To see the other types of publications on this topic, follow the link: Computer hackers. Culture and technology.

Books on the topic 'Computer hackers. Culture and technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer hackers. Culture and technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Global, IGI, ed. Corporate hacking and technology-driven crime: Social dynamics and implications. IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hack Attacks Testing. John Wiley & Sons, Ltd., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hack attacks testing: How to conduct your own security audit. Wiley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hacking PhotoShop CS2. Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Shangara. Hacking Photoshop CS2. John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schell, Bernadette H. Webster's New World Hacker Dictionary. John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schell, Bernadette H. Webster's new world hacker dictionary. Wiley Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Orchard, Leslie Michael. Hacking RSS and Atom. Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Orchard, Leslie Michael. Hacking RSS and Atom. John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Reyes, Mel. Hacking Firefox. John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

The Ethical Hack. Taylor and Francis, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Goldstein, Emmanuel. The best of 2600: A hacker odyssey. Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Goldstein, Emmanuel. The Best of 2600. John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Shaping a digital world: Faith, culture and computer technology. IVP Academic, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Information security: A manager's guide to thwarting data thieves and hackers. Praeger Security International, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

L' informatique a-t-elle un sexe?: Hackers, mythes et réalités. Harmattan, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

The hacker's handbook: The strategy behind breaking into and defending Networks. CRC Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

The Hacker's Handbook. Taylor and Francis, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

M, Pender Terence, ed. Electronic and experimental music: Technology, music, and culture. 4th ed. Routledge, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Cyber attacks: Removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing roadblocks to investigation and information sharing, March 28, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Simon, William L. The Art of Deception: Controlling the Human Element of Security. Wiley Publishing, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Cyber attacks: The national protection plan and its privacy implications : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, One Hundred Sixth Congress, second session, on examining the vulnerability of U.S. systems to cyber attack, focusing on the administration's national plan for information systems protection and its implications regarding privacy, February 1, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Holmes, Thom. Electronic and experimental music: Technology, music, and culture. 3rd ed. Routledge, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Electronic and experimental music: Technology, music, and culture. 3rd ed. Routledge, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cross-cultural technology design: Crafting culture-sensitive technology for local users. Oxford University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hacking for dummies. 2nd ed. Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hacking For Dummies. John Wiley & Sons, Ltd., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Hacking For Dummies. John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hacking for dummies. Wiley Pub., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jr, Raphael Mandarino. Segurança e defesa do espaço cibernético brasileiro. Cubzac, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kearsley, Greg. Trainingfor tomorrow: Distributed learning through computer and communications technology. Addison-Wesley Pub. Co., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Training for tomorrow: Distributed learning through computer and communications technology. Addison-Wesley Pub. Co., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Cyber attacks: Removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing the roadblocks to investigation and information sharing, March 28, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Winkler, Hartmut. Docuverse: Zur Medientheorie der Computer. Boer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kingsley-Hughes, Kathie. Hacking GPS. John Wiley & Sons, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kingsley-Hughes, Kathie. Hacking GPS. Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

1951-, Dyer-Witheford Nick, and De Peuter Greig 1974-, eds. Digital games: The interaction of technology, culture, and marketing. McGill-Queen's University Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Masters of Doom: How two guys created an empire and transformed pop culture. Random House, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kayworth, T. R. (Timothy R.), ed. Global information systems: The implications of culture for IS management. Elsevier Butterworth-Heinemann, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Chirillo, John. Hack Attacks Testing: How to Conduct Your Own Security Audit. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hacker Culture. University of Minnesota Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Thomas, Douglas. Hacker Culture. University of Minnesota Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Defending Your Digital Assets Against Hackers, Crackers, Spies & Thieves. McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Rocchi, Paolo. Technology + Culture = Software. Ios Pr Inc, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

The CEH Prep Guide. John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gunkel, David J. Hacking Cyberspace. Westview Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hacker's Challenge. McGraw-Hill, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hacked: A radical approach to hacker culture and crime. NYU Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!