|
Hacking MySpace
|
John Pospisil |
Get noticed. Get discovered.It's YourSpaceThere are over 90 million profiles on MySpace. How do you make yours stand out? You use these programming tricks and techniques to tweak the look, feel, and … |
OL12297391W |
|
Science Fair
|
Dave Barry,Ridley Pearson |
The president of Kprshtskan is plotting to infiltrate the science fair at Hubble Middle School in Maryland in order to take over the United States government, but when Toby Harbinger, an ordinary stu… |
OL15032860W |
|
La ética del hacker y el espíritu de la era de la información
|
Pekka Himanen |
En el centro de nuestra era tecnológica se hallan unas personas que se autodenominan hackers. Se definen a sí mismos como personas que se dedican a programar de manera apasionada y creen que es un de… |
OL15455848W |
|
Kingpin
|
Kevin Poulsen |
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise int… |
OL15473897W |
|
Social Engineering
|
Christopher Hadnagy |
Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats. |
OL16495169W |
|
Cypherpunks, Freedom, and the Future of the Internet
|
Julian Assange |
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLe… |
OL16798689W |
|
Open sources
|
Richard Stallman,Bob Young,Eric S. Raymond,Larry Wall,Michael Tiemann,Linus Torvalds,Chris DiBona,Mark Stone,Tim O'Reilly,Paul Vixie,Sam Ockman,Scott Bradner,Jim Hamerly,Kirk McKusick,Tom Paquin,Bruce Perens,Brian Behlendorf |
Freely available source code, with contributions from thousands of programmers around the world: this is the spirit of the software revolution known as Open Source. Now, in Open Sources, for the firs… |
OL17075731W |
|
Computer Science And It Investigating A Cyber Attack
|
James Stayte,Anne Rooney |
Describes the science and technology concepts used by cyber attack investigators, including information on hackers, identity theft, firewalls, computer forensics, and data recovery. |
OL17438904W |
|
The Silence of Six
|
E.C. Myers |
“What is the silence of six, and what are you going to do about it?”
These are the last words uttered by 17-year-old Max Stein’s best friend, Evan: Just moments after hacking into the live-streami… |
OL17590792W |
|
Inherit the stars
|
Tony Peak |
After rescuing an alien artifact from deep space, salvager Kivita Vondir is gifted with the ability to hack computers and pilot starships by will alone, and now everyone in the Cettero Arm will stop … |
OL17899426W |
|
City of halves
|
Lucy Inglis |
Sixteen-year-old Lily is a skilled computer hacker looking for the man who faked a passport for her mother when she is attacked by a two-headed dog and rescued by the Eldritche Regan who plunges her … |
OL17900339W |
|
The happy hackers
|
Sandy Lanton |
Danny gets in big trouble with his computer. |
OL17919836W |
|
Moving target
|
J. A. Jance |
B. Simpson teams up with Sister Anselm to investigate a suspicious accident that has left a teen prison inmate severely burned, while in England, Ali Reynolds investigates the decades-old murder of L… |
OL19704982W |
|
Nico
|
Sarah Castille |
Las Vegas Mafia boss Nico Toscani is used to getting what he wants, whether it is having the City of Sin under his rule or a beautiful woman in his bed. But when he meets his match in the gorgeous, h… |
OL19714351W |
|
The downside
|
Mike Cooper |
"In an age of cybercrime, Finn is the last hardhat. He's a professional thief with a unique specialty: He only steals big things--autoracks, factory lines, machinery. You might call what he does "hea… |
OL19718499W |
|
The bastard legion
|
Gavin G. Smith |
Four hundred years in the future, the most dangerous criminals are kept in suspended animation aboard prison ships and "rehabilitated" in a shared virtual reality environment. But Miska Corbin, a thi… |
OL19731184W |
|
Vanished
|
Karen E. Olson |
"With a price on her head, computer hacker Tina Adler is determined to stay offline. Only one person knows how to reach her--and he's in as much danger as she is. A chance discovery leads Tina to aba… |
OL19732061W |
|
Inside the enemy's computer
|
Clement Guitton |
Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate curren… |
OL19754432W |
|
Phantom Wheel
|
Tracy Deebs |
Believing they have been recruited by the CIA, six teen hackers arrive in LA for a hacking aptitude test with the promise of a college scholarship and a job with the CIA after graduation. But one of … |
OL19761534W |
|
Counterterrorism and Cybersecurity
|
Newton Lee |
Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. coun… |
OL19838272W |