Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1Design for HackersDavid Kadavy2011-08-29Looks at classical design principles and techniques for Web ...ISBN-13:1119998956
2Linux Basics for HackersOccupyTheWeb2018-12-04This practical, tutorial-style book uses the Kali Linux dist...ISBN-13:159327856X
3Linux Basics for HackersOccupyTheWeb2018-12-04This practical, tutorial-style book uses the Kali Linux dist...ISBN-13:1593278551
4Bayesian Methods for HackersCameron Davidson-Pilon2015-09-30Master Bayesian Inference through Practical Examples and Com...ISBN-13:0133902927
5Machine Learning for HackersDrew Conway2012-02-13If you’re an experienced programmer interested in crunchin...ISBN-13:1449330533
6Essential Skills for HackersKevin Cardwell2015-12-09Essential Skills for Hackers is about the skills you need to...ISBN-13:0128051116
7Violent PythonTJ O'Connor2012-11-22Violent Python shows you how to move from a theoretical unde...ISBN-13:9781597499576
8Black Hat GoTom Steele2020-01-24Like the best-selling Black Hat Python, Black Hat Go explore...ISBN-13:1593278659
9Black Hat PythonJustin Seitz2014-12-21When it comes to creating powerful and effective hacking too...ISBN-13:1593275900
10Gray Hat PythonJustin Seitz2009-04-15Python is fast becoming the programming language of choice f...ISBN-13:1593271921
11Puzzles for HackersIvan Sklyarov2005These puzzles and mind-benders serve as a way to train logic...ISBN-13:1931769451
12HackingErickson Karnel2021-01-044 Manuscripts in 1 Book!Have you always been interested and ...ISBN-13:9781990151125
13Violent PythonTJ O'Connor2012-12-28Violent Python shows you how to move from a theoretical unde...ISBN-13:1597499641
14Machine Learning for HackersDrew Conway2012-02-15Presents algorithms that enable computers to train themselve...ISBN-13:1449303714
15Tribe of HackersMarcus J. Carey2019-07-23Tribe of Hackers: Cybersecurity Advice from the Best Hackers...ISBN-13:1119643384
16Hacking the HackerRoger A. Grimes2017-04-18Meet the world's top ethical hackers and explore the tools o...ISBN-13:1119396220
17OS X for Hackers at HeartBruce Potter2005-12-12The sexy, elegant design of the Apple PowerBook combined wit...ISBN-13:9780080489483
18Cyber SecurityKarnel Erickson2020-12-022 Manuscripts in 1 Book! Have you always been interested and...ISBN-13:9781990151149
19Kali Linux for HackersKarnel Erickson2020-10-29Do you want to know how to protect your system from being co...ISBN-13:9781990151002
20Black Hat Python, 2nd EditionJustin Seitz2021-04-13Fully-updated for Python 3, the second edition of this world...ISBN-13:1718501137
21Hacking]Julian James McKinnon2021-03-08-- 55% OFF for Bookstores -- Hacking: three books in one Wou...ISBN-13:9781801875394
22Linux for HackersWilliam Vance2020-02-04Linux for Hackers is a beginner's overview into the Linux ha...ISBN-13:9781913597689
23Hacking- The art Of ExploitationJ. Erickson2018-03-06This text introduces the spirit and theory of hacking as wel...
24CUCKOO'S EGGClifford Stoll2012-05-23Before the Internet became widely known as a global tool for...ISBN-13:0307819426
25The Time HackersGary Paulsen2008-12-24You ever open your locker and find that some joker has left ...ISBN-13:0307548104
26iOS Application SecurityDavid Thiel2016-02-16Eliminating security holes in iOS apps is critical for any d...ISBN-13:159327601X
27HackingKarnel Erickson2020-11-164 Manuscripts in 1 Book! Have you always been interested and...ISBN-13:9781990151095
28HackersSteven Levy2010-05-19This 25th anniversary edition of Steven Levy's classic book ...ISBN-13:9781449393748
29The Web Application Hacker's HandbookDafydd Stuttard2011-03-16This book is a practical guide to discovering and exploiting...ISBN-13:1118079612
30PytHon for HackersAjay Kumar Tiwari2015-08-04When it comes to creating powerful and effective hacking too...ISBN-13:9781515352587
31Hackers and HackingThomas J. Holt2013-07-19This book provides an in-depth exploration of the phenomenon...ISBN-13:1610692772
32Hacking: The Next GenerationNitesh Dhanjani2009-08-29With the advent of rich Internet applications, the explosion...ISBN-13:9781449379216
33Hacker StatesLuca Follis2020-04-07How hackers and hacking moved from being a target of the sta...ISBN-13:0262043602
34Cyber SecurityErickson Karnel2019-12-092 Manuscripts in 1 Book! Have you always been interested and...ISBN-13:9781673290189
35Hackers & PaintersPaul Graham2004The author examines issues such as the rightness of web-base...ISBN-13:0596006624
36Kali Linux for HackersErickson Karnel2019-11-17Do you want to know how to protect your system from being co...ISBN-13:9781706589174
37Networking Basics for HackersMatthew Twells2021-03-30A practical and engaging guide to the fundamentals of comput...ISBN-13:9781718501300
38Ethical HackingDaniel Graham2021-09-21A hands-on guide to hacking computer systems from the ground...ISBN-13:1718501889
39HackingJulian James McKinnon2020-10-16Hacking: three books in one. Would you like to learn more ab...ISBN-13:9781801127073
40HackingErickson Karnel2019-11-174 Manuscripts in 1 Book! Have you always been interested and...ISBN-13:9781709182662
Libris
1HackersLevy, Steven2010Hackers
2Hackers [Elektronisk resurs] Heroes of the Computer Revoluti...Levy, Steven.2010Hackers [Elektronisk resurs] Heroes of the Computer Revoluti...
