published 2006
    Subjects: “…Computer hackers.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  17. 17
  18. 18
  19. 19
  20. 20

    H4ckers5 wanted : an examination of the cybersecurity labor market / by Libicki, Martin C., Senty, David, Pollak, Julia

    Published 2014
    Subjects: “…Computer crimes Prevention.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook