Books

20+ results found
Title Authors Description OpenBook ID
Hacking MySpace Hacking MySpace John Pospisil Get noticed. Get discovered.It's YourSpaceThere are over 90 million profiles on MySpace. How do you make yours stand out? You use these programming tricks and techniques to tweak the look, feel, and … OL12297391W
Science Fair Science Fair Dave Barry,Ridley Pearson The president of Kprshtskan is plotting to infiltrate the science fair at Hubble Middle School in Maryland in order to take over the United States government, but when Toby Harbinger, an ordinary stu… OL15032860W
La ética del hacker y el espíritu de la era de la información La ética del hacker y el espíritu de la era de la información Pekka Himanen En el centro de nuestra era tecnológica se hallan unas personas que se autodenominan hackers. Se definen a sí mismos como personas que se dedican a programar de manera apasionada y creen que es un de… OL15455848W
Kingpin Kingpin Kevin Poulsen Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise int… OL15473897W
Social Engineering Social Engineering Christopher Hadnagy Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats. OL16495169W
Cypherpunks, Freedom, and the Future of the Internet Cypherpunks, Freedom, and the Future of the Internet Julian Assange Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLe… OL16798689W
Open sources Open sources Richard Stallman,Bob Young,Eric S. Raymond,Larry Wall,Michael Tiemann,Linus Torvalds,Chris DiBona,Mark Stone,Tim O'Reilly,Paul Vixie,Sam Ockman,Scott Bradner,Jim Hamerly,Kirk McKusick,Tom Paquin,Bruce Perens,Brian Behlendorf Freely available source code, with contributions from thousands of programmers around the world: this is the spirit of the software revolution known as Open Source. Now, in Open Sources, for the firs… OL17075731W
Computer Science And It Investigating A Cyber Attack Computer Science And It Investigating A Cyber Attack James Stayte,Anne Rooney Describes the science and technology concepts used by cyber attack investigators, including information on hackers, identity theft, firewalls, computer forensics, and data recovery. OL17438904W
The Silence of Six The Silence of Six E.C. Myers “What is the silence of six, and what are you going to do about it?” These are the last words uttered by 17-year-old Max Stein’s best friend, Evan: Just moments after hacking into the live-streami… OL17590792W
Inherit the stars Inherit the stars Tony Peak After rescuing an alien artifact from deep space, salvager Kivita Vondir is gifted with the ability to hack computers and pilot starships by will alone, and now everyone in the Cettero Arm will stop … OL17899426W
City of halves City of halves Lucy Inglis Sixteen-year-old Lily is a skilled computer hacker looking for the man who faked a passport for her mother when she is attacked by a two-headed dog and rescued by the Eldritche Regan who plunges her … OL17900339W
The happy hackers The happy hackers Sandy Lanton Danny gets in big trouble with his computer. OL17919836W
Moving target Moving target J. A. Jance B. Simpson teams up with Sister Anselm to investigate a suspicious accident that has left a teen prison inmate severely burned, while in England, Ali Reynolds investigates the decades-old murder of L… OL19704982W
Nico Nico Sarah Castille Las Vegas Mafia boss Nico Toscani is used to getting what he wants, whether it is having the City of Sin under his rule or a beautiful woman in his bed. But when he meets his match in the gorgeous, h… OL19714351W
The downside The downside Mike Cooper "In an age of cybercrime, Finn is the last hardhat. He's a professional thief with a unique specialty: He only steals big things--autoracks, factory lines, machinery. You might call what he does "hea… OL19718499W
The bastard legion The bastard legion Gavin G. Smith Four hundred years in the future, the most dangerous criminals are kept in suspended animation aboard prison ships and "rehabilitated" in a shared virtual reality environment. But Miska Corbin, a thi… OL19731184W
Vanished Vanished Karen E. Olson "With a price on her head, computer hacker Tina Adler is determined to stay offline. Only one person knows how to reach her--and he's in as much danger as she is. A chance discovery leads Tina to aba… OL19732061W
Inside the enemy's computer Inside the enemy's computer Clement Guitton Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate curren… OL19754432W
Phantom Wheel Phantom Wheel Tracy Deebs Believing they have been recruited by the CIA, six teen hackers arrive in LA for a hacking aptitude test with the promise of a college scholarship and a job with the CIA after graduation. But one of … OL19761534W
Counterterrorism and Cybersecurity Counterterrorism and Cybersecurity Newton Lee Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. coun… OL19838272W
Next page