3Hackers [Elektronisk resurs]Steven Levy.1999Hackers [Elektronisk resurs]
4Design for Hackers [Elektronisk resurs] Reverse Engineering ...Kadavy, David.2011Design for Hackers [Elektronisk resurs] Reverse Engineering ...
5Hackers [Elektronisk resurs]uuuu-uuuuHackers [Elektronisk resurs]
6Medieval Hackers Kathleen E. Kennedy [Elektronisk resurs]Kennedy, Kathleen E.uuuu-uuuuMedieval Hackers Kathleen E. Kennedy [Elektronisk resurs]
7Respawn: Gamers, Hackers, and Technogenic Life [Elektronisk ...Colin Milburn2018Respawn: Gamers, Hackers, and Technogenic Life [Elektronisk ...
8Wireless hacking [Elektronisk resurs] projects for Wi-Fi ent...Barken, Lee.c2004Wireless hacking [Elektronisk resurs] projects for Wi-Fi ent...
9OS X for hackers at heart [Elektronisk resurs]2005OS X for hackers at heart [Elektronisk resurs]
10Hackers Wanted: An Examination of the Cybersecurity Labor Ma...Martin C. Libicki2014Hackers Wanted: An Examination of the Cybersecurity Labor Ma...
11Football hackersBiermann, Christoph, 1960-2019Football hackers
12iOS Hacker's Handbook [Elektronisk resurs]Charlie Miller2012iOS Hacker's Handbook [Elektronisk resurs]
13Hackers & painters : big ideas fron the computer ageGraham, Paul, 1964-[2010]Hackers & painters : big ideas fron the computer age
14Biohackers [Elektronisk resurs] the politics of open science...Delfanti, Alessandro.2013Biohackers [Elektronisk resurs] the politics of open science...
15Stealing the network [Elektronisk resurs] how to own a shado...Long, Johnny.2007Stealing the network [Elektronisk resurs] how to own a shado...
16The Browser Hacker's Handbook [Elektronisk resurs]Wade Alcorn2014The Browser Hacker's Handbook [Elektronisk resurs]
17Algoritmen [Elektronisk resurs] Algoritmens filmklubb # 3 - ...2020Algoritmen [Elektronisk resurs] Algoritmens filmklubb # 3 - ...
18Insider threat [Elektronisk resurs] protecting the enterpris...Cole, Eric.2006Insider threat [Elektronisk resurs] protecting the enterpris...
19Stealing the network [Elektronisk resurs] how to own an iden...c2005Stealing the network [Elektronisk resurs] how to own an iden...
20Essential Skills for Hackers [Elektronisk resurs]Kevin Cardwell2015Essential Skills for Hackers [Elektronisk resurs]
21Computer and Information Security Handbook [Elektronisk resu...Vacca, John R.2009Computer and Information Security Handbook [Elektronisk resu...
22InfoSec career hacking [Elektronisk resurs] sell your skillz...Bayles, Aaron W.c2005InfoSec career hacking [Elektronisk resurs] sell your skillz...
23The web application hacker's handbook : discovering and expl...Stuttard, Dafydd2007The web application hacker's handbook : discovering and expl...
24Honeypots : tracking hackersSpitzner, Lance.2003Honeypots : tracking hackers
25Epic win for Anonymous : how 4chan's army conquered the WebStryker, Colec2011Epic win for Anonymous : how 4chan's army conquered the Web
26Hackers & Painters [Elektronisk resurs]Graham, Paul.2009Hackers & Painters [Elektronisk resurs]
27Machine Learning for Hackers [Elektronisk resurs]Conway, Drew.2012Machine Learning for Hackers [Elektronisk resurs]
28Gray Hat Python: Python Programming for Hackers and Reverse ...Justin Seitz2009Gray Hat Python: Python Programming for Hackers and Reverse ...
