Books on the topic 'Pirates informatiques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Pirates informatiques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Nicolas, Danet, ed. Anonymous: Pirates informatiques ou altermondialistes numériques? : peuvent-ils changer le monde? FYP éditions, 2011.
Find full textCalce, Michael. Mafiaboy: How I cracked the Internet and why it's still broken. Viking Canada, 2008.
Find full textChatelain, Yannick. Marketing et cybercriminalité. Hermes science publications, 2000.
Find full textSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. HarperCollins Publishers, 1995.
Find full textauthor, Liu Bo, ed. Wang luo ying xiong zhuan zhi hei ke jue. Hua cheng chu ban she, 2019.
Find full textMatthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Auerbach Publications, 2011.
Find full textAnjali, Sardana, ed. Honeypot: A new paradigm to information security. Science Publishers, 2011.
Find full textChris, DiBona, Ockman Sam, and Stone Mark, eds. Open sources: Voices from the open source revolution. O'Reilly, 1999.
Find full textStallman, Richard, Bob Young, Larry Wall, et al. Open sources: Voices from the open source revolution. O'Reilly, 1999.
Find full textNataf, David, Yoann Vandoorselaere, Alexandre Golovanivsky, and Philippe Langlois. Chevaliers d'Internet et pirates informatiques. J'ai lu, 2001.
Find full textSilverman, Craig, and Michael Calce. Mafiaboy: A Portrait of the Hacker As a Young Man. Globe Pequot Press, The, 2011.
Find full textQuittner, Joshua, and Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.
Find full textGlenny, Misha. DarkMarket: Cyberthieves, Cybercops and You. Penguin Random House, 2011.
Find full textOriyano, Sean-Philip. Penetration Testing Essentials. Wiley & Sons, Incorporated, John, 2016.
Find full textJohnston, Andrew. Hacker's Guide to Project Management. Taylor & Francis Group, 2004.
Find full textJohnston, Andrew. Hacker's Guide to Project Management. Taylor & Francis Group, 2004.
Find full textJohnston, Andrew. Hacker's Guide to Project Management. Taylor & Francis Group, 2004.
Find full textJohnston, Andrew. Hacker's Guide to Project Management. Taylor & Francis Group, 2004.
Find full textMission-critical security planner: When hackers won't take no for an answer. Wiley Publishing, Inc., 2003.
Find full textVarsalone, Jesse, and Matthew McFadden. Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2011.
Find full textVarsalone, Jesse. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It. Taylor & Francis, 2012.
Find full textVarsalone, Jesse, and Matthew McFadden. Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2013.
Find full textVarsalone, Jesse, and Matthew McFadden. Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2011.
Find full textDefense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2017.
Find full textDefense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2011.
Find full textChirillo, John. Hack Attacks Testing: How to Conduct Your Own Security Audit. Wiley, 2002.
Find full textMitnick, Kevin D. Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Wiley & Sons, Incorporated, John, 2005.
Find full textMitnick, Kevin D. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley, 2005.
Find full textMitnick, Kevin D. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley, 2005.
Find full text