Explore: Computer Security
Discover books, insights, and more — all in one place.
Learn more about Computer Security with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computer-security”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Digital Fortress
By Dan Brown

“Digital Fortress” Metadata:
- Title: Digital Fortress
- Author: Dan Brown
- Languages: ➤ English - pol - Spanish; Castilian - español, castellano
- Number of Pages: Median: 447
- Publisher: ➤ ACT - labutxaca - Publisher not identified - ALBATROS - Altin Kitaplar - Orion (an Imprint of The Orion Publishing Group Ltd ) - China Times - Thomas Dunne Books - Sextante - Palgrave Macmillan - Bertrand Editora - Albatros/Sonia Draga - Albatros - St. Martin's Press - St. Martin - Altin - JC Lattes - Thomas Dune Books - Oscar Mondadori - Corgi Books - NXB Văn hóa - thông tin - Orion Pub Co - St. Martin's Griffin - Random House Publishing Group - Yayincilik - St. Martins Paperbacks - Griffin - FonoLibro Inc. - Thomas Dunne Books / St. Martin's Griffin - Kadokawa Group Publishing - Kadokawa Shoten - Luitingh - Brand: Books On Tape - Nhà xuất bản Văn hóa - thông tin - Rebound by Sagebrush - St. Martin's Paperbacks - Editora Arqueiro - PLANETA - Booket - Macmillan Audio - Blackstone Audiobooks - Editorial Empúries - Circulo de lectores - الدار العربية للعلوم - Bantam Press - Shi bao wen hua chu ban qi ye gu fen you xian gong si - AST - Ediciones Urano, S.A. - Thorndike Windsor Parragon - Ed. France Loisirs - Odtü - Transworld Publishers Limited - Books on Tape - wydawnictwo albatros - Audio Renaissance - Sonia Draga - Transworld Paperbacks - JC Lattès - Gustav Lübbe Verlag - Arqueiro - Ren min wen xue chu ban she - Taegyo Bet'elsŭman
- Publish Date: ➤ 1998 - 2000 - 2003 - 2004 - 2005 - 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2013 - 2014 - 2015 - 2016 - 2017 - 2023
- Publish Location: ➤ Amsterdam - São Paulo, SP, Brasil - Milan, Italy - Bei jing - New York - Tōkyō - Moskva - Beijing Shi - Ha Noi - Paris - London, England - Barcelona, España - Hà Nuoi - London - Bath, U.K - Brazil - Warszawa - Waterville, ME - New York, USA - Paris, France - Taibei Shi - Chiado - Sŏul-si
“Digital Fortress” Subjects and Themes:
- Subjects: ➤ techno-thriller - supercomputers - Se curite informatique - Intelligence officers - Cryptographers - Fiction - Computer security - Romans, nouvelles - Officiers de renseignements - Cryptographes - Litterature americaine - Roman americain - Securite informatique - Roman suspens - thrillers - suspense fiction - United States. National Security Agency - United States - Gsafd - Computer security in fiction - Code and cipher stories - Ameriška književnost - Kriminal - Cryptographers in fiction - Umori - Open Library Staff Picks - Varnostne kode - Intelligence officers in fiction - United States. in fiction - Chang pian xiao shuo - Polish language materials - Fiction, thrillers - Fiction, technological - Fiction, espionage - Fiction, thrillers, general - Littérature américaine - Roman américain - Fiction, thrillers, espionage - Fiction, thrillers, technological - collectionid:dbsan
- People: ➤ Susan Fletcher - Ensei Tankado - David Becker - Trevor Strathmore - Phil Chartrukian - Greg Hale - Leland Fontaine - Hulohot - Midge Milken - Chad Brinkerhoff - Jabba - Soshi Kuta - Tokugen Numataka - Peter McCuffin
- Places: ➤ USA - Sevilla - Tokyo - Seville - Spain - United States - Mei guo
- Time: Xian dai .
Edition Identifiers:
- Google Books ID: ➤ 7HUoGQAACAAJ - NMb-A45VAKcC - au-1DQAAQBAJ - Nv_cAAAACAAJ - tM3KwAEACAAJ - QACdjY_ju9kC - mnIrHwAACAAJ
- The Open Library ID: ➤ OL50210239M - OL43676627M - OL43040834M - OL47312651M - OL47338034M - OL35994206M - OL35617919M - OL47131325M - OL47132987M - OL43262358M - OL43514428M - OL39717081M - OL35434225M - OL35596042M - OL37856939M - OL32141786M - OL37755546M - OL36694510M - OL32475366M - OL36689356M - OL35714526M - OL34416780M - OL34431240M - OL24636390M - OL35693409M - OL35693407M - OL35693405M - OL33939060M - OL31990060M - OL31953987M - OL31953989M - OL32757209M - OL26718155M - OL25922882M - OL32365893M - OL31971109M - OL31891317M - OL29166468M - OL29590266M - OL29316222M - OL28974776M - OL29044406M - OL29004598M - OL29157627M - OL28348650M - OL28199915M - OL27995789M - OL28264141M - OL9087214M - OL9110147M - OL26913972M - OL27654319M - OL10602426M - OL9164557M - OL26448801M - OL8913641M - OL8814438M - OL13160011M - OL9148351M - OL7985014M - OL9881152M - OL9572254M - OL13059669M - OL26338108M - OL24196156M - OL686206M - OL23087630M - OL23016092M - OL23063972M - OL21999841M - OL23070524M - OL18264767M - OL3301876M - OL9488480M - OL22613625M - OL22125022M - OL8875044M - OL8875089M - OL9894159M - OL8875116M - OL22076616M - OL23120429M - OL17948330M - OL25285738M
- Online Computer Library Center (OCLC) ID: ➤ 1103454936 - 1149266635 - 830625722 - 946160891 - 749147574 - 761223347 - 1000081464 - 732621139 - 844311468 - 61330824 - 54799267 - 1231684559 - 216941688 - 970544473 - 552086589 - 192078020 - 474149554 - 59181697 - 145873319 - 475786761 - 1245810625 - 53988587 - 61461320 - 66017936 - 556150169 - 803152400 - 910614972 - 799906981 - 47663592 - 75278716 - 655890544 - 910468712 - 858462670 - 881608539
- Library of Congress Control Number (LCCN): 2004041255 - 2006700041 - 2006700040 - 2004041879 - 97033118
- All ISBNs: ➤ 9781409091189 - 9784042955108 - 9780312263126 - 9780552171373 - 1593973594 - 9781429902304 - 9780312180874 - 9788375088496 - 9784047915183 - 7020101542 - 1427214425 - 1417664363 - 0786259795 - 0752868926 - 9780593077993 - 8408176102 - 1593975635 - 0312207158 - 9781250064073 - 9781593973599 - 9788467219142 - 9789875808904 - 031218087X - 9781439565773 - 8489367019 - 9789752112438 - 8580414059 - 9780552151696 - 8497871596 - 4047915173 - 1429902302 - 2744192066 - 0786113723 - 8467219149 - 3404157621 - 8497871588 - 8935077088199 - 9024527910 - 9788804571919 - 073669689X - 9780752868912 - 9780593057445 - 7020048145 - 1250064074 - 9780552159739 - 8499300278 - 125089803X - 0736696954 - 9953299129 - 9782709626309 - 0552169994 - 9780552161251 - 9789722514699 - 9788957591246 - 9722514695 - 0552151696 - 8375081981 - 5170137761 - 055217355X - 9780593055069 - 9782744192067 - 1933499265 - 8957591230 - 9757064831 - 0593055063 - 8804571918 - 8376590278 - 9781593975081 - 0552159735 - 8389779013 - 9780736696890 - 9782253127079 - 9789953299129 - 1593975082 - 9789024553020 - 9788957591222 - 9788375081985 - 9785170137763 - 8599296205 - 9780786259793 - 0593077997 - 0552169986 - 9788497871587 - 9781427214423 - 9788497871594 - 140909118X - 0312995423 - 9783404157624 - 9780312335168 - 9789757064831 - 9875808903 - 4047915181 - 9781409091172 - 4042955118 - 9781593975630 - 9788408176107 - 8375088498 - 9781427271280 - 9788599296202 - 9788499300276 - 9788376590271 - 9780312207151 - 1439565775 - 9789024527915 - 9780752868929 - 9788957591239 - 9781250898036 - 9789752111653 - 841703126X - 9752111653 - 9785170313396 - 404295510X - 9788575421611 - 9788489367012 - 2253127078 - 0312944926 - 957134317X - 9787020101542 - 9781417664368 - 9780552173551 - 9784042955115 - 1427271283 - 8373591729 - 9752112439 - 8957591249 - 9788417031268 - 9784047915176 - 9780786113729 - 9788580414059 - 9788389779014 - 9781933499260 - 8575421611 - 9780552169998 - 0552212431 - 9780736696951 - 055216125X - 9024553024 - 0312263120 - 9780552212434 - 517031339X - 9788373591721 - 9780312995423 - 0312335164 - 1409091171 - 9780312944926 - 9789571343174 - 0552171379 - 0752868918 - 0593057449 - 8957591222 - 9787020048144 - 9780552169981 - 2709626306
First Setence:
"They were in the Smoky Mountains at their favorite bed-and-breakfast."
"They were in the smoky mountains at their favorite bed-and-breakfast."
Author's Alternative Names:
"Dens Brauns", "BROWN DAN", "Danielle Brown", "(mei) Ge, er si man (Brown, Dan)", "دان براون", "Дэн Браун / Dan Brown", "Дэн Браун", "Brown,Dan", "DAN BROWN" and "Dan Brown ( dan bu lang)"Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Digital Fortress at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Hacking
By Jon Erickson and Jon Erickson

“Hacking” Metadata:
- Title: Hacking
- Authors: Jon EricksonJon Erickson
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 384
- Publisher: ➤ No Starch Press, Incorporated - Anaya Multimedia - No Starch Press - Dpunkt.Verlag GmbH
- Publish Date: 2003 - 2007 - 2008
- Publish Location: Madrid - San Francisco, CA
“Hacking” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer hackers - Security measures - Computer security - Hackers - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL58399590M - OL34012869M - OL39216568M - OL32507218M - OL26390872M - OL24891296M - OL18500076M - OL8871437M - OL8871391M
- Online Computer Library Center (OCLC) ID: 219606838 - 630813373 - 175218338 - 70077772
- Library of Congress Control Number (LCCN): 2003017498 - 2007042910
- All ISBNs: ➤ 1593271441 - 9788441524699 - 9783898645362 - 8441524696 - 9781593270070 - 9781593270872 - 3898645363 - 1593270879 - 9781593271442 - 1593270070
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Gray Hat Hacking
The Ethical Hacker's Handbook
By Shon Harris, Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle and Jonathan Ness

“Gray Hat Hacking” Metadata:
- Title: Gray Hat Hacking
- Authors: ➤ Shon HarrisAllen HarperDaniel RegaladoRyan LinnStephen SimsBranko SpasojevicLinda MartinezMichael BaucomChris EagleJonathan Ness
- Language: English
- Number of Pages: Median: 595
- Publisher: ➤ McGraw Hill - McGraw-Hill Osborne Media - McGraw-Hill/Osborne - McGraw-Hill - McGraw-Hill Education
- Publish Date: ➤ 2004 - 2005 - 2008 - 2011 - 2015 - 2018 - 2022
- Publish Location: New York
“Gray Hat Hacking” Subjects and Themes:
- Subjects: ➤ Computer hackers - Computer security - Hackers - Computer crimes - Networking - Internet - Security - COMPUTERS - General - Penetration testing (Computer security) - Handbooks, manuals - Hacking - Engineering & Applied Sciences - Computer Science - Computing & information technology - Computer networking & communications - Ethical & social aspects of IT - Computer fraud & hacking - Network security - Computers and IT
Edition Identifiers:
- The Open Library ID: ➤ OL36144432M - OL26837931M - OL26833180M - OL23906038M - OL25016642M - OL3440123M - OL9257247M - OL7302570M
- Online Computer Library Center (OCLC) ID: 748265658 - 659756242 - 182552993 - 57688548
- Library of Congress Control Number (LCCN): 2005299894 - 2007047838 - 2010053295
- All ISBNs: ➤ 9780071495684 - 9781264268948 - 0071742557 - 9780071832380 - 0072257091 - 0071832386 - 0071495681 - 1264268947 - 9780072257090 - 9780071742559 - 9781260108415 - 1260108414
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Gray Hat Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Network Security
By Ankit Fadia

“Network Security” Metadata:
- Title: Network Security
- Author: Ankit Fadia
- Language: English
- Number of Pages: Median: 360
- Publisher: ➤ Course Technology PTR - Thompson Course Technology - Premier Press - Tandem Library
- Publish Date: 2002 - 2003 - 2006
- Publish Location: Cincinnati, Ohio
“Network Security” Subjects and Themes:
- Subjects: Computer hackers - Computer security - Hackers
Edition Identifiers:
- The Open Library ID: OL8899568M - OL22858696M - OL9394138M - OL8859386M
- Online Computer Library Center (OCLC) ID: 52223318 - 70174767
- Library of Congress Control Number (LCCN): 2005911177 - 2002116159
- All ISBNs: ➤ 9781592000456 - 1598631632 - 0613916980 - 9780613916981 - 9781598631630 - 1592000452
First Setence:
"Just as in the real world people have home addresses or telephone numbers that others can use to contact them, every system connected to the Internet or to a particular network has its own unique Internet protocol address or IP address."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Black Hat Python: Python Programming for Hackers and Pentesters
By Justin Seitz and Tim Arnold

“Black Hat Python: Python Programming for Hackers and Pentesters” Metadata:
- Title: ➤ Black Hat Python: Python Programming for Hackers and Pentesters
- Authors: Justin SeitzTim Arnold
- Language: pol
- Number of Pages: Median: 192
- Publisher: ➤ No Starch Press - Wydawnictwo Helion
- Publish Date: 2014 - 2015 - 2021
- Publish Location: Gliwice
“Black Hat Python: Python Programming for Hackers and Pentesters” Subjects and Themes:
- Subjects: ➤ Python (Computer program language) - Computer security - Python (język programowania) - Sieci komputerowe - Dostęp - Kontrola - Komputery
Edition Identifiers:
- The Open Library ID: OL32434771M - OL38241024M - OL26837925M
- Online Computer Library Center (OCLC) ID: 932189711 - 880566746 - 900086572
- Library of Congress Control Number (LCCN): 2014953241
- All ISBNs: ➤ 8328312506 - 1718501129 - 9781593275907 - 1593275900 - 9781718501126 - 9788328312500
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Black Hat Python: Python Programming for Hackers and Pentesters at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Ethical Hacking
By EC-Council

“Ethical Hacking” Metadata:
- Title: Ethical Hacking
- Author: EC-Council
- Language: English
- Number of Pages: Median: 990
- Publisher: Osb Publisher Pte Ltd
- Publish Date: 2003
“Ethical Hacking” Subjects and Themes:
- Subjects: Computer security - Hackers
Edition Identifiers:
- The Open Library ID: OL8579867M
- Online Computer Library Center (OCLC) ID: 54801132
- All ISBNs: 9780972936217 - 0972936211
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Ethical Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Unofficial guide to ethical hacking
By Ankit Fadia

“Unofficial guide to ethical hacking” Metadata:
- Title: ➤ Unofficial guide to ethical hacking
- Author: Ankit Fadia
- Language: English
- Number of Pages: Median: 608
- Publisher: Macmillan
- Publish Date: 2001
- Publish Location: Delhi
“Unofficial guide to ethical hacking” Subjects and Themes:
- Subjects: Computer hackers - Computer security - Hackers
Edition Identifiers:
- The Open Library ID: OL4003637M
- Online Computer Library Center (OCLC) ID: 48810669
- Library of Congress Control Number (LCCN): 2001357180
- All ISBNs: 9780333936795 - 0333936795
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Unofficial guide to ethical hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Firewall -- Canadian Book Club
By Andy McNab

“Firewall -- Canadian Book Club” Metadata:
- Title: Firewall -- Canadian Book Club
- Author: Andy McNab
- Languages: English - fre
- Number of Pages: Median: 443
- Publisher: ➤ Transworld - LGF - Corgi Books - Chivers Large print (Chivers, Windsor, Paragon & C - BCA - Orange Hippos! - Bantam Press - Apostrophe Books Ltd - De Fallois - Atria - London: BCA, 2000 - Corgi - Seal Books - Corgi Adult - Simon + Schuster Inc. - Chivers Audio Books - Penguin Random House - Pocket - Goldmann - Pocket Books
- Publish Date: ➤ 2000 - 2001 - 2002 - 2003 - 2004 - 2008 - 2009 - 2011 - 2014 - 2022
- Publish Location: ➤ [Place of publication not identified] - New York - London
“Firewall -- Canadian Book Club” Subjects and Themes:
- Subjects: ➤ Fiction - Nick Stone (Fictitious character) - Intelligence officers - British - Mafia - Estonia - Spy stories - Thriller - Organized crime - FICTION / Thrillers / General - FICTION / Mystery & Detective / International Mystery & Crime - FICTION / Thrillers / Suspense - FICTION / Thrillers / Crime - Military intelligence - Fiction, action & adventure - Fiction, thrillers, espionage - Europe, eastern, fiction - Stone, nick (fictitious character), fiction - Computer security - Hackers - Fiction, suspense - Fiction, thrillers - Officiers de renseignements - Romans, nouvelles
- People: ➤ Nick Stone (Fictitious character)
- Places: Estonia
Edition Identifiers:
- The Open Library ID: ➤ OL7949310M - OL18545492M - OL36682741M - OL12640970M - OL12710181M - OL24258997M - OL28463141M - OL40369529M - OL43605659M - OL43635794M - OL3942152M - OL34162270M - OL24947218M - OL43598277M - OL18512224M - OL3656225M - OL39201137M - OL7950590M - OL23245702M - OL24225684M - OL24390358M - OL43563655M - OL12506317M - OL43467601M - OL7988754M - OL7989482M - OL7815488M
- Online Computer Library Center (OCLC) ID: ➤ 48488687 - 679659723 - 56656399 - 76399415 - 50181137 - 469673849 - 319852094
- Library of Congress Control Number (LCCN): 2001021015 - 2002510331
- All ISBNs: ➤ 2253172952 - 9780743463263 - 9783442356881 - 9780754007142 - 0754007146 - 0593046161 - 9780552147972 - 9782253172956 - 9780754087472 - 0552152374 - 0552167185 - 0593046684 - 1407039687 - 0552163554 - 1407039695 - 1407039709 - 9781407039688 - 074343515X - 1787398609 - 9780593046166 - 0754024016 - 9780743406277 - 9780754024019 - 0754087476 - 9781407039701 - 9781407039695 - 0743463269 - 9781910167359 - 9781787398603 - 9780743406260 - 9780743435154 - 0552147974 - 0770428959 - 9780593046685 - 9782877064309 - 0743406265 - 3442356881 - 1910167355 - 9780770428952 - 9780552163552 - 9780552167185 - 0743406273 - 9780552152372 - 2877064301
Author's Alternative Names:
"Mcnab, Andy ; Rigby, Robert", "Di Morrissey", "Thomas Eidson", "Douglas Kennedy", "MCNAB ANDY", "Andy MacNab" and "Andy Mcnab"Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Firewall -- Canadian Book Club at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Cyberpunk
outlaws and hackers on the computer frontier
By Katie Hafner and John Markoff

“Cyberpunk” Metadata:
- Title: Cyberpunk
- Authors: Katie HafnerJohn Markoff
- Languages: chi - English
- Number of Pages: Median: 379
- Publisher: ➤ Tian xia wen hua chu ban gu fen you xian gong si - Simon & Schuster - Fourth Estate - Touchstone - Corgi
- Publish Date: ➤ 1991 - 1992 - 1993 - 1994 - 1995
- Publish Location: ➤ Taibei Shi - Toronto - London - New York
“Cyberpunk” Subjects and Themes:
- Subjects: ➤ Computer crimes - Computer security - Computer hackers - Hackers - Mathematics and Science - Punk culture
Edition Identifiers:
- The Open Library ID: ➤ OL7664832M - OL7815014M - OL17405103M - OL22938262M - OL1533824M - OL22050067M - OL15948838M - OL21594773M - OL7721226M
- Online Computer Library Center (OCLC) ID: 23254778 - 32527148
- Library of Congress Control Number (LCCN): 91011598
- All ISBNs: ➤ 067177879X - 0684818620 - 9780671778798 - 9781872180946 - 0671683225 - 9576212316 - 9780671683221 - 0552139637 - 1872180949 - 9780684818627 - 9780552139632 - 9789576212314
First Setence:
"It was partnership, if not exactly friendship, that kept the group together."
Access and General Info:
- First Year Published: 1991
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Cyberpunk at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Network Security Assessment
By Chris McNab

“Network Security Assessment” Metadata:
- Title: Network Security Assessment
- Author: Chris McNab
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 478
- Publisher: ➤ O'Reilly Media, Inc. - O'Reilly Media, Incorporated - Anaya Multimedia - O'Reilly - O'Reilly Media
- Publish Date: ➤ 2004 - 2005 - 2007 - 2008 - 2016
- Publish Location: ➤ Sebastopol, CA - Cambridge - Sebastopol - Beijing
“Network Security Assessment” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Computers - Evaluation - Security measures - Computer networks, security measures - Computers, access control - Database security - Data protection - Computer security - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: ➤ OL23691203M - OL22133719M - OL36716419M - OL3327684M - OL36706371M - OL23399927M - OL13267854M - OL23635962M - OL36707449M - OL9513003M - OL23556906M - OL36716538M - OL26836814M
- Online Computer Library Center (OCLC) ID: 180989270 - 57059486
- Library of Congress Control Number (LCCN): 2009419532 - 2004302106
- All ISBNs: ➤ 9780596519339 - 0596510306 - 9781306816878 - 149191095X - 9780596510305 - 059600611X - 9788441517516 - 8441517517 - 0596519338 - 1306816874 - 1306817455 - 9781491910955 - 9780596520809 - 0596520808 - 9781306817455 - 9780596006112
Author's Alternative Names:
"Christopher Ross McNab" and "Christopher R. McNab"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Network Security Assessment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11SAS(R) 9.1.3 Intelligence Platform
By SAS Publishing

“SAS(R) 9.1.3 Intelligence Platform” Metadata:
- Title: ➤ SAS(R) 9.1.3 Intelligence Platform
- Author: SAS Publishing
- Language: English
- Number of Pages: Median: 228
- Publisher: ➤ SAS Pub. - SAS Institute - SAS - Brand: SAS Institute
- Publish Date: 2006 - 2007
- Publish Location: Cary, NC
“SAS(R) 9.1.3 Intelligence Platform” Subjects and Themes:
- Subjects: ➤ SAS (Computer file) - Integrated software - Web servers - Application software - SAS Institute - Data structures (Computer science) - Database management - Computer security - Development - Servlets - Web site development - Management information systems - Management - Networking - Computer networks - COMPUTERS - Data protection - General - Internet - Security - Security measures - System design
Edition Identifiers:
- The Open Library ID: ➤ OL21812906M - OL20988937M - OL19968881M - OL17993805M - OL17993790M - OL17977470M - OL17993801M - OL17977475M - OL17993794M - OL17993788M - OL17993796M - OL12502666M - OL12502674M - OL12502678M - OL8902488M - OL12502681M - OL12502677M - OL12502665M - OL12502673M - OL12502676M - OL12502675M
- Online Computer Library Center (OCLC) ID: ➤ 227000261 - 225961942 - 144548800 - 144333195 - 144548804 - 144548802 - 144548803 - 144548806 - 144333171 - 144548799
- Library of Congress Control Number (LCCN): ➤ 2007275864 - 2007275858 - 2008273243 - 2007275860 - 2007275861 - 2007275859 - 2007275862 - 2007275863 - 2007275865 - 2006278738
- All ISBNs: ➤ 9781599942889 - 9781599942872 - 9781599942834 - 9781599941554 - 1599940078 - 9781599943763 - 1599942852 - 1599942860 - 1599941678 - 1599942887 - 9781599942827 - 1599942836 - 1599942879 - 159994376X - 1599942828 - 1599941554 - 9781599942865 - 9781599940076 - 9781599942858 - 9781599941677
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find SAS(R) 9.1.3 Intelligence Platform at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12How to disappear
By Frank M. Ahearn

“How to disappear” Metadata:
- Title: How to disappear
- Author: Frank M. Ahearn
- Language: English
- Number of Pages: Median: 204
- Publisher: ➤ Globe Pequot Press, The - Lyons Press
- Publish Date: 2010
- Publish Location: Guilford, Conn
“How to disappear” Subjects and Themes:
- Subjects: ➤ Security systems - Surveillance detection - Security (Psychology) - Computer security - Identity theft - Prevention - Security (psychology) - Electronic surveillance
Edition Identifiers:
- The Open Library ID: OL39991240M - OL26263753M - OL39978650M
- Online Computer Library Center (OCLC) ID: 601045427
- Library of Congress Control Number (LCCN): 2010030345
- All ISBNs: ➤ 1599219778 - 076279609X - 9780762766734 - 0762766735 - 9780762796090 - 9781599219776
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find How to disappear at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Advances in Computers, Volume 49 (Advances in Computers)
By Marvin V. Zelkowitz and Marshall C. Yovits

“Advances in Computers, Volume 49 (Advances in Computers)” Metadata:
- Title: ➤ Advances in Computers, Volume 49 (Advances in Computers)
- Authors: Marvin V. ZelkowitzMarshall C. Yovits
- Language: English
- Number of Pages: Median: 345
- Publisher: ➤ Elsevier - Elsevier Science & Technology Books - Academic Press - Elsevier Science & Technology
- Publish Date: ➤ 1995 - 1996 - 1997 - 1998 - 1999 - 2000 - 2002 - 2003 - 2004 - 2005 - 2006 - 2007 - 2009 - 2010 - 2011
- Publish Location: ➤ San Diego, Calif - London - San Diego, CAL
“Advances in Computers, Volume 49 (Advances in Computers)” Subjects and Themes:
- Subjects: ➤ Computers, periodicals - Electronic data processing - Informatique - Computers - Ordinateurs - Machine Theory - Reference - COMPUTERS - General - Hardware - Computer Literacy - Computer science - Data Processing - Information Technology - Computer Science - Periodicals - Reliability (Engineering) - Logiciels - Fiabilité - Computer software - Reliability (engineering) - Software - Security measures - Information technology - Internet - Computer security - Architecture des ordinateurs - Architecture des réseaux d'ordinateurs - Développement - Computer architecture - Ordinadors, Xarxes d' - Software engineering - Computer programming - World Wide Web - Development - User interfaces (Computer systems) - Computer software, development - Web sites - Electronic journals - World wide web - Indexes - Computers, bibliography - Distributed processing - Distributed databases - Client-Server Computing - Software measurement
Edition Identifiers:
- The Open Library ID: ➤ OL21118119M - OL33527155M - OL34417056M - OL34417063M - OL34417236M - OL34419199M - OL34422291M - OL34424341M - OL34424952M - OL34428335M - OL34444894M - OL34453752M - OL34455561M - OL34458358M - OL34579727M - OL34581295M - OL34583035M - OL34584698M - OL34586338M - OL34589456M - OL34589693M - OL34589712M - OL34596356M - OL34598190M - OL35750194M - OL35752690M - OL35754651M - OL35756456M - OL35772187M - OL40442522M - OL44170533M - OL9279645M - OL7324997M - OL7324998M - OL9279646M - OL7325000M - OL9279648M - OL9282190M - OL7327542M - OL9282188M - OL7327540M - OL9279662M - OL7325014M - OL9279661M - OL7325013M - OL9279659M - OL7325011M - OL9279657M - OL7325009M - OL9279656M - OL7325008M - OL7325007M - OL9279655M - OL9279654M - OL7325006M - OL7325005M - OL9279653M - OL9279652M - OL7325004M - OL9279649M - OL7325001M - OL9279644M - OL7324996M - OL9279643M - OL7324995M - OL9279640M - OL7324992M - OL22152160M - OL9455977M
- Online Computer Library Center (OCLC) ID: 803225323 - 124025241 - 646754577 - 162568906 - 492936497
- Library of Congress Control Number (LCCN): 2009659258
- All ISBNs: ➤ 0120121484 - 0120121409 - 0120121611 - 0080462871 - 0080951120 - 0080951139 - 9780080566726 - 0120121514 - 0080566731 - 9780120121465 - 0080466346 - 9780080524405 - 0080459145 - 008049028X - 9780080526652 - 9780080493510 - 9780080566764 - 9780123737472 - 0080526659 - 9780120121458 - 0120121573 - 9780080459141 - 9780123737458 - 9780080566740 - 012012145X - 0080471897 - 0120121581 - 9780123810281 - 0080566758 - 9780120121489 - 0080459587 - 9780080566757 - 0120121441 - 0080459676 - 0080526683 - 9780120121663 - 9780120121441 - 0080951112 - 008056674X - 9780120121496 - 0080524400 - 0080566766 - 0080526675 - 0080524419 - 9780080951126 - 0080545106 - 0080493513 - 9780120121670 - 9780120121403 - 0080471900 - 0123737478 - 9780120121625 - 9780080471891 - 0120121646 - 9780080880310 - 0123737451 - 9780120121526 - 9780080490281 - 0120121670 - 9780120121571 - 0120121522 - 9780080566733 - 0120121468 - 0120121603 - 9780080459585 - 0080566812 - 0123810280 - 9780120121519 - 9780120121649 - 0080566723 - 0080566774 - 9780120121601 - 012012159X - 0080462863 - 9780080459677 - 9780080524412 - 9780080526683 - 9780123810267 - 9780080466347 - 0123810264 - 9780080526676 - 9780080951119 - 9780123855138 - 9780080462868 - 012012162X - 9780080462875 - 0123855136 - 0120121662 - 0120121492 - 0080880312 - 9780080471907 - 9780120121595 - 9780120121618 - 9780080545103 - 9780120121588 - 9780080566771 - 9780080951133 - 9780080566818
First Setence:
"The number of software professionals in the workforce is large and growing."
"Organizations are distributed, interactive, parallel systems, that handle incomplete and inconsistent information."
"Numerous attempts have been made in the past, both in the United States and Europe, to automate various steps in the translation process."
"A collaborative development environment (CDE) is a virtual space wherein all the stakeholders of a project-even if distributed by time or distance-may negotiate, brainstorm, discuss, share knowledge, and generally labor together to carry out some task, most often to create an executable deliverable and its supporting artifacts."
"Software Process Improvement (SPI) is the discipline of characterizing, defining, measuring, and improving software management and engineering processes."
"Software is everywhere."
"The pace of life is more frantic than ever."
"The size, complexity, and power of software-intensive systems have exploded since the beginning of the Information Age, and software has become a core competency that is critical to high-technology companies."
"The concept of "relevance" is at the heart of information science and especially information retrieval (IR) [54]."
"Program Understanding, also referred to as Code Cognition or Program Comprehension, is a central activity during software maintenance, evolution, and reuse."
"Risk is perceived by most people as a rather straightforward concept."
"In the early days of software development, much attention was given to issues related to the design of algorithms and data structures."
"A mobile computing environment involves accessing information through a wireless network connection."
"It is not an illusion; these are truly exciting times in which we live."
"Computers and the related arts and sciences of digital computing have changed our world in many ways."
"Distributed computing helps improve application performance through multi-processing; reliability and availability through replication; scalability, extensibility, and portability through modularity; and cost effectiveness though resources sharing and open systems."
Author's Alternative Names:
"Zelkowitz, Marvin V. Informatiker", "Zelkowitz, Marvin V. Informaticien", "Zelkowitz, Marvin V. Computer scientist", "M. C. Yovits", "M. Zelkowitz", "M. Yovits" and "Marvin Zelkowitz"Access and General Info:
- First Year Published: 1995
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Computers, Volume 49 (Advances in Computers) at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Hacking for Dummies
By Kevin Beaver and Jutta Schmidt

“Hacking for Dummies” Metadata:
- Title: Hacking for Dummies
- Authors: Kevin BeaverJutta Schmidt
- Languages: English - ger
- Number of Pages: Median: 396
- Publisher: ➤ For Dummies - John Wiley & Sons, Inc. - Wiley - Wiley Pub. - John Wiley & Sons, Ltd. - Wiley & Sons, Limited, John - Brand: Wiley-VCH Verlag GmbH - John Wiley & Son inc. - Wiley & Sons Canada, Limited, John - John Wiley &Sons - Wiley & Sons, Incorporated, John
- Publish Date: ➤ 2004 - 2006 - 2007 - 2009 - 2010 - 2012 - 2013 - 2015 - 2016 - 2018 - 2019 - 2020 - 2022
- Publish Location: ➤ Hoboken, NJ - New York - Chichester
“Hacking for Dummies” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer hackers - Computer networks - Computer security - Nonfiction - Security measures - Networking - Data protection - General - Internet - Security - Hackers - Computer networks, security measures - Engineering & Applied Sciences - Computer Science
Edition Identifiers:
- The Open Library ID: ➤ OL39938989M - OL39984549M - OL33467708M - OL33643196M - OL33721332M - OL33814272M - OL33835394M - OL40053258M - OL40077759M - OL33415963M - OL26961199M - OL26838501M - OL29131004M - OL29131005M - OL29304324M - OL33645424M - OL33645425M - OL34529389M - OL35584459M - OL35853272M - OL35881789M - OL39849032M - OL39856690M - OL39863911M - OL39900428M - OL40050877M - OL48632739M - OL48635334M - OL48638700M - OL26319294M - OL25353392M - OL24256462M - OL18498113M - OL24276588M - OL23072865M - OL8050918M - OL7595409M
- Online Computer Library Center (OCLC) ID: ➤ 1043392947 - 858027983 - 219607826 - 908805314 - 614432840 - 437082945
- Library of Congress Control Number (LCCN): 2006932690 - 2004101971 - 2012955723 - 2009942371 - 2018944084
- All ISBNs: ➤ 1118380932 - 9780764557842 - 9780470550939 - 3527677232 - 9781118380949 - 9781118380956 - 9781119174714 - 1283941120 - 1118380967 - 9780470602560 - 0470602562 - 1118380940 - 0470550937 - 9783527819041 - 9781118380932 - 9781119485476 - 9780470199268 - 9780470052358 - 9783527715510 - 9780470113073 - 3527805001 - 3527819045 - 1119872200 - 3527677224 - 9781119154686 - 1119872197 - 9780764573781 - 9781119872214 - 9781280649691 - 0470113073 - 9781118380963 - 3527715517 - 1119872219 - 1119485517 - 352780501X - 1119154707 - 9781119872207 - 9783527805006 - 9781119872191 - 9783527708307 - 9783527717958 - 1119485479 - 3527708308 - 9781119154693 - 9780470602683 - 0470602678 - 0470602686 - 9783527677238 - 1119485541 - 1280649690 - 9781119485513 - 1119154685 - 9781280350320 - 1280350326 - 1118380959 - 0470199261 - 3527829229 - 1119174716 - 9781283941129 - 9781119154709 - 9783527829224 - 076455784X - 0764573780 - 9783527677221 - 1119154693 - 9781119485544 - 9780470602676 - 9783527805013 - 3527717951 - 047005235X
First Setence:
"This book is about hacking ethically - the science of testing your computers and network for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them."
Author's Alternative Names:
"Kevin M. Beaver" and "Kevin Michael Beaver"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking for Dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Computer Concepts
By June Jamrich Parsons and Dan Oja

“Computer Concepts” Metadata:
- Title: Computer Concepts
- Authors: June Jamrich ParsonsDan Oja
- Languages: ➤ English - Spanish; Castilian - español, castellano
- Number of Pages: Median: 336
- Publisher: ➤ Course Technology - Course Technology Cengage Learning - Course Technology Ptr (Sd) - International Thomson Publishing - Cengage South-Western - CENGAGE COURSE TECHNOLOGY - Thomson/Course Technology - Course Technology, Inc. - Course Technology Ptr
- Publish Date: ➤ 1996 - 1997 - 1998 - 2000 - 2001 - 2002 - 2004 - 2005 - 2006 - 2007 - 2008 - 2009 - 2012
- Publish Location: ➤ Australia - México - Albany - London - Cambridge, Mass - Albany, N.Y - Boston, Mass
“Computer Concepts” Subjects and Themes:
- Subjects: ➤ Amateurs' manuals - Computer input-output equipment - Computer science - Computer software - Computers - Handbooks, manuals - Handbooks, manuals, etc - Informática - Popular works - Problems, exercises - Problems, exercises, etc - Study and teaching - General Theory of Computing - General - Computers - General Information - Computer Books: General - Computer Literacy - Computers, handbooks, manuals, etc. - Computers, study and teaching - Computer files - Computer security - Internet - Microcomputers - Computer programs
Edition Identifiers:
- The Open Library ID: ➤ OL22312546M - OL17175049M - OL8010579M - OL7606966M - OL24956464M - OL8010527M - OL22595138M - OL7607139M - OL28487374M - OL7607377M - OL17928529M - OL20137721M - OL10899859M - OL8469591M - OL22271146M - OL21697685M - OL10900179M - OL8010572M - OL28476103M - OL8469589M - OL29088043M - OL11853115M - OL11012564M - OL22928315M - OL8495866M - OL22529603M - OL7606649M - OL22053878M - OL11012391M - OL8469590M
- Online Computer Library Center (OCLC) ID: ➤ 228032502 - 166346848 - 44631111 - 69173021 - 71248382 - 62272027 - 48414163 - 62141267 - 70832287
- Library of Congress Control Number (LCCN): 2007273909 - 2006287616 - 2008298776 - 2012930596
- All ISBNs: ➤ 1423905660 - 9780619109004 - 9781418860356 - 1423999339 - 9780619017323 - 9780760034392 - 1133526160 - 9780619057909 - 9780760057964 - 0760034400 - 1418860360 - 0619109009 - 9781133526162 - 9781423905660 - 0760054495 - 9781418860387 - 9781423999331 - 9780760072349 - 1133526241 - 1418860387 - 0760057966 - 9780619188191 - 0619273550 - 9781133526247 - 9781133596011 - 9780760054499 - 0619108355 - 1133596010 - 9781418860363 - 9687529148 - 0619057904 - 0760034397 - 1418860352 - 0760072345 - 9780619108359 - 0619188197 - 9780760034408 - 9789687529141 - 9780619273552 - 0619017325
Author's Alternative Names:
"June Parsons", "June Jamnich Parsons" and "June Jamrich"Access and General Info:
- First Year Published: 1996
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Concepts at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16The web application hacker's handbook
By Dafydd Stuttard and Dafydd Stuttard

“The web application hacker's handbook” Metadata:
- Title: ➤ The web application hacker's handbook
- Authors: Dafydd StuttardDafydd Stuttard
- Language: English
- Number of Pages: Median: 840
- Publisher: ➤ Wiley Pub. - Wiley - John Wiley & Sons, Ltd. - Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John
- Publish Date: ➤ 2007 - 2008 - 2010 - 2011 - 2014
- Publish Location: ➤ Indianapolis - Indianapolis, IN - New York
“The web application hacker's handbook” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Security measures - Computer security - Internet - Internet, security measures - Hackers - Application software - Handbooks, manuals - Internet--security measures - Tk5105.875.i57 s85 2008 - Internet--säkerhetsaspekter - Datasäkerhet - Internet -- security measures. sears - Computer security. sears - Tk5105.875.i57 s852 2011 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL50509771M - OL39890486M - OL39887984M - OL39882008M - OL39878826M - OL29079436M - OL29079437M - OL25567215M - OL9402385M - OL23652494M - OL23531202M - OL24262697M
- Online Computer Library Center (OCLC) ID: 786167000 - 243693215 - 759159321 - 156994544
- Library of Congress Control Number (LCCN): 2011934639 - 2007029983
- All ISBNs: ➤ 9780470170779 - 9781118175224 - 0470644915 - 978-1-118-17523-1 - 1118175220 - 9781118079614 - 1118175239 - 0470237988 - 9781283258210 - 9788126533404 - 1118079612 - 1281100218 - 1283258218 - 8126533404 - 9780470644911 - 9781118175231 - 9781281100214 - 9781118026472 - 9781118175248 - 9780470237984 - 0470170778 - 978-1-118-17524-8 - 1118026470 - 1118175247
First Setence:
"This book is a practical guide to discovering and exploiting security flaws in web applications."
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The web application hacker's handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Hackers
Heroes of the Computer Revolution
By Steven Levy

“Hackers” Metadata:
- Title: Hackers
- Author: Steven Levy
- Languages: English - tur
- Number of Pages: Median: 458
- Publisher: ➤ ODTÜ Yayıncılık - Penguin Books - Delta - Anchor Press/Doubleday - O'Reilly Media - Penguin (Non-Classics) - Dell Pub. - Tandem Library - Doubleday Books
- Publish Date: ➤ 1984 - 1985 - 1994 - 2001 - 2010
- Publish Location: ➤ Sebastopol, CA - New York, N.Y - Garden City, N.Y - Ankara, Turkey
“Hackers” Subjects and Themes:
- Subjects: ➤ Computer programming - Electronic digital computers - Programming - Computer hackers - History - Internet - Computer science - Hackers - maths - mathematics - Programmation (Informatique) - Passionnés d'informatique - Computer engineering - Geeks (Computer enthusiasts) - Artificial intelligence - Research - Popular works - Biographies - Computer crimes - Computer security - Criminal psychology - Computer networks, security measures
- People: ➤ Bob Albrecht - Bob Box - Carolyn Box - Doug Carlston - Bob Davis - Peter Deutsch - Steve Dompier - John Draper - Mark Duchaineau - Chris Epinosa - Lee Felsenstein - Ed Fredkin - Gordon French - Richard Garriott - Bill Gates - Bill Gosper - Richard Greenblatt - John Harris - Jerry Jewell - Steven Jobs - Tom Knight - Alan Kotok - Efrem Lipkin - John McCarthy - Bob Marsh - Roger Melen - Louis Merton - Jude Milhon - Marvin Minsky - Fred Moore - Stewart Nelson - Ted Nelson (1937-) - Russel Noftsker - Adam Osborne - Tom Pittman - Ed Roberts - Steve Russell - Peter Samson - Bob Saunders - Warren Schwader - David Silver - Dan Sokol - Les Solomon - Marty Spergel - Richard Stallman (1953-) - Jeff Stephenson - Jay Sullivan - Dick Sunderland - Gerry Sussman - Margot Tommervik - Jim Warren - Randy Wigginton - Ken Williams - Roberta Williams - Stephen Wozniak
- Time: 1950-1980
Edition Identifiers:
- The Open Library ID: ➤ OL25551982M - OL7357943M - OL25663390M - OL2844180M - OL3964146M - OL18298430M - OL24376515M - OL7439008M - OL9513913M - OL7437794M
- Online Computer Library Center (OCLC) ID: 686710304 - 615926697 - 29765572 - 10605060
- Library of Congress Control Number (LCCN): 2001268767 - 2010283265 - 84006188
- All ISBNs: ➤ 9780385191951 - 0385312105 - 9780613922081 - 1449388396 - 0613922085 - 0141000511 - 9780385312103 - 9781449388393 - 0385191952 - 9780141000510
Access and General Info:
- First Year Published: 1984
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hackers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Social Engineering
By Christopher Hadnagy

“Social Engineering” Metadata:
- Title: Social Engineering
- Author: Christopher Hadnagy
- Language: English
- Number of Pages: Median: 320
- Publisher: ➤ John Wiley [distributor] - Wiley Publishing - Wiley & Sons, Limited, John - Wiley - Wiley & Sons, Incorporated, John - Brilliance Audio
- Publish Date: 2011 - 2014 - 2018
- Publish Location: ➤ Indianapolis, IN - Indianapolis, Indiana - Canada
“Social Engineering” Subjects and Themes:
- Subjects: ➤ Computer hackers - Social engineering - Computer security - Human-computer interaction - Hackers - Social control
Edition Identifiers:
- Google Books ID: 8dctAAAAQBAJ
- The Open Library ID: ➤ OL31989622M - OL33621312M - OL37969435M - OL39215962M - OL26963465M - OL29368065M - OL25194026M
- Online Computer Library Center (OCLC) ID: ➤ 635494717 - 706860220 - 800927042 - 741365405 - 731821353 - 749686685 - 1047668289
- Library of Congress Control Number (LCCN): 2010937817
- All ISBNs: ➤ 1119433738 - 111943372X - 9781118029749 - 9781119433750 - 9781118029718 - 111943338X - 9781119433729 - 0470639539 - 1118029712 - 9780470639535 - 9781119433385 - 1118029747 - 9781491577011 - 1491577010 - 9781119433736 - 1119433754 - 1118028015 - 9781118028018
First Setence:
"It was just a few years ago that I was sitting with my friend and mentor, Mati Aharoni, deciding to launch www.social-engineer.org."
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Social Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19The Art of Deception
By Kevin D. Mitnick and William L. Simon

“The Art of Deception” Metadata:
- Title: The Art of Deception
- Authors: Kevin D. MitnickWilliam L. Simon
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Tantor and Blackstone Publishing - Wiley Publishing - Wiley - John Wiley & Sons, Ltd.
- Publish Date: ➤ 2001 - 2002 - 2003 - 2007 - 2021
- Publish Location: USA - New York
“The Art of Deception” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Social aspects - Computer hackers - Computer security - Information technology - Deception - Hackers - Business and economics - Computer networks, security measures - Security systems - Internal security - Social Engineering - Sécurité informatique - Sûreté de l'État - COMPUTERS - Internet - Security - Networking - General - Dispositifs de sécurité - Facteurs humains - Aspects psychologiques - Désinformation - Computerbeveiliging - Computercriminaliteit - Psychologische aspecten
- People: Kevin Mitnick
Edition Identifiers:
- Google Books ID: vRG7QgAACAAJ
- The Open Library ID: ➤ OL51730261M - OL35272573M - OL7613854M - OL8042481M - OL24328570M - OL24321037M
- Online Computer Library Center (OCLC) ID: 50494246 - 51209751 - 428739808
- Library of Congress Control Number (LCCN): 2002512977
- All ISBNs: ➤ 9781665197052 - 9780471237129 - 0471237124 - 9780764542800 - 1665197056 - 076454280X - 0471432288 - 9780471432289
First Setence:
"a company may have purchased the best security technologies that money can buy, trained their people so well that they lock up all their secrets before going home at night, and hired building guards from the best security firm in the business."
Author's Alternative Names:
"Kevin David Mitnick", "Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "Kevin MITNICK" and "KD Mitnick"Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Deception at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Ghost in the wires
By Kevin D. Mitnick

“Ghost in the wires” Metadata:
- Title: Ghost in the wires
- Author: Kevin D. Mitnick
- Language: English
- Number of Pages: Median: 413
- Publisher: ➤ Little, Brown and Company - Kevin D. Mitnick
- Publish Date: 2011 - 2012
- Publish Location: New York
“Ghost in the wires” Subjects and Themes:
- Subjects: ➤ Information superhighway - Computer hackers - Computer crimes - Computer security - Security measures - Biography - Hackers - nyt:hardcover-nonfiction=2011-09-04 - New York Times bestseller
- People: Kevin D. Mitnick (1963-)
- Places: United States
Edition Identifiers:
- The Open Library ID: OL25016402M - OL50983681M
- Online Computer Library Center (OCLC) ID: 668192474
- Library of Congress Control Number (LCCN): 2010043461
- All ISBNs: 9780316037709 - 0316037702 - 9780316037723 - 0316037729
Author's Alternative Names:
"Kevin Mitnick", "Kevim Mitnick", "Kevin MITNICK", "Kevin David Mitnick", "KD Mitnick" and "Kevin D Mitnick"Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Ghost in the wires at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Linux Basics for Hackers
By OccupyTheWeb

“Linux Basics for Hackers” Metadata:
- Title: Linux Basics for Hackers
- Author: OccupyTheWeb
- Language: English
- Number of Pages: Median: 248
- Publisher: ➤ No Starch Press, Incorporated - No Starch Press
- Publish Date: 2018 - 2024
“Linux Basics for Hackers” Subjects and Themes:
- Subjects: Computer security - Operating systems (computers)
Edition Identifiers:
- The Open Library ID: OL50722062M - OL26832978M
- All ISBNs: 1593278551 - 1718503547 - 9781593278557 - 9781718503540
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Linux Basics for Hackers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Cyber Security
By Martti Lehto and Pekka Neittaanmäki

“Cyber Security” Metadata:
- Title: Cyber Security
- Authors: Martti LehtoPekka Neittaanmäki
- Language: English
- Number of Pages: Median: 296
- Publisher: ➤ MOXIC - Springer International Publishing AG - Springer
- Publish Date: ➤ 2015 - 2016 - 2018 - 2019 - 2022 - 2023
“Cyber Security” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Military art and science - Cyber intelligence (Computer security) - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: ➤ OL36217165M - OL35882701M - OL28336263M - OL50635173M - OL27981972M - OL28188912M - OL28052076M
- Online Computer Library Center (OCLC) ID: 933526787
- All ISBNs: ➤ 9783319183015 - 9783030091972 - 3030912922 - 9783319352039 - 3319183028 - 3319753061 - 3319352032 - 9783030912925 - 331918301X - 3030912957 - 9783319183022 - 303009197X - 9783030912956 - 9783319753065
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
By Kevin D. Mitnick

“The Art of Invisibility” Metadata:
- Title: The Art of Invisibility
- Author: Kevin D. Mitnick
- Language: English
- Number of Pages: Median: 309
- Publisher: ➤ Little, Brown and Company - Hachette Book Group USA
- Publish Date: 2017
- Publish Location: New York
“The Art of Invisibility” Subjects and Themes:
- Subjects: ➤ Personal Computers - TECHNOLOGY & ENGINEERING - Web - Social Aspects - Online Safety & Privacy - Social Media - COMPUTERS - Right of Privacy - Data protection - Mobile Devices - Hardware - Computer security - Internet - Security - Security measures - Telecommunications - Mobile & Wireless Communications - Internet, security measures - Privacy, right of
Edition Identifiers:
- The Open Library ID: OL26241338M - OL27732598M
- Online Computer Library Center (OCLC) ID: 951711109
- Library of Congress Control Number (LCCN): 2016024302
- All ISBNs: 0316554545 - 9780316380508 - 9780316554541 - 0316380504
Author's Alternative Names:
"Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "KD Mitnick", "Kevin David Mitnick" and "Kevin MITNICK"Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Invisibility at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Cybersecurity for Dummies
By Dummies and Steinberg, Joseph

“Cybersecurity for Dummies” Metadata:
- Title: Cybersecurity for Dummies
- Authors: DummiesSteinberg, Joseph
- Language: English
- Number of Pages: Median: 376
- Publisher: ➤ For Dummies - Wiley & Sons, Incorporated, John
- Publish Date: 2019 - 2022
“Cybersecurity for Dummies” Subjects and Themes:
- Subjects: Computer security
Edition Identifiers:
- The Open Library ID: ➤ OL35590417M - OL35588743M - OL35209176M - OL29412223M - OL29412168M - OL28707191M
- All ISBNs: ➤ 1119867207 - 9781119560326 - 1119867193 - 9781119867197 - 1119867185 - 9781119560340 - 9781119867203 - 9781119867180 - 1119560357 - 1119560349 - 9781119560357 - 1119560322
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cybersecurity for Dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Open source intelligence techniques
By Michael Bazzell

“Open source intelligence techniques” Metadata:
- Title: ➤ Open source intelligence techniques
- Author: Michael Bazzell
- Languages: chi - English
- Number of Pages: Median: 418
- Publisher: ➤ unknown - CreateSpace Independent Publishing Platform - Independently published - Independently Published
- Publish Date: ➤ 2012 - 2013 - 2014 - 2015 - 2016 - 2018 - 2019 - 2021 - 2022
- Publish Location: Charleston, S.C.
“Open source intelligence techniques” Subjects and Themes:
- Subjects: Open source intelligence - Data mining in law enforcement - Computer security - Internet searching
- Places: United States
Edition Identifiers:
- Google Books ID: TVA_MwEACAAJ
- The Open Library ID: ➤ OL56670678M - OL56070506M - OL56070355M - OL55293285M - OL54975647M - OL54163709M - OL50061232M - OL27238151M - OL27993058M - OL32252269M - OL32482213M - OL37565338M - OL27183983M - OL26647666M
- Online Computer Library Center (OCLC) ID: ➤ 907400561 - 792741502 - 1117476466 - 1044946099 - 949853855 - 1039634203 - 1028094303 - 1021858497
- All ISBNs: ➤ 1530508908 - 1481282204 - 9781983839870 - 1983839442 - 9781983839443 - 9781481282208 - 9798578577086 - 9781984201577 - 9781699035306 - 9781519757913 - 149427535X - 9781530509324 - 1508636338 - 169903530X - 9798794816983 - 9781470079444 - 1984201573 - 1519757913 - 1530509327 - 1983839876 - 1470079445 - 9781494275358 - 9781508636335 - 9781530508907
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Open source intelligence techniques at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26CISSP for dummies
By Lawrence H. Miller, Peter H. Gregory, Lawrence Miller, Lawrence C. Miller, Peter H., CISA, CISSP Gregory and Peter Gregory

“CISSP for dummies” Metadata:
- Title: CISSP for dummies
- Authors: ➤ Lawrence H. MillerPeter H. GregoryLawrence MillerLawrence C. MillerPeter H., CISA, CISSP GregoryPeter Gregory
- Language: English
- Number of Pages: Median: 560
- Publisher: ➤ John Wiley & Sons - For Dummies - Wiley & Sons Canada, Limited, John - Wiley & Sons, Limited, John - Wiley Pub. - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2002 - 2007 - 2009 - 2012 - 2016 - 2018 - 2022 - 2024
- Publish Location: ➤ Indianapolis, IN - Hoboken, N.J - New York, NY
“CISSP for dummies” Subjects and Themes:
- Subjects: ➤ Study guides - Examinations - Computer security - Computer networks - Electronic data processing personnel, certification - Electronic data processing personnel - Certification - Data security & data encryption - Privacy & data protection - Computers - Computer Data Security - Data Transmission Standards And Protocols - Networking - Network Protocols - Computers - Certification - Electronic data processing per - Computer Books: General - Data processing - Certification Guides - General - Security - General - Computers / Technical Skills - Professional - General - Computer security equipment industry
Edition Identifiers:
- The Open Library ID: ➤ OL50651092M - OL21423310M - OL33843065M - OL39856686M - OL29122315M - OL39989294M - OL29373864M - OL50622253M - OL34532997M - OL39860036M - OL50634638M - OL21422329M - OL29373868M - OL23112555M - OL33855384M - OL31105833M - OL29013224M - OL48648732M - OL39990733M - OL33855408M - OL20753399M - OL34532996M - OL42989393M - OL7596349M - OL29122311M - OL8041858M
- Online Computer Library Center (OCLC) ID: 852428668 - 496966518 - 50843987
- Library of Congress Control Number (LCCN): 2012942107 - 2006939502 - 2002110297
- All ISBNs: ➤ 0764516701 - 9781119806899 - 9780470124260 - 9781118362396 - 0470599464 - 1282134531 - 9781118467558 - 1119210259 - 1119506093 - 1119506107 - 1394261780 - 0470124261 - 9781394261772 - 9780470599907 - 9781394261796 - 9780470599914 - 9781118417102 - 9781282134539 - 9780764516702 - 9781119505815 - 9781118463963 - 0470599901 - 9781119210252 - 1118417100 - 1394261799 - 9781119210245 - 9781394261789 - 111836239X - 1118420373 - 1394261772 - 111846396X - 047059991X - 1119210240 - 9781119506102 - 1119806909 - 1119806895 - 9781119506096 - 9781118420379 - 1118467558 - 111950581X - 9780470599464 - 9781119806905 - 9781119806820 - 1119806828
First Setence:
"Some say that the Certified Information System Security Professional (CISSP) candidate requires a breadth of knowledge 50 miles across and 2 inches deep."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CISSP for dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Kali Linux
By Wolf Halton and Bo Weaver

“Kali Linux” Metadata:
- Title: Kali Linux
- Authors: Wolf HaltonBo Weaver
- Language: English
- Number of Pages: Median: 422
- Publisher: ➤ Packt Publishing - Packt Publishing, Limited
- Publish Date: 2016
“Kali Linux” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL39246778M
- All ISBNs: 1782168494 - 9781782168492
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Kali Linux at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Cult of the Dead Cow
By Joseph Menn

“Cult of the Dead Cow” Metadata:
- Title: Cult of the Dead Cow
- Author: Joseph Menn
- Language: English
- Number of Pages: Median: 272
- Publisher: ➤ Hachette - Hachette B and Blackstone Audio - PublicAffairs - Public Affairs
- Publish Date: 2019 - 2020
“Cult of the Dead Cow” Subjects and Themes:
- Subjects: ➤ SOCIAL SCIENCE / Sociology / General - Hacktivism - Hackers - Computer security - Cult of the Dead Cow - Sociology - New York Times reviewed - Cults - Computers
Edition Identifiers:
- The Open Library ID: ➤ OL29470238M - OL39568299M - OL32032280M - OL29801791M - OL27055552M - OL36394285M
- Online Computer Library Center (OCLC) ID: 1056778895
- Library of Congress Control Number (LCCN): 2019935886
- All ISBNs: ➤ 1541762371 - 1549126202 - 1541762363 - 9781549126208 - 9781541762367 - 154176238X - 9781541762381 - 9781541762374 - 9781541724426 - 1541724429
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cult of the Dead Cow at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Penetration Testing: A Hands-On Introduction to Hacking
By Georgia Weidman

“Penetration Testing: A Hands-On Introduction to Hacking” Metadata:
- Title: ➤ Penetration Testing: A Hands-On Introduction to Hacking
- Author: Georgia Weidman
- Number of Pages: Median: 528
- Publisher: No Starch Press
- Publish Date: 2014
“Penetration Testing: A Hands-On Introduction to Hacking” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Kali Linux - Hackers - Computer security - COMPUTERS / Internet / Security - COMPUTERS / Networking / Security - COMPUTERS / Security / General - Penetration testing (computer security) - Computers / internet / security - Computers / networking / security - Computers / security / general
Edition Identifiers:
- The Open Library ID: OL26838292M
- Online Computer Library Center (OCLC) ID: 881503059
- Library of Congress Control Number (LCCN): 2014001066
- All ISBNs: 9781593275648 - 1593275641
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Penetration Testing: A Hands-On Introduction to Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30The Art of Intrusion
By Kevin D. Mitnick and William L. Simon

“The Art of Intrusion” Metadata:
- Title: The Art of Intrusion
- Authors: Kevin D. MitnickWilliam L. Simon
- Language: English
- Number of Pages: Median: 279
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley Pub. - Wiley - John Wiley & Sons, Ltd.
- Publish Date: 2005 - 2009
- Publish Location: New York
“The Art of Intrusion” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer security - Hackers - Hacker - Networking - Computerkriminalität - Security - COMPUTERS - Aspect social - General - Pirates informatiques - Technologie de l'information - Internet - Sécurité informatique - Computersicherheit - Hacking - Computer hackers
Edition Identifiers:
- The Open Library ID: OL39897939M - OL8051417M - OL7621475M - OL24305802M
- Online Computer Library Center (OCLC) ID: 56876941
- Library of Congress Control Number (LCCN): 2004025697
- All ISBNs: ➤ 0470503823 - 0764569597 - 9780470503829 - 9780764589423 - 0471782661 - 0471469947 - 128025257X - 9780471782667 - 9780764569593 - 9781280252570 - 9780471469940 - 0764589423
First Setence:
"There comes a magical gambler's moment when simple thrills magnify to become 3-D fantasies - a moment when greed chews up ethics and the casino system is just another mountain waiting to be conquered."
Author's Alternative Names:
"Kevin David Mitnick", "Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "Kevin MITNICK" and "KD Mitnick"Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Intrusion at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31The basics of hacking and penetration testing
By Pat Engebretson

“The basics of hacking and penetration testing” Metadata:
- Title: ➤ The basics of hacking and penetration testing
- Author: Pat Engebretson
- Language: English
- Number of Pages: Median: 159
- Publisher: Syngress
- Publish Date: 2011
- Publish Location: Waltham, MA
“The basics of hacking and penetration testing” Subjects and Themes:
- Subjects: ➤ Computer hackers - Computer crimes - Computer security - Testing - Prevention - Computer software - Penetration testing (Computer security) - Hackers - Information technology - Management information systems - Professional, career & trade -> computer science -> information technology - Professional, career & trade -> computer science -> management information systems
Edition Identifiers:
- The Open Library ID: OL25066679M
- Online Computer Library Center (OCLC) ID: 731372835 - 761699155
- Library of Congress Control Number (LCCN): 2011018388
- All ISBNs: 9781597496551 - 1597496553
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The basics of hacking and penetration testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Advanced Computing and Systems for Security
By Rituparna Chaki, Agostino Cortesi, Khalid Saeed and Nabendu Chaki

“Advanced Computing and Systems for Security” Metadata:
- Title: ➤ Advanced Computing and Systems for Security
- Authors: Rituparna ChakiAgostino CortesiKhalid SaeedNabendu Chaki
- Language: English
- Number of Pages: Median: 180
- Publisher: ➤ Springer Singapore Pte. Limited - Springer
- Publish Date: ➤ 2015 - 2017 - 2018 - 2019 - 2020 - 2021
“Advanced Computing and Systems for Security” Subjects and Themes:
- Subjects: ➤ Computer security - Machine learning - Computational intelligence - Computer science - Computer networks - Computers, access control
Edition Identifiers:
- The Open Library ID: ➤ OL30722632M - OL37432664M - OL30907486M - OL37270340M - OL28187659M - OL33939272M - OL30902106M - OL30613458M - OL28175090M - OL30682205M - OL28220680M - OL28196807M - OL28139694M - OL33939507M - OL37432890M - OL28243423M - OL28035822M - OL28170335M
- All ISBNs: ➤ 9789811034084 - 9811337012 - 9788132226536 - 9811033900 - 9811389632 - 8132226488 - 9789811389689 - 9811034087 - 8132226534 - 9789811557460 - 9789811337017 - 9811389683 - 9788132226505 - 9811389616 - 9811557489 - 9789811332494 - 9811081794 - 9811332495 - 8132226518 - 9789811642869 - 9789811557484 - 9788132226482 - 9789811529290 - 9789811389634 - 9789811081798 - 9811642931 - 9811081824 - 813222650X - 9811529299 - 9788132226512 - 9789811081828 - 9811642869 - 9811557462 - 9789811033902 - 9789811389610 - 9789811642937
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advanced Computing and Systems for Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33The hacker playbook
By Peter Kim

“The hacker playbook” Metadata:
- Title: The hacker playbook
- Author: Peter Kim
- Language: English
- Number of Pages: Median: 276
- Publisher: Secure Planet, LLC
- Publish Date: 2014
- Publish Location: ➤ North Charleston, South Carolina
“The hacker playbook” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Hackers - Computer networks - Testing - Handbooks, manuals - Computer crimes - Computer programming - Computer security - Security measures - Prevention - Computer software
Edition Identifiers:
- The Open Library ID: OL27162589M
- Online Computer Library Center (OCLC) ID: 879289065
- Library of Congress Control Number (LCCN): 2014900431
- All ISBNs: 9781494932633 - 1494932636
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The hacker playbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Security Engineering
By Ross J. Anderson