29Penetration tester's open source toolkit [Elektronisk resurs...2006Penetration tester's open source toolkit [Elektronisk resurs...
30Violent Python: A Cookbook for Hackers, Forensic Analysts, P...TJ O'Connor2012Violent Python: A Cookbook for Hackers, Forensic Analysts, P...
31Game console hacking [Elektronisk resurs] have fun while voi...Grand, Joe.c2004Game console hacking [Elektronisk resurs] have fun while voi...
32The Web Application Hacker's Handbook [Elektronisk resurs] F...Stuttard, Dafydd.2011The Web Application Hacker's Handbook [Elektronisk resurs] F...
33Black hat Python : Python programming for hackers and pentes...Seitz, Justinuuuu-uuuuBlack hat Python : Python programming for hackers and pentes...
34Hacker's delightWarren, Henry S.cop. 2003Hacker's delight
35Hackers Beware [Elektronisk resurs]Cole, Eric2001Hackers Beware [Elektronisk resurs]
36Linux Basics for Hackers [Elektronisk resurs]OccupyTheWeb .2018Linux Basics for Hackers [Elektronisk resurs]
37Hackers & Painters [Elektronisk resurs]Paul Graham2021Hackers & Painters [Elektronisk resurs]
38Hacker's delight [Elektronisk resurs]Warren, Henry S.2013Hacker's delight [Elektronisk resurs]
39Hacker's Delight [Elektronisk resurs]Warren, Henry S2002Hacker's Delight [Elektronisk resurs]
40International humanitarian law and the changing technology o...2013International humanitarian law and the changing technology o...
SwePub
1Hackers for Equality (HfE) : Evaluation of a Transnational ...Lundgren, Mats, 1949- von Schantz Lundgren, Ina, 1958- Hackers for Equality (HfE) : Evaluation of a Transnational ...
2La redécouverte d’un éthos journalistique avec la cha...Premat, Christophe, 1976-La redécouverte d’un éthos journalistique avec la cha...
3Free software to open hardware: Critical theory on the front...Söderberg, Johan, 1976Free software to open hardware: Critical theory on the front...
4Why Hackers Love eHealth ApplicationsGoyal, Rohit Dragoni, Nicola, 1978- Why Hackers Love eHealth Applications
5Dams Safety : Inspections, Safety Reviews, and LegislationsAdamo, Nasrat Al-Ansari, Nadhir, 1947- Sissakian, Varoujan Laue, Jan Dams Safety : Inspections, Safety Reviews, and Legislations
6Dam Safety : Hazards Created by Human Failings and ActionsAdamo, Nasrat Al-Ansari, Nadhir, 1947- Sissakian, Varoujan Laue, Jan Dam Safety : Hazards Created by Human Failings and Actions
7Techniques for Improving Intrusion DetectionAlmgren, Magnus, 1972Techniques for Improving Intrusion Detection
8Svensk dataspelsutveckling, 1960–1995 : Transkript av ett ...Ernkvist, Mirko, 1980-Svensk dataspelsutveckling, 1960–1995 : Transkript av ett ...
9Pojkarna vid datorn : Unga entusiaster i datateknikens värl...Nissen, Jörgen, 1958-Pojkarna vid datorn : Unga entusiaster i datateknikens värl...
10Logging for Intrusion and Fraud DetectionLundin Barse, Emilie, 1975Logging for Intrusion and Fraud Detection
11Predictive model for multistage cyber-attack simulationKour, Ravdeep, 1981- Thaduri, Adithya Karim, Ramin, 1964- Predictive model for multistage cyber-attack simulation
12DroidPosture : A Trusted Posture Assessment Service for Mobi...Yalew, Sileshi Demesie Maguire Jr., Gerald Q. Haridi, Seif Correia, Miguel DroidPosture : A Trusted Posture Assessment Service for Mobi...
13The Three Pillars of Functional Autonomy of HackersSöderberg, Johan, 1976 Maxigas,, Maxigas, The Three Pillars of Functional Autonomy of Hackers
14Biocomputation Using Molecular Agents Moving in Microfluidic...Blaudeck, Thomas Meinecke, Christoph R. Reuter, Danny Steenhusen, Sönke Biocomputation Using Molecular Agents Moving in Microfluidic...
15Solarwinds breach, a signal for a systemic enterprise view o...Magnusson, Lars, 1952-Solarwinds breach, a signal for a systemic enterprise view o...
