Books on the topic 'Computer networks – security measures. Computer hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer networks – security measures. Computer hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Whitaker, Andrew. Chained exploits: Advanced hacking attacks from start to finish. Addison-Wesley, 2009.
Find full textKent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. 2nd ed. Course Technology, Cengage Learning, 2011.
Find full textChristopher, Paggen, ed. LAN switch security: What hackers know about your switches. Cisco Press, 2008.
Find full textMatthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Auerbach Publications, 2011.
Find full textChirillo, John. Hack attacks revealed: A complete reference for UNIX, Windows, and Linux with custom security toolkit. 2nd ed. Wiley Pub., 2002.
Find full textKent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. Course Technology, 2013.
Find full textBranigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.
Find full textHigh-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.
Find full textNetwork Security Hacks: Tips & Tools for Protecting Your Privacy. 2nd ed. O'Reilly, 2007.
Find full textAnjali, Sardana, ed. Honeypot: A new paradigm to information security. Science Publishers, 2011.
Find full textWorkshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.
Find full textWu, Zhou, ed. Dian ji di qiu cun: Man tan shi jie hei ke = Dian ji di qiu cun : man tan shi jie hei ke. Jie fang jun chu ban she, 2001.
Find full textSpeed, Tim. The personal Internet security guidebook: Keeping hackers and crackers out of your home. Academic, 2002.
Find full textSchiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.
Find full textSchiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.
Find full textauthor, Frichot Christian, Orrù Michele author, and Liao Xinyan translator, eds. Hai ke gong fang sheng jing: The browser hacker's handbook. Bo shuo wen hua gu fen you xian gong si, 2015.
Find full textJamsa, Kris A. Hacker proof: The ultimate guide to network security. 2nd ed. Thomson, 2002.
Find full textSkoudis, Ed. Counter hack: A step-by-step guide to computer attacks and effective defenses. Prentice Hall PTR, 2002.
Find full textMelnichuk, David. Hacker's underground handbook: Learn how to hack and what it takes to crack even the most secure systems. Createspace, 2010.
Find full textThe hacker's handbook: The strategy behind breaking into and defending Networks. CRC Press, 2004.
Find full textInformation security: A manager's guide to thwarting data thieves and hackers. Praeger Security International, 2008.
Find full textHardening network infrastructure: [bulletproof your systems before you are hacked!]. McGraw-Hill/Osborne, 2004.
Find full textPublishing, Pearson Custom. Hacker Techniques, Tools And Incident Handling. Pearson Custom Publishing, 2005.
Find full textErickson, Jon. Hacking: The Art of Exploitation, 2nd Edition. 2nd ed. No Starch Press, 2007.
Find full textHacker Techniques, Tools, and Incident Handling. Jones & Bartlett Learning, LLC, 2013.
Find full textHacker Techniques, Tools, and Incident Handling. Jones & Bartlett Learning, LLC, 2013.
Find full textHacker Techniques, Tools, and Incident Handling. Jones & Bartlett Learning, LLC, 2018.
Find full textVarsalone, Jesse. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It. Taylor & Francis, 2012.
Find full textHack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit. John Wiley & Sons, 2001.
Find full textBeckman, Kent. Hands on ethical Hacking and Network Defense. Stacy L. Hiquet, 2013.
Find full text