“Security Engineering” Metadata:
- Title: Security Engineering
- Author: Ross J. Anderson
- Language: English
- Number of Pages: Median: 1000
- Publisher: ➤ Wiley Technology Pub. - Wiley Publishing - Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2001 - 2008 - 2010 - 2020 - 2021
- Publish Location: ➤ Indianapolis, IN - Indianapolis - New York
“Security Engineering” Subjects and Themes:
- Subjects: ➤ Electronic data processing - Distributed processing - Computer security - Electronic data processing, distributed processing - Verteiltes System - Monitoring - Criptologia - Computabilidade e complexidade - Redes e comunicação de dados - Traitement réparti - Computerbeveiliging - Beveiliging - Computersicherheit - Sécurité informatique - Geheimschrift - Segurança - Mathematics - IT-säkerhet
Edition Identifiers:
- The Open Library ID: ➤ OL39891943M - OL39883567M - OL35836994M - OL29490753M - OL29509472M - OL29509478M - OL24930003M - OL7616327M - OL18632587M - OL18844972M - OL18893289M - OL31957243M - OL29057215M - OL29057030M - OL29057006M - OL9387958M
- Online Computer Library Center (OCLC) ID: 192045774 - 45393984
- Library of Congress Control Number (LCCN): 2008006392 - 00068486
- All ISBNs: ➤ 9780470068526 - 9781118008362 - 1118008375 - 0470068523 - 1119644682 - 1118008383 - 9780470313114 - 1119642787 - 9781119642831 - 1119642833 - 1282822942 - 0471389226 - 9781118008386 - 9781119642817 - 9780471389224 - 1118008367 - 0470313110 - 1119642817 - 9781118008379 - 9781119642787 - 9781119644682 - 9781282822948
First Setence:
"For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters."
"Security engineering is about building systems to remain dependable in the face of malice, error, or mischance."
Author's Alternative Names:
"Ross John Anderson" and "Ross Anderson"Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Data and Goliath
By Bruce Schneier

“Data and Goliath” Metadata:
- Title: Data and Goliath
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 383
- Publisher: ➤ W. W. Norton - W.W. Norton & Company - Recorded Books, Inc. and Blackstone Publishing - Norton & Company, Incorporated, W. W.
- Publish Date: 2015 - 2016
- Publish Location: New York, New York, USA
“Data and Goliath” Subjects and Themes:
- Subjects: ➤ privacy - National Security Agency - signal intelligence - Internet - data surveillance - security - Social control - Electronic surveillance - Big data - Social aspects - Computer security - Right of Privacy - Information technology - Technology, social aspects - Privacy, right of - Data protection - nyt:combined-print-and-e-book-nonfiction=2015-03-22 - New York Times bestseller - Personenbezogene Daten - Datenerfassung - Elektronische Überwachung - Elektronisk övervakning - Sociala aspekter - Informationsteknik - Dataskydd - Personlig integritet - Right of privacy - Computers and IT
- People: Edward Snowdon
- Places: cyberspace
- Time: 2000-2015
Edition Identifiers:
- The Open Library ID: OL33881885M - OL25748235M - OL28578045M
- Online Computer Library Center (OCLC) ID: 904399710
- Library of Congress Control Number (LCCN): 2014048365
- All ISBNs: ➤ 9780393244816 - 9781664442412 - 039335217X - 1664442413 - 9780393352177 - 0393244814
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Data and Goliath at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Practical Malware Analysis
By Michael Sikorski and Andrew Honig

“Practical Malware Analysis” Metadata:
- Title: Practical Malware Analysis
- Authors: Michael SikorskiAndrew Honig
- Language: English
- Number of Pages: Median: 800
- Publisher: No Starch Press
- Publish Date: 2012
- Publish Location: San Francisco
“Practical Malware Analysis” Subjects and Themes:
- Subjects: Computer viruses - Malware (Computer software) - Debugging in computer science - Computer security - Malware (computer software)
Edition Identifiers:
- The Open Library ID: OL25205922M
- Online Computer Library Center (OCLC) ID: 798669681
- Library of Congress Control Number (LCCN): 2012000214
- All ISBNs: 9781593272906 - 1593272901
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Practical Malware Analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Air traffic control
By United States. General Accounting Office
“Air traffic control” Metadata:
- Title: Air traffic control
- Author: ➤ United States. General Accounting Office
- Language: English
- Number of Pages: Median: 34
- Publisher: ➤ The Office - The Office [distributor - U.S. General Accounting Office
- Publish Date: ➤ 1988 - 1989 - 1990 - 1991 - 1992 - 1993 - 1994 - 1995 - 1996 - 1997 - 1998 - 2002
- Publish Location: ➤ Washington, D.C. (P.O. Box 37050, Washington 20013) - Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20877) - Gaithersburg, MD - Washington, D.C - Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20884-6015) - Washington, D.C. (P.O. Box 37050, Washington, DC 20013)
“Air traffic control” Subjects and Themes:
- Subjects: ➤ Air traffic control - United States - United States. Federal Aviation Administration - Procurement - Automation - Costs - Equipment and supplies - Management - Evaluation - Purchasing - Appropriations and expenditures - Electronic equipment - Capital investments - Computer programs - Data processing - Commercial Aeronautics - Technological innovations - Radar air traffic control systems - Air traffic controllers - Airplanes - Collision avoidance - Safety measures - National Airspace System Plan (U.S.) - Training of - Government policy - Finance - Security measures - Computer security - Officials and employees - Rules and practice - Personnel management - Turnover - Aeronautics - Salaries
- Places: ➤ United States - California - Los Angeles Region - Connecticut - New York Metropolitan Area - New Jersey - Government policy
Edition Identifiers:
- The Open Library ID: ➤ OL14538003M - OL776056M - OL14538015M - OL14695240M - OL3628427M - OL14540926M - OL3731510M - OL14540832M - OL443131M - OL14538010M - OL17700865M - OL14542457M - OL14540949M - OL17837951M - OL1224808M - OL17687466M - OL731949M - OL17816378M - OL897408M - OL16946045M - OL15361755M - OL497913M - OL14542453M - OL731969M - OL17659980M - OL17660642M - OL17687575M - OL15361658M - OL14538004M - OL1455069M - OL14689274M - OL15289939M - OL17679106M - OL17816181M - OL17696190M
- Online Computer Library Center (OCLC) ID: ➤ 20086434 - 22460443 - 27369707 - 42734441 - 51024171 - 26869727 - 40742836 - 36332081 - 22483046 - 38733415 - 30265894 - 36267809 - 43016888 - 40774479 - 32718591 - 22460384 - 37295707 - 20086476 - 22141968
- Library of Congress Control Number (LCCN): ➤ 2002418242 - 97121559 - 97121537 - 97176821 - 94224936 - 93109270 - 98232537 - 98155320 - 95188953 - 2003387390
Author's Alternative Names:
"U.S. General Accounting Office.", "United States General Accounting Office.", "United States. General of Accounting Office.", "General Accounting Office (U.S.)", "U S. General Accounting Office", "U.S. General Accounting Office", "General Accounting Office.", "General Accountability Office (U.S.)", "United States. General Accounting Office.", "United States General Accounting Office " and "United States. General Accounting OFfice.",Access and General Info:
- First Year Published: 1988
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Air traffic control at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Introduction to computer security
By Michael T. Goodrich

“Introduction to computer security” Metadata:
- Title: ➤ Introduction to computer security
- Author: Michael T. Goodrich
- Language: English
- Number of Pages: Median: 556
- Publisher: ➤ Addison-Wesley - Addison Wesley
- Publish Date: 2011
- Publish Location: Boston
“Introduction to computer security” Subjects and Themes:
- Subjects: Computer security
Edition Identifiers:
- The Open Library ID: OL24422662M
- Library of Congress Control Number (LCCN): 2010028536
- All ISBNs: 9780321512949 - 0321512944
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Cryptography and Network Security
By William Stallings

“Cryptography and Network Security” Metadata:
- Title: ➤ Cryptography and Network Security
- Author: William Stallings
- Languages: English - por
- Number of Pages: Median: 748
- Publisher: ➤ Pearson Education, Limited - Pearson Education do Brasil
- Publish Date: ➤ 2002 - 2005 - 2010 - 2011 - 2015 - 2016 - 2018
- Publish Location: São Paulo, Brazil
“Cryptography and Network Security” Subjects and Themes:
- Subjects: ➤ Computer networks - Data encryption (computer science) - Coding theory - Computer security - Computer networks, security measures - Literary collections
Edition Identifiers:
- The Open Library ID: ➤ OL50527406M - OL29410914M - OL29409486M - OL29403690M - OL29210176M - OL29041401M - OL29013434M - OL28956401M
- All ISBNs: ➤ 0134484525 - 9781282693098 - 9780137056323 - 9780135307496 - 013530749X - 1282693093 - 9780132023221 - 9780131115026 - 013705632X - 0132023229 - 0134444663 - 8543014506 - 9788543014500 - 0131115022 - 9780134484525 - 9780134444666
First Setence:
"Nos quatro anos desde que a quinta edição deste livro foi publicada, o campo tem visto inovações e melhorias contínuas."
Author's Alternative Names:
"Stallings, William; William Walter Stallings" and "W. Stallings"Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cryptography and Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Security in computing
By Charles P. Pfleeger, Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Margulies

“Security in computing” Metadata:
- Title: Security in computing
- Authors: Charles P. PfleegerCharles P. PfleegerShari Lawrence PfleegerJonathan Margulies
- Language: English
- Number of Pages: Median: 746
- Publisher: ➤ Prentice-Hall International - Prentice Hall PTR - Pearson Education, Limited - Prentice Hall
- Publish Date: ➤ 1989 - 1996 - 2002 - 2003 - 2006 - 2015
- Publish Location: ➤ [London] - Upper Saddle River, N.J - London - Upper Saddle River, NJ
“Security in computing” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Right of Privacy - Rechnernetz - Datensicherung - Computerbeveiliging - Computers - Access control - Firewalls (Computer security) - Operating systems (Computers) - Linux - Privacy, Right of
Edition Identifiers:
- The Open Library ID: ➤ OL35566361M - OL9294548M - OL7339893M - OL25651390M - OL28953547M - OL9286053M - OL7331405M - OL16578902M - OL22148780M
- Online Computer Library Center (OCLC) ID: 50676236 - 71004261
- Library of Congress Control Number (LCCN): 2014043643 - 2006026798 - 2002034368 - 2014038579
- All ISBNs: ➤ 0137990162 - 9780132390774 - 9780130355485 - 0131857940 - 9780134085043 - 0134085051 - 0132390779 - 9780134085050 - 9780137990160 - 0134085043 - 0130355488 - 9780131857940
Author's Alternative Names:
"Shari Pfleeger"Access and General Info:
- First Year Published: 1989
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Ghost in the Wires
By Kevin D. Mitnick

“Ghost in the Wires” Metadata:
- Title: Ghost in the Wires
- Author: Kevin D. Mitnick
- Language: English
- Publisher: Back Bay Books
- Publish Date: 2012
“Ghost in the Wires” Subjects and Themes:
- Subjects: Hackers - Computer crimes - Computer security - Information superhighway - New York Times reviewed
Edition Identifiers:
- The Open Library ID: OL26055307M
- All ISBNs: 0316037729 - 9780316037723
Author's Alternative Names:
"Kevin David Mitnick", "Kevin MITNICK", "Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick" and "KD Mitnick"Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Ghost in the Wires at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Basics of Hacking and Penetration Testing
By Patrick Engebretson