16Architecture for Adaptive Information Security Systems as ap...Mwakalinga, Jeffy Kowalski, Stewart Architecture for Adaptive Information Security Systems as ap...
17Industrial Internet of Things Security enhanced with Deep Le...Fontes, Afonso, 1987Industrial Internet of Things Security enhanced with Deep Le...
18RESTRICTING OR RELEASING PASSION FOR INNOVATION – THE CASE...Bergquist, Magnus, 1960 Rolandsson, Bertil RESTRICTING OR RELEASING PASSION FOR INNOVATION – THE CASE...
19Secure Smart Wearable Computing through Artificial Intellige...Ramasamy, Lakshmana Kumar Khan, Firoz Shah, Mohammad Prasad, Balusupati Veera Venkata Siva Secure Smart Wearable Computing through Artificial Intellige...
20Watch your step! Detecting stepping stones in programmable n...Bhattacherjee, Debopam Gurtov, Andrei Aura, Tuomas Watch your step! Detecting stepping stones in programmable n...
21Analysing Drivers’ Preferences for Privacy Enhancing Car-...Islami, Lejla Fischer-Hübner, Simone, 1963- Hammond, E. N. K. Eloff, J. Analysing Drivers’ Preferences for Privacy Enhancing Car-...
22Vulnerability Analysis and Patches Management using Secure M...Stirparo, Pasquale Shibli, Muhammad Awais Muftic, Sead Vulnerability Analysis and Patches Management using Secure M...
23Inquiring Hacking as Politics. A New Departure in Hacker Stu...Söderberg, Johan, 1976Inquiring Hacking as Politics. A New Departure in Hacker Stu...
24Security Infrastructure and Applicationsfor Mobile AgentsShibli, Awais, 1982- Muftic, Sead, Professor Montanari, Rebecca, Associate Professor Security Infrastructure and Applicationsfor Mobile Agents
25Non-State Actors in Cyberspace OperationsSigholm, JohanNon-State Actors in Cyberspace Operations
26Modeling golf player skill using machine learningKönig, Rikard Johansson, Ulf Riveiro, Maria, 1978- Brattberg, Peter Modeling golf player skill using machine learning
27Technologies of Collaboration : The Transformation of Hacke...Handler, Reinhard Anton, 1979-Technologies of Collaboration : The Transformation of Hacke...
28Secure and Privacy-enhanced E-Mail System based on the Conce...Kounelis, Ioannis Muftic, Sead Loeschner, Jan Secure and Privacy-enhanced E-Mail System based on the Conce...
29Free Software Beyond Radical Politics: Negotiations of Creat...Velkova, JuliaFree Software Beyond Radical Politics: Negotiations of Creat...
30Feds Everywhere : Risk and Risk-mitigation in Anonymous Chat...Creswell, Philip K., 1982-Feds Everywhere : Risk and Risk-mitigation in Anonymous Chat...
31“This is my cheating ex” : Gender and sexuality in reven...Hearn, Jeff, 1947- Hall, Matthew “This is my cheating ex” : Gender and sexuality in reven...
32Piracy and Social Change : Roundtable DiscussionAndersson Schwarz, Jonas, 1978- Burkart, Patrick Aufderheide, Patricia Jaszi, Peter Piracy and Social Change : Roundtable Discussion
33Setting the stage : The vulnerability of critical infrastruc...Thedéen, TorbjörnSetting the stage : The vulnerability of critical infrastruc...
34Revenge pornography and manhood acts : A discourse analysis ...Hall, Matthew Hearn, Jeff, 1947- Revenge pornography and manhood acts : A discourse analysis ...
35Cybersecurity Issues and Challenges in Industry 4.0Kour, Ravdeep, 1981-Cybersecurity Issues and Challenges in Industry 4.0
36Haktology, Trump, and news practicesBarkho, LeonHaktology, Trump, and news practices
37Shaping information security behaviors related to social eng...Rocha Flores, Waldo Ekstedt, Mathias, Professor Kowalski, Stewart, Professor Shaping information security behaviors related to social eng...
38Avant-Garde and Subversion in an Online 3D WorldBäcke, MariaAvant-Garde and Subversion in an Online 3D World
39Inadequate risk analysis might jeopardize the functional saf...Hänninen, Kaj, 1970- Hansson, Hans Thane, Henrik Saadatmand, Mehrdad Inadequate risk analysis might jeopardize the functional saf...
40Inadequate Risk Analysis Might Jeopardize The Functional Saf...Saadatmand, Mehrdad, 1980- Hansson, Hans Thane, Henrik Hänninen, Kaj Inadequate Risk Analysis Might Jeopardize The Functional Saf...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 3.529.073 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 156 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2022 Illius Media