1. High-tech crimes revealed : cyberwar stories from the digital front

by Branigan, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
2. Neuromancer

by Gibson, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Ace Books, 1984Availability: Items available for loan: [Call number: 808.83 GIB] (2). Checked out (1).
3. Hacking : the art of exploitation

by Erickson, Jon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2003Availability: Items available for loan: [Call number: 005.8 ERI] (1).
4. Stealing the network : how to own continent

by Russell, Ryan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 RUS] (1).
5. Gray hat hacking : the ethical hacker's handbook

by Harris, Shon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
6. Art of deception : controlling the human element of security

by Simon, William L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 MIT] (1).
7. Exploiting software : how to break code

by Gary, McGraw | McGraw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Higher Education, 2004Availability: Items available for loan: [Call number: 005.8 HOG] (1).
8. We are Anonymous : inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency

by Olson, Parmy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Little, Brown and Company, 2012Availability: Items available for loan: [Call number: 364.168 OLS] (1).
9. Chained exploits : advanced hacking attacks from start to finish

by Whitaker, Andrew | Evans, Keatron | Voth, Jack B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
10. Insider attack and cyber security : beyond the hacker

by Stolfo, Salvatore J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
11. Art of intrusion : the real stories behind the exploits of hackers, intruders and deceivers

by Mitnick, Kevin D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2006Availability: Items available for loan: [Call number: 364.168 MIT] (1).
12. Hands on ethical hacking and network defense

by Simpson, Michael T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Course technology, 2006Availability: Items available for loan: [Call number: 005.8 SIM] (2).
13. Coding freedom : the ethics and aesthetics of hacking

by Coleman, E. Gabriella.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton: Princeton University Press, 2013Availability: Items available for loan: [Call number: 174.90051 COL] (1).
14. Internet security : hacking, counterhacking, and society

by Himma, Kenneth Einar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
15. Ethical hacking guide to corporate security

by Fadia, Ankit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
16. Hackers

by Levy, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2010Availability: Items available for loan: [Call number: 005.80922 LEV] (1).
17. How to own a shadow : the chase for Knuth

by Long, Johnny | Mullen, Timothy M | Russell, Ryan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
18. Unofficial guide to ethical hacking

by Fadia, Ankit.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 FAD] (1).
19. Network intrusion alert : an ethical hacking guide to intrusion detection

by Fadia, Ankit | Zacharia, Manu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2008Availability: Items available for loan: [Call number: 005.8 FAD] (1).
20. Software hacking

by Fadia, Ankit | Patnaik, Nishant Das.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Vikas Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 FAD] (1).

Powered by Koha