“Basics of Hacking and Penetration Testing” Metadata:
- Title: ➤ Basics of Hacking and Penetration Testing
- Author: Patrick Engebretson
- Language: English
- Number of Pages: Median: 225
- Publisher: ➤ Elsevier Science & Technology Books
- Publish Date: 2011 - 2013
“Basics of Hacking and Penetration Testing” Subjects and Themes:
- Subjects: ➤ Computer security - Hackers - Computer software - Computer crimes - Penetration testing (Computer security) - Testing - Prevention - Information technology - Professional, career & trade -> computer science -> information technology - Computer hackers
Edition Identifiers:
- The Open Library ID: OL35770083M - OL34606571M - OL28509953M
- Online Computer Library Center (OCLC) ID: 857791812
- Library of Congress Control Number (LCCN): 2013017241
- All ISBNs: ➤ 1597496561 - 0124116418 - 9780124116412 - 9780124116443 - 9781597496568 - 0124116442
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Basics of Hacking and Penetration Testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Crypto
By Steven Levy

“Crypto” Metadata:
- Title: Crypto
- Author: Steven Levy
- Language: English
- Number of Pages: Median: 356
- Publisher: ➤ Penguin (Non-Classics) - Viking - Diane Pub Co
- Publish Date: 2001 - 2002 - 2003 - 2004
- Publish Location: New York
“Crypto” Subjects and Themes:
- Subjects: ➤ Geheimschrift - Computer security - Cryptography - Databescherming - Computerbeveiliging - Computercriminaliteit - Cryptographie
Edition Identifiers:
- The Open Library ID: OL7643220M - OL7996166M - OL7995954M - OL24745751M - OL7351092M
- Online Computer Library Center (OCLC) ID: 44818667 - 149222824 - 228062607
- Library of Congress Control Number (LCCN): 00043809
- All ISBNs: ➤ 0756757746 - 0140244328 - 9780140244328 - 0670859508 - 9780756757748 - 9780670859504 - 0756777887 - 9780756777883
First Setence:
"Mary Fisher loathed Whitfield Diffie on sight."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Crypto at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Secrets and Lies
Digital Security in a Networked World
By Bruce Schneier

“Secrets and Lies” Metadata:
- Title: Secrets and Lies
- Author: Bruce Schneier
- Languages: English - ger
- Number of Pages: Median: 440
- Publisher: ➤ Wiley-VCH - John Wiley & Sons, Inc. - Dpunkt.Verlag GmbH - Wiley-VCH Verlag GmbH - John Wiley & Sons - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2000 - 2001 - 2004 - 2011 - 2013 - 2015
“Secrets and Lies” Subjects and Themes:
- Subjects: Computer networks - Security measures - Computer security - Computer networks, security measures - Computer science
Edition Identifiers:
- The Open Library ID: ➤ OL26773330M - OL29064027M - OL29074280M - OL29074286M - OL7617491M - OL9052995M - OL9546996M - OL7614129M - OL27183187M
- Online Computer Library Center (OCLC) ID: 1001838451 - 906119939
- Library of Congress Control Number (LCCN): 2015932613
- All ISBNs: ➤ 9783898643023 - 3898643026 - 9781118082546 - 9781118075074 - 3527501282 - 9781119092438 - 1118082540 - 9780471253112 - 0471253111 - 1118082273 - 1118075072 - 3527500219 - 9780471453802 - 1119092434 - 9783527500215 - 0471453803 - 9783527501281 - 9781118082270
First Setence:
"Rereading a book that I finished fifteen years ago —in 2000— perhaps the most surprising thing is how little things have changed."
"The world is a dangerous place."
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secrets and Lies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Ethical Hacking and Penetration Testing Guide
By Rafay Baloch

“Ethical Hacking and Penetration Testing Guide” Metadata:
- Title: ➤ Ethical Hacking and Penetration Testing Guide
- Author: Rafay Baloch
- Language: English
- Number of Pages: Median: 531
- Publisher: ➤ CRC Press, Taylor & Francis Group - Routledge - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2014 - 2017
“Ethical Hacking and Penetration Testing Guide” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - COMPUTERS / Security / General - COMPUTERS / Networking / General - LAW / Forensic Science - Computer security - Computer networks - Security measures - Tests d'intrusion - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Security - General - Networking - LAW - Forensic Science - Penetration testing (computer security) - Computers / security / general - Computers / networking / general - Law / forensic science
Edition Identifiers:
- The Open Library ID: ➤ OL26838148M - OL37959692M - OL37980186M - OL37984263M - OL37971507M - OL33574903M - OL33517337M
- Online Computer Library Center (OCLC) ID: 868641489 - 1011595255
- Library of Congress Control Number (LCCN): 2014006695
- All ISBNs: ➤ 1351381334 - 9781315145891 - 1138436828 - 1322638594 - 9781351381345 - 1351381342 - 9781138436824 - 9781351381338 - 148223162X - 9781482231618 - 9781322638591 - 9781482231625 - 1315145898 - 1482231611
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Ethical Hacking and Penetration Testing Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Cryptography and network security
By William Stallings

“Cryptography and network security” Metadata:
- Title: ➤ Cryptography and network security
- Author: William Stallings
- Language: English
- Number of Pages: Median: 724
- Publisher: ➤ Pearson Education - Pearson - William Stallings - Dorling Kindersley - Pearson Prentice Hall
- Publish Date: 2006 - 2016
- Publish Location: Delhi
“Cryptography and network security” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Data encryption (Computer science) - Computer security - Coding theory - Computer networks, security measures - Data encryption (computer science)
Edition Identifiers:
- The Open Library ID: OL53201397M - OL28219449M - OL26639170M
- Online Computer Library Center (OCLC) ID: 933863805 - 607874481
- Library of Congress Control Number (LCCN): 2015051130
- All ISBNs: 9780134444284 - 0134444280 - 9788177587746 - 8177587749
Author's Alternative Names:
"Stallings, William; William Walter Stallings" and "W. Stallings"Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cryptography and network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47The Mobile Application Hacker's Handbook
By Dominic Chell

“The Mobile Application Hacker's Handbook” Metadata:
- Title: ➤ The Mobile Application Hacker's Handbook
- Author: Dominic Chell
- Language: English
- Number of Pages: Median: 816
- Publisher: ➤ John Wiley & Sons - Wiley - Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2015
“The Mobile Application Hacker's Handbook” Subjects and Themes:
- Subjects: ➤ Smartphones - BlackBerry (Smartphone) - Windows phone (Computer file) - IPhone (Smartphone) - Hacking - Security measures - Mobile apps - Android (Electronic resource) - Application software - Mobile computing - Computer security - Hackers
Edition Identifiers:
- The Open Library ID: OL39931804M - OL29283915M - OL29270744M - OL26837639M
- Online Computer Library Center (OCLC) ID: 885229394
- All ISBNs: ➤ 1119183650 - 1118958527 - 9781119183655 - 1118958519 - 9781118958520 - 1118958500 - 9781118958506 - 9781118958513
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Mobile Application Hacker's Handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Information Security
By Mark Stamp

“Information Security” Metadata:
- Title: Information Security
- Author: Mark Stamp
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons Canada, Limited, John - John Wiley & Sons, Ltd. - Wiley-Interscience - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2005 - 2006 - 2007 - 2011 - 2021 - 2022
- Publish Location: Hoboken, N.J - New York
“Information Security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer security - Nonfiction - Electronic data processing departments, security measures - Sécurité informatique - Ordinateurs - Accès - Contrôle - Logiciels - Protection - Protocoles de réseaux d'ordinateurs - Sécurité - Mesures - Cryptographie - Databescherming - Informatiesystemen - Computersicherheit - Datensicherung - Kommunikationsprotokoll - Kryptologie - Malware - Zugriffskontrolle - Data protection - Computer Security - Qa76.9.a25 s69 2006 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL48712508M - OL48647918M - OL39897508M - OL34977085M - OL33919263M - OL33919251M - OL33642192M - OL29229520M - OL29065438M - OL29065437M - OL9527643M - OL7620834M - OL24253402M - OL15978508M
- Online Computer Library Center (OCLC) ID: 57754240 - 85820655
- Library of Congress Control Number (LCCN): 2005005152
- All ISBNs: ➤ 1119505879 - 1119505887 - 1118027965 - 9781119505891 - 1283138875 - 1119505895 - 9780471744184 - 0470242442 - 9781283138871 - 9781280241444 - 0471744190 - 9780470242445 - 0471738484 - 1118027957 - 1280241446 - 1118027973 - 9781119505907 - 9781118027967 - 9780471738480 - 9781118027974 - 1119505909 - 0471744182 - 9781118027950 - 9781119505884 - 9781119505877 - 9780471744191
First Setence:
"The basic terminology of crypto includes the following."
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Reversing
By Eldad Eilam

“Reversing” Metadata:
- Title: Reversing
- Author: Eldad Eilam
- Language: English
- Number of Pages: Median: 624
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley Publishung, Inc. - Wiley - John Wiley & Sons, Ltd.
- Publish Date: 2005 - 2008 - 2011
- Publish Location: Indianapolis, IN - New York
“Reversing” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer security - Nonfiction - Reverse engineering - Software engineering - Computer engineering
Edition Identifiers:
- The Open Library ID: ➤ OL39904753M - OL29114337M - OL29103881M - OL3480018M - OL24269796M - OL24327735M
- Online Computer Library Center (OCLC) ID: 60359199 - 635506374
- Library of Congress Control Number (LCCN): 2005921595
- All ISBNs: ➤ 1118079760 - 9780764574818 - 9781280255816 - 9780470326763 - 076459768X - 9780764597688 - 0764574817 - 047032676X - 1280255811 - 9781118079768
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Reversing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Applied Cryptography
By Bruce Schneier

“Applied Cryptography” Metadata:
- Title: Applied Cryptography
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 784
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 1994 - 1995 - 1996 - 2011 - 2015 - 2017
- Publish Location: ➤ Protocols, Algorithms, and Source Code in C - New York
“Applied Cryptography” Subjects and Themes:
- Subjects: ➤ Security measures - Telecommunication - Computer security - Cryptography - C (Computer program language) - COMPUTERS - Security - General - Cryptographie - C (Langage de programmation) - Telecommunication--security measures - Qa76.9.a25 s35 1996 - 005.8/2 - Long Now Manual for Civilization
Edition Identifiers:
- The Open Library ID: ➤ OL33391939M - OL31906079M - OL28565887M - OL29353353M - OL7612292M - OL1394854M - OL780542M - OL7612169M
- Online Computer Library Center (OCLC) ID: 914287736 - 28182240 - 32311687 - 906120521
- Library of Congress Control Number (LCCN): 95012398 - 93002139
- All ISBNs: ➤ 111808196X - 9780471117094 - 9781118081969 - 9781119439028 - 9780471597568 - 9780471128458 - 0471117099 - 1119096723 - 1119439027 - 0471597562 - 0471128457 - 9781119096726
First Setence:
"Suppose a sender wants to send a message to a receiver."
Access and General Info:
- First Year Published: 1994
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Downloads:
- Number of Results: 3
- 1: Applied_Cryptography_2nd_ed._B._Schneier
- 2: appliedcryptogra0000schn
- 3: appliedcryptogra00schn_714
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Applied Cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.