Books on the topic 'Computer hackers. Culture and technology'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer hackers. Culture and technology.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Global, IGI, ed. Corporate hacking and technology-driven crime: Social dynamics and implications. IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2011.
Find full textSchell, Bernadette H. Webster's New World Hacker Dictionary. John Wiley & Sons, Ltd., 2006.
Find full textSchiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.
Find full textSchiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.
Find full textShaping a digital world: Faith, culture and computer technology. IVP Academic, 2013.
Find full textInformation security: A manager's guide to thwarting data thieves and hackers. Praeger Security International, 2008.
Find full textL' informatique a-t-elle un sexe?: Hackers, mythes et réalités. Harmattan, 2006.
Find full textThe hacker's handbook: The strategy behind breaking into and defending Networks. CRC Press, 2004.
Find full textM, Pender Terence, ed. Electronic and experimental music: Technology, music, and culture. 4th ed. Routledge, 2012.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Cyber attacks: Removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing roadblocks to investigation and information sharing, March 28, 2000. U.S. G.P.O., 2001.
Find full textSimon, William L. The Art of Deception: Controlling the Human Element of Security. Wiley Publishing, 2003.
Find full textCyber attacks: The national protection plan and its privacy implications : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, One Hundred Sixth Congress, second session, on examining the vulnerability of U.S. systems to cyber attack, focusing on the administration's national plan for information systems protection and its implications regarding privacy, February 1, 2000. U.S. G.P.O., 2001.
Find full textHolmes, Thom. Electronic and experimental music: Technology, music, and culture. 3rd ed. Routledge, 2008.
Find full textElectronic and experimental music: Technology, music, and culture. 3rd ed. Routledge, 2008.
Find full textCross-cultural technology design: Crafting culture-sensitive technology for local users. Oxford University Press, 2012.
Find full textJr, Raphael Mandarino. Segurança e defesa do espaço cibernético brasileiro. Cubzac, 2010.
Find full textKearsley, Greg. Trainingfor tomorrow: Distributed learning through computer and communications technology. Addison-Wesley Pub. Co., 1985.
Find full textTraining for tomorrow: Distributed learning through computer and communications technology. Addison-Wesley Pub. Co., 1985.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Cyber attacks: Removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing the roadblocks to investigation and information sharing, March 28, 2000. U.S. G.P.O., 2001.
Find full text1951-, Dyer-Witheford Nick, and De Peuter Greig 1974-, eds. Digital games: The interaction of technology, culture, and marketing. McGill-Queen's University Press, 2003.
Find full textMasters of Doom: How two guys created an empire and transformed pop culture. Random House, 2003.
Find full textKayworth, T. R. (Timothy R.), ed. Global information systems: The implications of culture for IS management. Elsevier Butterworth-Heinemann, 2008.
Find full textChirillo, John. Hack Attacks Testing: How to Conduct Your Own Security Audit. Wiley, 2002.
Find full textDefending Your Digital Assets Against Hackers, Crackers, Spies & Thieves. McGraw-Hill, 2001.
Find full text