To see the other types of publications on this topic, follow the link: Pirates informatiques.

Books on the topic 'Pirates informatiques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Pirates informatiques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Nicolas, Danet, ed. Anonymous: Pirates informatiques ou altermondialistes numériques? : peuvent-ils changer le monde? FYP éditions, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Calce, Michael. Mafiaboy: How I cracked the Internet and why it's still broken. Viking Canada, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chatelain, Yannick. Marketing et cybercriminalité. Hermes science publications, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Slatalla, Michelle. Masters of deception: The gang that ruled cyberspace. HarperCollins Publishers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ouimet, Josée. Sur les traces des caméléons. Vents d'Ouest, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

author, Liu Bo, ed. Wang luo ying xiong zhuan zhi hei ke jue. Hua cheng chu ban she, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gomez-Urbina, Alexandre. Hacking interdit. 4th ed. Micro Application, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Matthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Auerbach Publications, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anjali, Sardana, ed. Honeypot: A new paradigm to information security. Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Villeneuve, Michel. Alex et les cyberpirates. Hurtubise HMH, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Chris, DiBona, Ockman Sam, and Stone Mark, eds. Open sources: Voices from the open source revolution. O'Reilly, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Stallman, Richard, Bob Young, Larry Wall, et al. Open sources: Voices from the open source revolution. O'Reilly, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Nataf, David, Yoann Vandoorselaere, Alexandre Golovanivsky, and Philippe Langlois. Chevaliers d'Internet et pirates informatiques. J'ai lu, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Tisserand, Isabelle N. Hacking à coeur. E-Dite, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

The Hacking of America: Who's Doing It, Why, and How. Quorum Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Silverman, Craig, and Michael Calce. Mafiaboy. Globe Pequot Press, The, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Silverman, Craig, and Michael Calce. Mafiaboy: A Portrait of the Hacker As a Young Man. Globe Pequot Press, The, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Masters of Deception. Bt Bound, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Quittner, Joshua, and Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Glenny, Misha. DarkMarket: Cyberthieves, Cybercops and You. Penguin Random House, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Penetration Testing Essentials. Wiley & Sons, Incorporated, John, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Penetration Testing Essentials. Wiley & Sons, Incorporated, John, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Oriyano, Sean-Philip. Penetration Testing Essentials. Wiley & Sons, Incorporated, John, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hacker's Guide to Project Management. Taylor & Francis Group, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Johnston, Andrew. Hacker's Guide to Project Management. Taylor & Francis Group, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Johnston, Andrew. Hacker's Guide to Project Management. Taylor & Francis Group, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Johnston, Andrew. Hacker's Guide to Project Management. Taylor & Francis Group, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Johnston, Andrew. Hacker's Guide to Project Management. Taylor & Francis Group, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Mission-critical security planner: When hackers won't take no for an answer. Wiley Publishing, Inc., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Varsalone, Jesse, and Matthew McFadden. Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Varsalone, Jesse. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It. Taylor & Francis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Varsalone, Jesse, and Matthew McFadden. Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Varsalone, Jesse, and Matthew McFadden. Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Medieval Hackers. Punctum Books, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Vinatier, Emmanuel. Hacking. Micro Application, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hack Attacks Testing. John Wiley & Sons, Ltd., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chirillo, John. Hack Attacks Testing: How to Conduct Your Own Security Audit. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hack attacks testing: How to conduct your own security audit. Wiley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hackers: Crime in the Digital Sublime. Routledge, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Hackers: Crime in the Digital Sublime. Routledge, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gunkel, David J. Hacking Cyberspace. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Gunkel, David J. Hacking Cyberspace. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Gunkel, David J. Hacking Cyberspace. Avalon Publishing, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Gunkel, David J. Hacking Cyberspace. Westview Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Mitnick, Kevin D. Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Wiley & Sons, Incorporated, John, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

The Art of Intrusion. John Wiley & Sons, Ltd., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Mitnick, Kevin D. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mitnick, Kevin D. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!