You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

books.hacking.csv 10KB

BookBooks > Non-Fiction > Hacking9781416507The Cuckoo's EggUpdated with a new afterword, a true-life account of computer espionage tells of a year-long single-handed hunt for a computer thief known as "Hunter," a hacker who stole sensitive security and military information from American computer ...Book partner97814165079.9914
BookBooks > Non-Fiction > Hacking9780316037Ghost in the WiresGhost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ...Book partner978031603710.9956
BookBooks > Non-Fiction > Hacking9780471782The Art of IntrusionMitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A ...Book partner978047178224.9957
BookBooks > Non-Fiction > Hacking9781593270Hackingthe art of exploitation. More No-Nonsense Books from NO STARCH PRESS WRITE GREAT CODE Understanding the Machine by randall hyde Today's programmers are often narrowly trained because the industry moves too fast. This book ...Book partner97815932709.9990
BookBooks > Non-Fiction > Hacking9780553563The Hacker CrackdownA journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings. Reprint.Book partner978055356328.9935
BookBooks > Non-Fiction > Hacking9780141000HackersInterviews with the unconventional computer geniuses who were responsible for the computer revolution reveal the inside story and the shared ideals that motivated them. Reprint.Book partner978014100016.9945
BookBooks > Non-Fiction > Hacking9780596006Hackers & paintersThe author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more.Book partner97805960069.990
BookBooks > Non-Fiction > Hacking9780307588KingpinDocuments how a troubled young computer hacker seized control of a massive international computer fraud network in 2006, tracing the efforts of Non-FBI and Secret Service agents as well as an undercover operator to locate and arrest him.Book partner978030758827.9983
BookBooks > Non-Fiction > Hacking9780764542The Art of DeceptionBut in his own eyes, Mitnick was simply a small-time con artist with an incredible memory [and] a knack for social engineering… This is Mitnick’s account, complete with advice for how to protect yourself from similar attacks.Book partner978076454217.996
BookBooks > Non-Fiction > Hacking9780072260Hacking Exposed Non-Fifth EditionShould be required reading for anyone with a server or a network to secure." Bill Machrone, "PC Magazine," "With every edition this book keeps getting better and better.Book partner97800722602.9992
BookBooks > Non-Fiction > Hacking9780060926The Masters of DeceptionChronicles the cyberspace battle between rival gangs of hackers in Texas and New York, detailing the groups' exploits and discussing the legal and ethical implications of new computer technologyBook partner978006092627.9918
BookBooks > Non-Fiction > Hacking9780596001The Cathedral & the BazaarArgues that the development of Linux by thousands of programmers, in a coordinated effort without centralized management signals unprecedented power shifts in the computer industry.Book partner978059600110.9912
BookBooks > Non-Fiction > Hacking9780765319Little BrotherZit took the fore. “We seem to have gotten off to a bad start. We identified your son as someone with a nonstandard public transit usage pattern,as part of a new proactive enforcement program. When we spot people whose travels are unusual , ...Book partner97807653192.9992
BookBooks > Non-Fiction > Hacking9780470639Social Engineering... Published by Wiley Publishing, Inc.,Indianapolis, Indiana Published simultaneously inCanada ISBN: 9780470639 ISBN: 9781118028 (ebk) ISBN: 9781118029(ebk) ISBN: 9781118029 (ebk) Manufactured in the United States ...Book partner97804706399.9955
BookBooks > Non-Fiction > Hacking9780316213We Are AnonymousWE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.Book partner978031621327.9947
BookBooks > Non-Fiction > Hacking9781593272Metasploit"The Metasploit Non-Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless.Book partner978159327218.9922
BookBooks > Non-Fiction > Hacking9780307269The Girl with the Dragon TattooNon-Forty years after the disappearance of Harriet Vanger from the secluded island owned and inhabited by the powerful Vanger family, her octogenarian uncle hires journalist Mikael Blomqvist and Lisbeth Salander, an unconventional young hacker, ...Book partner978030726924.997
