Books on the topic 'Computer networks – security measures. Computer hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer networks – security measures. Computer hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Erickson, Jon. Hacking: The Art of Exploitation. 2nd ed. 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hacking: The art of exploitation. 2nd ed. No Starch Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Whitaker, Andrew. Chained exploits: Advanced hacking attacks from start to finish. Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. 2nd ed. Course Technology, Cengage Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Christopher, Paggen, ed. LAN switch security: What hackers know about your switches. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hacking for dummies. 3rd ed. Wiley Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Live hacking. Ali Jahangiri, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Matthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Auerbach Publications, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chirillo, John. Hack attacks revealed: A complete reference for UNIX, Windows, and Linux with custom security toolkit. 2nd ed. Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. Course Technology, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Branigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Dissecting the hack: The forb1dd3n network. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Network Security Hacks: Tips & Tools for Protecting Your Privacy. 2nd ed. O'Reilly, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Network Security Hacks. O'Reilly, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Anjali, Sardana, ed. Honeypot: A new paradigm to information security. Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Workshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wu, Zhou, ed. Dian ji di qiu cun: Man tan shi jie hei ke = Dian ji di qiu cun : man tan shi jie hei ke. Jie fang jun chu ban she, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wang luo ru qin fang fan de li lun yu shi jian. Ji xie gong ye chu ban she, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Speed, Tim. The personal Internet security guidebook: Keeping hackers and crackers out of your home. Academic, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Schiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Schiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hacking for dummies. 2nd ed. Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hacking For Dummies. John Wiley & Sons, Ltd., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hacking For Dummies. John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hacking for dummies. Wiley Pub., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

author, Frichot Christian, Orrù Michele author, and Liao Xinyan translator, eds. Hai ke gong fang sheng jing: The browser hacker's handbook. Bo shuo wen hua gu fen you xian gong si, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jamsa, Kris A. Hacker proof: The ultimate guide to network security. 2nd ed. Thomson, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hacker proof: The ultimate guide to network security. Jamsa Pres, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Skoudis, Ed. Counter hack: A step-by-step guide to computer attacks and effective defenses. Prentice Hall PTR, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Street, Jayson E. Dissecting the hack: The f0rb1dd3n network. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kent, Nabors, ed. Dissecting the hack: The f0rb1dd3n network. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

The Hacker's Handbook. Taylor and Francis, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Melnichuk, David. Hacker's underground handbook: Learn how to hack and what it takes to crack even the most secure systems. Createspace, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Street, Jayson E. Dissecting the hack: The forb1dd3n network. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Street, Jayson E. Dissecting the hack: The forb1dd3n network. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

The hacker's handbook: The strategy behind breaking into and defending Networks. CRC Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Information security: A manager's guide to thwarting data thieves and hackers. Praeger Security International, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hardening network infrastructure: [bulletproof your systems before you are hacked!]. McGraw-Hill/Osborne, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

K. Hackers' Handbook. Carlton Books, Limited, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Publishing, Pearson Custom. Hacker Techniques, Tools And Incident Handling. Pearson Custom Publishing, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Hacking The Art Of Exploitation. No Starch Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Erickson, Jon. Hacking: The Art of Exploitation, 2nd Edition. 2nd ed. No Starch Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hacking: The Art of Exploitation. No Starch Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hacker Techniques, Tools, and Incident Handling. Jones & Bartlett Learning, LLC, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hacker Techniques, Tools, and Incident Handling. Jones & Bartlett Learning, LLC, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hacker Techniques, Tools, and Incident Handling. Jones & Bartlett Learning, LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Varsalone, Jesse. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It. Taylor & Francis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit. John Wiley & Sons, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Beckman, Kent. Hands on ethical Hacking and Network Defense. Stacy L. Hiquet, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography