Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1Linux Basics for Hackers, 2nd EditionOccupyTheWeb2025-07-01A revised introduction to the Linux operating system for beg...ISBN-13:1718503547
2Design for HackersDavid Kadavy2011-08-29Discover the techniques behind beautiful design by deconstru...ISBN-13:1119998956
3HackersSteven Levy2010-05-19This 25th anniversary edition of Steven Levy's classic book ...ISBN-13:1449393748
4Everything You Need to Know About the Dangers of Computer Ha...John Knittel2002-12-15Explains what computer hacking is, who does it, and how dang...ISBN-13:9780823937646
5Hacking the Cable ModemDerEngel2006A guide to cable modems includes tutorials, diagrams, source...ISBN-13:1593271018
6Hacker Culture and the New Rules of InnovationTim Rayner2018-02-28Fifteen years ago, a company was considered innovative if th...ISBN-13:1351595741
7The Hidden World of Hackers: Expressions 6-PackElise Wallace2019-06-28The world of hackers is complex. Some hackers are hired to p...ISBN-13:1425859089
8Hacking For DummiesKevin Beaver2018-06-27Stop hackers before they hack you! In order to outsmart a wo...ISBN-13:1119485541
9The Hacker EthicPekka Himanen2010-05-31The Hacker Ethic takes us on a journey through fundamental q...ISBN-13:1407064290
10Secret Hacker NetworksLucas Lee2025-02-27Secret Hacker Networks explores the intricate world of cyber...ISBN-13:8235205157
11ICCWS 2018 13th International Conference on Cyber Warfare an...Dr. Louise Leenen2018-03-08These proceedings represent the work of researchers particip...ISBN-13:1911218735
12How to Hack: A Beginner’s Guide to Becoming a HackerEstefano Smith2024-02-23Unlock the secrets of the digital realm with "How to Hack: A...
13The Ethics of HackingRoss Bellaby2023-03-24Political hackers, like the infamous Anonymous collective, h...ISBN-13:1529231825
14HackedKevin F. Steinmetz2016-11-29Inside the life of a hacker and cybercrime culture. Public d...ISBN-13:1479866105
15Hack Proofing ColdFusionSyngress2002-04-25The only way to stop a hacker is to think like one! ColdFusi...ISBN-13:0080478093
16Ethical HackingDebraj Maity2023-08-28Debraj Maity is an experienced Ethical Hacker and author of ...
17The Ethical HackJames S. Tiller2004-09-29There are many books that detail tools and techniques of pen...ISBN-13:0203495411
18From Hacking to Report WritingRobert Svensson2016-11-04Learn everything you need to know to become a professional s...ISBN-13:1484222830
19Ethical Hacking EssentialsJ. Clarke2025-06-16Ethical Hacking Essentials by J. Clarke is a comprehensive, ...ISBN-13:9349731088
20Inside the Hacker's Mind: Understanding the Art of Digital I...Florence MorenoIn this enlightening guide, readers embark on a thrilling jo...
21Hacker Techniques, Tools, and Incident HandlingSean-Philip Oriyano2011Hacker Techniques, Tools, and Incident Handling begins with ...ISBN-13:0763791830
22Cyber InsecurityBenoit Morel2021-07-29Cybersecurity is a completely man-made phenomenon that has b...ISBN-13:164027569X
23Ethical HackingIntroBooks TeamThis guide is about the most common thing that all the compu...
24Ethical Hacking UnleashedBarrett Williams2024-12-22Dive into the intriguing world of cybersecurity with "Ethica...
25IT GovernanceAlan Calder2005"This new edition of a unique handbook is fully updated for ...ISBN-13:9780749443948
26TOEIC SuperpackLin Lougheed2019-07-30Publisher's Note: Products purchased from Third Party seller...ISBN-13:1506258824
27HackingTim Jordan2008Hacking provides an introduction to the community of hackers...ISBN-13:0745639712
28#HackedJared A. Snyder2017-12-23These days, it's all too common to hear about large corporat...ISBN-13:0999392646
29Certified Ethical Hacker Complete Training Guide with Practi...IPSpecialistCertified Ethical Hacker v10 Exam 312-50 Latest v10. This up...
30Watch Dogs 2 Hacker's Strategy GuideSebastian HaleHack your way to mastery with the Watch Dogs 2 Hacker's Stra...
31Contemporary Challenges for Cyber Security and Data PrivacyMateus-Coelho, Nuno2023-10-16In an era defined by the pervasive integration of digital sy...9798369315293
32Ship SensorsR. Glenn Wright2024-02-29When combined with artificial intelligence, advanced computi...ISBN-13:1003855245
33Global CriminologyK. Jaishankar2013-04-25Global criminology is an emerging field covering internation...ISBN-13:1482209616
34The Hacker's HandbookSusan Young2003-11-24This handbook reveals those aspects of hacking least underst...ISBN-13:0203490045
35Crime and Deviance in CyberspaceDavidS. Wall2017-07-05This volume presents the reader with an interesting and, at ...ISBN-13:1351570757
36CyberthreatsSusan W Brenner2009-01-16As new technologies develop, terrorist groups are developing...ISBN-13:0199745161
37Cybercrime and Digital ForensicsThomas J. Holt2017-10-16This book offers a comprehensive and integrative introductio...ISBN-13:1315296950
38Cybercrime and Cloud Forensics: Applications for Investigati...Ruan, Keyun2012-12-31While cloud computing continues to transform developments in...ISBN-13:1466626933
39Hacking With Linux 2020:A Complete Beginners Guide to the Wo...Joseph Kenna2020-06-19" You too Can be a White Hat Hacking Genius If you're gettin...ISBN-13:1393566782
40Ethical Hacking Exam Study GuideCybellium2024-10-26Designed for professionals, students, and enthusiasts alike,...ISBN-13:1836794967
Libris
1HackersLevy, Steven2010Hackers
2Hackers [Elektronisk resurs]Taylor, Paul1999Hackers [Elektronisk resurs]
3Medieval Hackers [Elektronisk resurs]2015Medieval Hackers [Elektronisk resurs]
4Hackers [Elektronisk resurs] Heroes of the Computer Revoluti...Levy, Steven.2010Hackers [Elektronisk resurs] Heroes of the Computer Revoluti...
5Hackers [Elektronisk resurs]Steven Levy.1999Hackers [Elektronisk resurs]
6Hackers [Elektronisk resurs]Maíllo Fernández, Juan Andrés2020Hackers [Elektronisk resurs]
7Respawn: Gamers, Hackers, and Technogenic Life [Elektronisk ...Milburn, Colin2018Respawn: Gamers, Hackers, and Technogenic Life [Elektronisk ...
8Respawn : gamers, hackers, and technogenic life / Colin Milb...Milburn, Colinuuuu-uuuuRespawn : gamers, hackers, and technogenic life / Colin Milb...
9Football hackersBiermann, Christoph, 1960-2019Football hackers
10Design for Hackers [Elektronisk resurs] Reverse Engineering ...Kadavy, David.2011Design for Hackers [Elektronisk resurs] Reverse Engineering ...
11Medieval Hackers Kathleen E. Kennedy [Elektronisk resurs]Kennedy, Kathleen E.uuuu-uuuuMedieval Hackers Kathleen E. Kennedy [Elektronisk resurs]
12Hackers Wanted: An Examination of the Cybersecurity Labor Ma...Martin C. Libicki2014Hackers Wanted: An Examination of the Cybersecurity Labor Ma...
13OS X for hackers at heart [Elektronisk resurs]2005OS X for hackers at heart [Elektronisk resurs]
14Wireless hacking [Elektronisk resurs] projects for Wi-Fi ent...Barken, Lee.c2004Wireless hacking [Elektronisk resurs] projects for Wi-Fi ent...
15iOS Hacker's Handbook [Elektronisk resurs]Charlie Miller2012iOS Hacker's Handbook [Elektronisk resurs]
16Algoritmen2020Algoritmen
17Reconnaissance for ethical hackers. [Elektronisk resurs] : f...Singh, Glen D.ArrayReconnaissance for ethical hackers. [Elektronisk resurs] : f...
18Epic win for Anonymous : how 4chan's army conquered the WebStryker, Colec2011Epic win for Anonymous : how 4chan's army conquered the Web
19Essential Skills for Hackers [Elektronisk resurs]Cardwell, Kevin2016Essential Skills for Hackers [Elektronisk resurs]
20Algoritmen2022Algoritmen
21Hackers & Painters [Elektronisk resurs]Graham, Paul.2009Hackers & Painters [Elektronisk resurs]
22Machine Learning for Hackers [Elektronisk resurs]Conway, Drew.2012Machine Learning for Hackers [Elektronisk resurs]
23The web application hacker's handbook : discovering and expl...Stuttard, Dafydd2007The web application hacker's handbook : discovering and expl...
24The Browser Hacker's Handbook [Elektronisk resurs]Wade Alcorn2014The Browser Hacker's Handbook [Elektronisk resurs]
25Essential Skills for Hackers [Elektronisk resurs]Essential Skills for Hackers [Elektronisk resurs]
26Hacking for dummiesBeaver, KevinArrayHacking for dummies
27Hackers beware [Elektronisk resurs]Cole, Eric2002Hackers beware [Elektronisk resurs]
28Hacker's Delight [Elektronisk resurs]Henry S. Warrenuuuu-uuuuHacker's Delight [Elektronisk resurs]
29Hackers Beware [Elektronisk resurs]Cole, Eric2001Hackers Beware [Elektronisk resurs]
30Penetration Testing For DummiesShimonski, Robert2020Penetration Testing For Dummies
31Hacker's delight [Elektronisk resurs]Warren, Henry S.2013Hacker's delight [Elektronisk resurs]
32Hacker's Delight [Elektronisk resurs]Warren, Henry S2002Hacker's Delight [Elektronisk resurs]
33The Car Hacker's Handbook [Elektronisk resurs]Craig Smith2016The Car Hacker's Handbook [Elektronisk resurs]
34Network basics for hackers : how networks work and how they ...ArrayNetwork basics for hackers : how networks work and how they ...
35The Antivirus Hacker's Handbook [Elektronisk resurs]Koret, Joxean.uuuu-uuuuThe Antivirus Hacker's Handbook [Elektronisk resurs]
36Hacker's delight [Elektronisk resurs]Warren, Henry S2013Hacker's delight [Elektronisk resurs]
37Linux Basics for Hackers [Elektronisk resurs]OccupyTheWeb .2018Linux Basics for Hackers [Elektronisk resurs]
38Machine Learning for Hackers [Elektronisk resurs]Conway, Drew2012Machine Learning for Hackers [Elektronisk resurs]
39Hacker's delight [Elektronisk resurs]Warren, Henry S2013Hacker's delight [Elektronisk resurs]
40Essential skills for hackers [Elektronisk resurs]Cardwell, Kevin2016Essential skills for hackers [Elektronisk resurs]
SwePub
1Hackers for Equality (HfE) : Evaluation of a Transnational ...Lundgren, Mats, 1949- von Schantz Lundgren, Ina, 1958- Hackers for Equality (HfE) : Evaluation of a Transnational ...
2Biocomputation Using Molecular Agents Moving in Microfluidic...Blaudeck, Thomas Meinecke, Christoph R. Reuter, Danny Steenhusen, Sönke Biocomputation Using Molecular Agents Moving in Microfluidic...
3Examining the social networks of malware writers and hackers...Holt, Thomas J. Strumsky, Deborah Smirnova, Olga Kilger, Max Examining the social networks of malware writers and hackers...
4La redécouverte d’un éthos journalistique avec la cha...Premat, Christophe, 1976-La redécouverte d’un éthos journalistique avec la cha...
5Free software to open hardware: Critical theory on the front...Söderberg, Johan, 1976Free software to open hardware: Critical theory on the front...
6Why Hackers Love eHealth ApplicationsGoyal, Rohit Dragoni, Nicola, 1978- Why Hackers Love eHealth Applications
7Dams Safety : Inspections, Safety Reviews, and LegislationsAdamo, Nasrat Al-Ansari, Nadhir, 1947- Sissakian, Varoujan Laue, Jan Dams Safety : Inspections, Safety Reviews, and Legislations
8Dam Safety : Hazards Created by Human Failings and ActionsAdamo, Nasrat Al-Ansari, Nadhir, 1947- Sissakian, Varoujan Laue, Jan Dam Safety : Hazards Created by Human Failings and Actions
9Techniques for Improving Intrusion DetectionAlmgren, Magnus, 1972Techniques for Improving Intrusion Detection
10Svensk dataspelsutveckling, 1960–1995 : Transkript av ett ...Ernkvist, Mirko, 1980-Svensk dataspelsutveckling, 1960–1995 : Transkript av ett ...
11Pojkarna vid datorn : Unga entusiaster i datateknikens värl...Nissen, Jörgen, 1958-Pojkarna vid datorn : Unga entusiaster i datateknikens värl...
12Logging for Intrusion and Fraud DetectionLundin Barse, Emilie, 1975Logging for Intrusion and Fraud Detection
13Efficient Security Protocols for Constrained DevicesGunnarsson, Martin Gehrmann, Christian Hell, Martin Pagnin, Elena Efficient Security Protocols for Constrained Devices
14Predictive model for multistage cyber-attack simulationKour, Ravdeep, 1981- Thaduri, Adithya Karim, Ramin, 1964- Predictive model for multistage cyber-attack simulation
15DroidPosture : A Trusted Posture Assessment Service for Mobi...Yalew, Sileshi Demesie Maguire Jr., Gerald Q. Haridi, Seif Correia, Miguel DroidPosture : A Trusted Posture Assessment Service for Mobi...
16The Three Pillars of Functional Autonomy of HackersSöderberg, Johan, 1976 Maxigas,, Maxigas, The Three Pillars of Functional Autonomy of Hackers
17CNN-HMM Model for Real Time DGA CategorizationMahmood, Aimen Abbas, Haider Amjad, Faisal CNN-HMM Model for Real Time DGA Categorization
18Deterritorializing Cyber Security and Warfare in Palestine: ...Cristiano, FabioDeterritorializing Cyber Security and Warfare in Palestine: ...
19Innovation leadership with mentors for team performance in m...Suominen, Anu Jonsson, Vilho Eriksson, Eric Fogelberg, Jessica Innovation leadership with mentors for team performance in m...
20Role of ubiquitous AI and blockchain security for military &...Mahesh, M. Deepak, P. Sharma, K. Mahadevaswamy, J.G. Role of ubiquitous AI and blockchain security for military &...
21Performance Analysis of Verifiable Data Registry Solutions f...Alizadeh, Morteza, 1987- Andersson, Karl, 1970- Schelén, Olov Performance Analysis of Verifiable Data Registry Solutions f...
22Solarwinds breach, a signal for a systemic enterprise view o...Magnusson, Lars, 1952-Solarwinds breach, a signal for a systemic enterprise view o...
23Architecture for Adaptive Information Security Systems as ap...Mwakalinga, Jeffy Kowalski, Stewart Architecture for Adaptive Information Security Systems as ap...
24Industrial Internet of Things Security enhanced with Deep Le...Fontes, Afonso, 1987Industrial Internet of Things Security enhanced with Deep Le...
25RESTRICTING OR RELEASING PASSION FOR INNOVATION – THE CASE...Bergquist, Magnus, 1960 Rolandsson, Bertil RESTRICTING OR RELEASING PASSION FOR INNOVATION – THE CASE...
26Secure Smart Wearable Computing through Artificial Intellige...Ramasamy, Lakshmana Kumar Khan, Firoz Shah, Mohammad Prasad, Balusupati Veera Venkata Siva Secure Smart Wearable Computing through Artificial Intellige...
27E-commerce Managers at Work : Exploring the Role of a New Ma...Fuentes, Christian Bäckström, Kristina Wulff, Gabriella Stoopendahl, Patrik E-commerce Managers at Work : Exploring the Role of a New Ma...
28Drawbacks of Artificial Intelligence and Their Potential Sol...Khan, B. Fatima, H. Qureshi, A. Kumar, S. Drawbacks of Artificial Intelligence and Their Potential Sol...
29Watch your step! Detecting stepping stones in programmable n...Bhattacherjee, Debopam Gurtov, Andrei Aura, Tuomas Watch your step! Detecting stepping stones in programmable n...
30Analysing Drivers’ Preferences for Privacy Enhancing Car-...Islami, Lejla Fischer-Hübner, Simone, 1963- Hammond, E. N. K. Eloff, J. Analysing Drivers’ Preferences for Privacy Enhancing Car-...
31Vulnerability Analysis and Patches Management using Secure M...Stirparo, Pasquale Shibli, Muhammad Awais Muftic, Sead Vulnerability Analysis and Patches Management using Secure M...
32Inquiring Hacking as Politics. A New Departure in Hacker Stu...Söderberg, Johan, 1976Inquiring Hacking as Politics. A New Departure in Hacker Stu...
33Security Infrastructure and Applicationsfor Mobile AgentsShibli, Awais, 1982- Muftic, Sead, Professor Montanari, Rebecca, Associate Professor Security Infrastructure and Applicationsfor Mobile Agents
34Non-State Actors in Cyberspace OperationsSigholm, JohanNon-State Actors in Cyberspace Operations
35Modeling golf player skill using machine learningKönig, Rikard Johansson, Ulf Riveiro, Maria, 1978- Brattberg, Peter Modeling golf player skill using machine learning
36Technologies of Collaboration : The Transformation of Hacke...Handler, Reinhard Anton, 1979-Technologies of Collaboration : The Transformation of Hacke...
37Expanding the view on Offensive Cyber OperationsLarsson, Emil Jensen, Meiko, Docent Sigholm, Johan, Dr Liwång, Hans, Professor Expanding the view on Offensive Cyber Operations
38Secure and Privacy-enhanced E-Mail System based on the Conce...Kounelis, Ioannis Muftic, Sead Loeschner, Jan Secure and Privacy-enhanced E-Mail System based on the Conce...
39Free Software Beyond Radical Politics: Negotiations of Creat...Velkova, JuliaFree Software Beyond Radical Politics: Negotiations of Creat...
40Feds Everywhere : Risk and Risk-mitigation in Anonymous Chat...Creswell, Philip K., 1982-Feds Everywhere : Risk and Risk-mitigation in Anonymous Chat...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 4.594.522 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 204 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2025 Illius Media