|
The best of 2600
|
Emmanuel Goldstein |
Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a co… |
OL11938512W |
|
Synners
|
Pat Cadigan |
In Synners, the line between technology and humanity is hopelessly slim. A constant stream of new technology spawns crime before it hits the streets; the human mind and the external landscape have fu… |
OL12098201W |
|
Hacking MySpace
|
John Pospisil |
Get noticed. Get discovered.It's YourSpaceThere are over 90 million profiles on MySpace. How do you make yours stand out? You use these programming tricks and techniques to tweak the look, feel, and … |
OL12297391W |
|
The web application hacker's handbook
|
Dafydd Stuttard,Dafydd Stuttard |
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ex… |
OL13814659W |
|
The blue nowhere
|
Jeffery Deaver |
A sadistic computer hacker infiltrates people's computers and lures them to their deaths. The California State Police Computer Crimes Unit frees former hacker Wyatt Gillette to aid in their investiga… |
OL14927367W |
|
Science Fair
|
Dave Barry,Ridley Pearson |
The president of Kprshtskan is plotting to infiltrate the science fair at Hubble Middle School in Maryland in order to take over the United States government, but when Toby Harbinger, an ordinary stu… |
OL15032860W |
|
The CEH Prep Guide
|
Ronald L. Krutz |
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, … |
OL15172912W |
|
La ética del hacker y el espíritu de la era de la información
|
Pekka Himanen |
En el centro de nuestra era tecnológica se hallan unas personas que se autodenominan hackers. Se definen a sí mismos como personas que se dedican a programar de manera apasionada y creen que es un de… |
OL15455848W |
|
Kingpin
|
Kevin Poulsen |
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise int… |
OL15473897W |
|
Rootkit arsenal
|
Bill Blunden |
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothol… |
OL16318402W |
|
Social Engineering
|
Christopher Hadnagy |
Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats. |
OL16495169W |
|
Conscious capitalism
|
John Mackey |
"We believe that business is good because it creates value, it is ethical because it is based on voluntary exchange, it is noble because it can elevate our existence, and it is heroic because it lift… |
OL16688991W |
|
Cypherpunks, Freedom, and the Future of the Internet
|
Julian Assange |
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLe… |
OL16798689W |
|
Fatal system error
|
Joseph Menn |
From the Publisher: In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His gui… |
OL16963728W |
|
Open sources
|
Richard Stallman,Bob Young,Eric S. Raymond,Larry Wall,Michael Tiemann,Linus Torvalds,Chris DiBona,Mark Stone,Tim O'Reilly,Paul Vixie,Sam Ockman,Scott Bradner,Jim Hamerly,Kirk McKusick,Tom Paquin,Bruce Perens,Brian Behlendorf |
Freely available source code, with contributions from thousands of programmers around the world: this is the spirit of the software revolution known as Open Source. Now, in Open Sources, for the firs… |
OL17075731W |
|
Blood vendetta
|
Don Pendleton |
"An American hacker becomes target number one after she accesses the account of a Russian mob boss, revealing his organization's terror plot against the U.S. by taking out its satellite system. She k… |
OL17192653W |
|
Hacking Timbuktu
|
Stephen Davies |
London sixteen-year-old Danny Temple and friend Omar use their computer and parkour skills to elude pursuers as they follow clues in an Arabic manuscript to the mysterious cliffs of Bandiagara in sub… |
OL17203531W |
|
The Emperor's Revenge
|
Clive Cussler,Boyd Morrison,Boyd Morrison |
"Juan Cabrillo and the Oregon crew face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation accounts. To get the money back, Juan joins force… |
OL17355883W |
|
Computer Science And It Investigating A Cyber Attack
|
James Stayte,Anne Rooney |
Describes the science and technology concepts used by cyber attack investigators, including information on hackers, identity theft, firewalls, computer forensics, and data recovery. |
OL17438904W |
|
The Silence of Six
|
E.C. Myers |
“What is the silence of six, and what are you going to do about it?”
These are the last words uttered by 17-year-old Max Stein’s best friend, Evan: Just moments after hacking into the live-streami… |
OL17590792W |