Books

20+ results found
Title Authors Description OpenBook ID
The best of 2600 The best of 2600 Emmanuel Goldstein Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a co… OL11938512W
Synners Synners Pat Cadigan In Synners, the line between technology and humanity is hopelessly slim. A constant stream of new technology spawns crime before it hits the streets; the human mind and the external landscape have fu… OL12098201W
Hacking MySpace Hacking MySpace John Pospisil Get noticed. Get discovered.It's YourSpaceThere are over 90 million profiles on MySpace. How do you make yours stand out? You use these programming tricks and techniques to tweak the look, feel, and … OL12297391W
The web application hacker's handbook The web application hacker's handbook Dafydd Stuttard,Dafydd Stuttard This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ex… OL13814659W
The blue nowhere The blue nowhere Jeffery Deaver A sadistic computer hacker infiltrates people's computers and lures them to their deaths. The California State Police Computer Crimes Unit frees former hacker Wyatt Gillette to aid in their investiga… OL14927367W
Science Fair Science Fair Dave Barry,Ridley Pearson The president of Kprshtskan is plotting to infiltrate the science fair at Hubble Middle School in Maryland in order to take over the United States government, but when Toby Harbinger, an ordinary stu… OL15032860W
The CEH Prep Guide The CEH Prep Guide Ronald L. Krutz The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, … OL15172912W
La ética del hacker y el espíritu de la era de la información La ética del hacker y el espíritu de la era de la información Pekka Himanen En el centro de nuestra era tecnológica se hallan unas personas que se autodenominan hackers. Se definen a sí mismos como personas que se dedican a programar de manera apasionada y creen que es un de… OL15455848W
Kingpin Kingpin Kevin Poulsen Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise int… OL15473897W
Rootkit arsenal Rootkit arsenal Bill Blunden While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothol… OL16318402W
Social Engineering Social Engineering Christopher Hadnagy Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats. OL16495169W
Conscious capitalism Conscious capitalism John Mackey "We believe that business is good because it creates value, it is ethical because it is based on voluntary exchange, it is noble because it can elevate our existence, and it is heroic because it lift… OL16688991W
Cypherpunks, Freedom, and the Future of the Internet Cypherpunks, Freedom, and the Future of the Internet Julian Assange Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLe… OL16798689W
Fatal system error Fatal system error Joseph Menn From the Publisher: In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His gui… OL16963728W
Open sources Open sources Richard Stallman,Bob Young,Eric S. Raymond,Larry Wall,Michael Tiemann,Linus Torvalds,Chris DiBona,Mark Stone,Tim O'Reilly,Paul Vixie,Sam Ockman,Scott Bradner,Jim Hamerly,Kirk McKusick,Tom Paquin,Bruce Perens,Brian Behlendorf Freely available source code, with contributions from thousands of programmers around the world: this is the spirit of the software revolution known as Open Source. Now, in Open Sources, for the firs… OL17075731W
Blood vendetta Blood vendetta Don Pendleton "An American hacker becomes target number one after she accesses the account of a Russian mob boss, revealing his organization's terror plot against the U.S. by taking out its satellite system. She k… OL17192653W
Hacking Timbuktu Hacking Timbuktu Stephen Davies London sixteen-year-old Danny Temple and friend Omar use their computer and parkour skills to elude pursuers as they follow clues in an Arabic manuscript to the mysterious cliffs of Bandiagara in sub… OL17203531W
The Emperor's Revenge The Emperor's Revenge Clive Cussler,Boyd Morrison,Boyd Morrison "Juan Cabrillo and the Oregon crew face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation accounts. To get the money back, Juan joins force… OL17355883W
Computer Science And It Investigating A Cyber Attack Computer Science And It Investigating A Cyber Attack James Stayte,Anne Rooney Describes the science and technology concepts used by cyber attack investigators, including information on hackers, identity theft, firewalls, computer forensics, and data recovery. OL17438904W
The Silence of Six The Silence of Six E.C. Myers “What is the silence of six, and what are you going to do about it?” These are the last words uttered by 17-year-old Max Stein’s best friend, Evan: Just moments after hacking into the live-streami… OL17590792W
Next page