BookBooks > Non-Fiction > Hacking9781591843Hacking WorkIn a fresh approach to work, the authors explain how professionals can: use their own tools and technologies instead of what the company mandates; cut through red tape; circumvent almost any company rule to work smarter, not harder; and ...Book partner97815918436.993
BookBooks > Non-Fiction > Hacking9781593270Silence On The WireA Non-Field Guide To Passive Reconnaissance And Indirect Attacks Michal Zalewski. have no way of telling what is stored in a cookie. A server can choose to assign a unique identifier to a client using the Set-Cookie header and then read it back ...Book partner97815932704.9954
BookBooks > Non-Fiction > Hacking9781931836Google Hacking*Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing.Book partner97819318360.9919
BookBooks > Non-Fiction > Hacking9780201914Hacker's Delight"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades.Book partner978020191413.9983
BookBooks > Non-Fiction > Hacking9780553380Snow CrashNeal Stephenson is such a writer and Snow Crash is such a novel, weaving virtual reality, Sumerian myth, and just about everything in between with a cool, hip cybersensibility to bring us the gigathriller of the information age.Book partner97805533807.9927
BookBooks > Non-Fiction > Hacking9780307269The Girl Who Kicked the Hornet's NestWhile recovering in the hospital, Lisbeth Salander enlists the aid of journalist Mikael Blomkvist to prove her innocent of three murders and identify the corrupt politicians who have allowed her to suffer, and, on her own, Lisbeth plots ...Book partner978030726915.9955
BookBooks > Non-Fiction > Hacking9780471128Applied cryptography. . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . .Book partner97804711283.9973
BookBooks > Non-Fiction > Hacking9780684818CyberpunkUsing the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find -- ...Book partner978068481822.9936
BookBooks > Non-Fiction > Hacking9780764574ReversingThat's exactly what this book shows you--how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts.Book partner97807645743.9956
BookBooks > Non-Fiction > Hacking9780307269The Girl Who Played with Non-FireLisbeth Salander is a wanted woman. Two Millennium journalists about to expose the truth about sex trafficking in Sweden are murdered, and Salander's prints are on the weapon.Book partner978030726912.9981
BookBooks > Non-Fiction > Hacking9780072257Gray Hat HackingMalicious hackers are dedicated to bringing about mayhem and destruction--this book will teach you how to identify and stop them.Book partner978007225712.9994
BookBooks > Non-Fiction > Hacking9780131481Studyguide for Counter Hack ReloadedCram101 Textbook Outlines gives all of the outlines, highlights, notes for your textbook with optional online practice tests. Only Cram101 Outlines are Textbook Specific. Cram101 is NOT the Textbook. Accompanys: 9780131481 .Book partner978013148115.997
BookBooks > Non-Fiction > Hacking9780970978Visual Guide to Lock PickingBy reading this book, practicing, and applying the methods introduced, you can successfully master picking most modern locks. This book makes it easy and gives you the edge to quickly learn and start picking locks today.Book partner978097097824.9994
BookBooks > Non-Fiction > Hacking9781430219Coders at WorkReflections on the Craft of Programming Peter Seibel. and get working first that will help you to do the next step and build stuff up from there. In these cases, it was a matter of getting outside the box. That's a way of asserting that you've ...Book partner978143021919.9986
BookBooks > Non-Fiction > Hacking9780072262Hacking Exposed WirelessThis is an invaluable resource for any IT professional who works with wireless technology.Book partner978007226223.9997
BookBooks > Non-Fiction > Hacking9780764544The shellcoder's handbook" The Shellcoder's Handbook shows you how to: Non-Find out where security holes come from and how to close them so they never occur againPinpoint vulnerabilities in popular operating systems (including Windows(R), Linux(R), and SolarisTM) and ...Book partner97807645449.9942