|
1.
|
High-tech crimes revealed : cyberwar stories from the digital front
by Branigan, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
2.
|
Neuromancer
by Gibson, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Ace Books, 1984Availability: Items available for loan: [Call number: 808.83 GIB] (2). Checked out (1).
|
|
3.
|
Hacking : the art of exploitation
by Erickson, Jon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2003Availability: Items available for loan: [Call number: 005.8 ERI] (1).
|
|
4.
|
Stealing the network : how to own continent
by Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 RUS] (1).
|
|
5.
|
Gray hat hacking : the ethical hacker's handbook
by Harris, Shon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
6.
|
Art of deception : controlling the human element of security
by Simon, William L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
7.
|
Exploiting software : how to break code
by Gary, McGraw | McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Higher Education, 2004Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
8.
|
We are Anonymous : inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency
by Olson, Parmy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Little, Brown and Company, 2012Availability: Items available for loan: [Call number: 364.168 OLS] (1).
|
|
9.
|
Chained exploits : advanced hacking attacks from start to finish
by Whitaker, Andrew | Evans, Keatron | Voth, Jack B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
|
|
10.
|
Insider attack and cyber security : beyond the hacker
by Stolfo, Salvatore J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
|
|
11.
|
Art of intrusion : the real stories behind the exploits of hackers, intruders and deceivers
by Mitnick, Kevin D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 364.168 MIT] (1).
|
|
12.
|
Hands on ethical hacking and network defense
by Simpson, Michael T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Course technology, 2006Availability: Items available for loan: [Call number: 005.8 SIM] (2).
|
|
13.
|
Coding freedom : the ethics and aesthetics of hacking
by Coleman, E. Gabriella. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton: Princeton University Press, 2013Availability: Items available for loan: [Call number: 174.90051 COL] (1).
|
|
14.
|
Internet security : hacking, counterhacking, and society
by Himma, Kenneth Einar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
|
|
15.
|
Ethical hacking guide to corporate security
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
16.
|
Hackers
by Levy, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2010Availability: Items available for loan: [Call number: 005.80922 LEV] (1).
|
|
17.
|
How to own a shadow : the chase for Knuth
by Long, Johnny | Mullen, Timothy M | Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
|
|
18.
|
Unofficial guide to ethical hacking
by Fadia, Ankit. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
19.
|
Network intrusion alert : an ethical hacking guide to intrusion detection
by Fadia, Ankit | Zacharia, Manu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2008Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
20.
|
Software hacking
by Fadia, Ankit | Patnaik, Nishant Das. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Vikas Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|