Books on the topic 'Computer hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Films for the Humanities (Firm) and Canadian Broadcasting Corporation, eds. Hackers. Princeton, N.J: Films for the Humanities and Sciences, 2005.
Find full textVerton, Dan. The hacker diaries: Confessions of teenage hackers. New York: McGraw-Hill/Osborne, 2002.
Find full textGoldstein, Emmanuel. Dear Hacker: Letters to the editor of 2600. Indianapolis, IN: Wiley Pub., 2010.
Find full text(Firm), Learning Channel, September Films, and Discovery Channel University, eds. Hackers: Outlaws and angels. Princeton, N.J: Films for the Humanities and Sciences, 2006.
Find full textLevy, Steven. Hackers: Heroes of the computer revolution. New York, N.Y: Penguin Books, 1994.
Find full textLevy, Steven. Hackers: Heroes of the computer revolution. New York, N.Y: Dell Pub., 1994.
Find full textStasi, Mafalda. God save the cyberpunk: Dichiarato morto al centro dell'imperio, il cyberpunk prospera nelle colonie. Bologna: Percorsi Synergon, 1993.
Find full textFadia, Ankit. Network security: A hacker's perspective. Cincinnati, Ohio: Premier Press, 2003.
Find full textTerry, Gudaitis, Jabbusch Jennifer, Rogers Russ, and Lowther Sean, eds. Low tech hacking: Street smarts for security professionals. Waltham, Mass: Syngress, 2012.
Find full textLong, Johnny. No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing. Burlington, Mass: Syngress, 2008.
Find full textBonsembiante, Fernando, and Raquel Roberti. Llaneros solitarios: Hackers, la guerrilla informática. Buenos Aires: Espasa Calpe, 1995.
Find full textGolose, Petrus Reinhard. Seputar kejahatan hacking: Teori dan studi kasus. Jakarta: Yayasan Pengembangan Kajian Ilmu Kepolisian, 2008.
Find full textLong, Johnny. No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing. Burlington, Mass: Syngress, 2008.
Find full textGolose, Petrus Reinhard. Seputar kejahatan hacking: Teori dan studi kasus. Jakarta: Yayasan Pengembangan Kajian Ilmu Kepolisian, 2008.
Find full textHafner, Katie. Cyberpunk: Outlaws and hackers on the computer frontier. New York: Simon & Schuster, 1995.
Find full textHafner, Katie. Cyberpunk: Outlaws and hackers on the computer frontier. New York: Simon & Schuster, 1991.
Find full textHafner, Katie. Cyberpunk: Outlaws and hackers on thecomputer frontier. New York: Simon & Schuster, 1991.
Find full textWestbrook, Charles L. The Kabalyon key: A novel from the Winston family chronicles. Greenville, N.C: Cathedrall Press, 2009.
Find full textZavršnik, Aleš, and Aleš Završnik. Kriminaliteta in tehnologija: Kako računalniki spreminjajo nadzor in zasebnost, ter kriminaliteto in kazenski pregon? Ljubljana: Inštitut za kriminologijo pri Pravni fakulteti v Ljubljani, 2010.
Find full textDreyfus, Suelette. Underground: Tales of hacking, madness, and obsession on the electronic frontier. Kew, Australia: Mandarin, 1997.
Find full textForno, Richard. The art of information warfare: Insight into the knowledge warrior philosophy. 2nd ed. [Parkland? Fla.]: Universal Publishers/UPUBLISH.COM, 1999.
Find full textJohn, Markoff, ed. Cyberpunk: Outlaws and hackers on the computer frontier. London: Fourth Estate, 1991.
Find full textJohn, Markoff, ed. Cyberpunk: Outlaws and hackers on the computer frontier. New York: Touchstone, 1995.
Find full textMyles, White John, ed. Machine learning for hackers. Sebastopol, CA: O'Reilly Media, 2012.
Find full textRooney, Anne. Computer science and IT: Investigating a cyber attack. Chicago, Ill: Capstone Heinemann Library, 2014.
Find full textCurry, Alexander. Classified : Computer Hacker's Guide: Computer Hackers Guide. Wilde Pub, 1993.
Find full textBandidos y hackers. Medellín [Colombia]: Universidad de Antioquia, División de Extensión Cultural, 2007.
Find full textGrimes, Roger A. Hacking the Hacker: Learn from the Experts Who Take down Hackers. Wiley & Sons, Limited, John, 2017.
Find full textGrimes, Roger A. Hacking the Hacker: Learn from the Experts Who Take down Hackers. Wiley & Sons, Incorporated, John, 2017.
Find full textGrimes, Roger A. Hacking the Hacker: Learn from the Experts Who Take down Hackers. Wiley & Sons, Incorporated, John, 2017.
Find full textLevy, Steven. Hackers: Heroes of the Computer Revolution. Penguin (Non-Classics), 2001.
Find full textLevy, Steven. Hackers: Heroes of the Computer Revolution. PENGUIN BOOKS LTD, 1994.
Find full textLevy, Steven. Hackers: Heroes of the Computer Revolution. O'Reilly Media, Incorporated, 2010.
Find full text