Search Results - hacker (computer security)
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures
- Computer networks 17
- Computer security 16
- Computer hackers 13
- Computer crimes 4
- Prevention 4
- Internet 3
- Cyberspace 2
- Penetration testing (Computer security) 2
- Testing 2
- Access control 1
- Android (Electronic resource) 1
- Application software 1
- Business enterprises 1
- Commercial crimes 1
- Conflict management 1
- Crisis management 1
- Cyberterrorism 1
- Data protection 1
- Decision making 1
- Development 1
- Electronic commerce 1
- Electronic information resources 1
- Escalation (Military science) 1
- Examinations 1
- Government policy 1
- Hackers 1
- Information technology 1
- Information warfare 1
- Mobile apps 1
-
1
-
2
Hacking the art of exploitation /
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Code hacking a developer's guide to network security /
Published 2004Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures /
Published 2006Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Hacking the art of exploitation /
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Hacking for dummies
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Biohackers the politics of open science /
Published 2013Subjects: “…Computer hackers.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Hacking point of sale : payment application secrets, threats, and solutions /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Cyber adversary characterization auditing the hacker mind /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Invasion of privacy! big brother and the company hackers /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Insider threat protecting the enterprise from sabotage, spying, and theft /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Web application defender's cookbook battling hackers and protecting users /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
iOS hacker's handbook
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Information security a manager's guide to thwarting data thieves and hackers /
Published 2008Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Professional penetration testing creating and learning in a hacking lab /
Published 2013Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Penetration tester's open source toolkit
Published 2006Subjects: “…Computer hackers.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
-
18
The basics of web hacking tools and techniques to attack the Web /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
The mobile application hacker's handbook /
Published 2015An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
H4ckers5 wanted : an examination of the cybersecurity labor market /
Published 2014Subjects: “…Computer crimes Prevention.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook