Cyberpunk outlaws hackers on the computer frontier
| Main Authors: | Hafner, Katie (Author), Markoff, John (Author) |
|---|---|
| Format: | Book |
| Published: |
New York
Touchstone Book
c1991
|
| Subjects: |
Similar Items
Computer forensics and cyber crime an introduction
by: Britz, Marjie
Published: (2009)
by: Britz, Marjie
Published: (2009)
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
by: Nelson, Bill, et al.
The best of 2600 A hacker odyssey
by: Goldstein, Emmanuel 1959-
Published: (2008)
by: Goldstein, Emmanuel 1959-
Published: (2008)
Computer forensies : jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
Computer forensics jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2010)
by: Nelson, Bill, et al.
Published: (2010)
Hacking exposed computer forensics
by: Philipp, Aaron, et al.
Published: (2010)
by: Philipp, Aaron, et al.
Published: (2010)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Collaborative computer security and trust management
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Scene of the cybercrime
by: Cross, Michael
Published: (2008)
by: Cross, Michael
Published: (2008)
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
Profiling hackers the science of criminal profiling as applied to the world of hacking
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Network security a hacker's perspective
by: Fadia, Ankit 1985-
Published: (2006)
by: Fadia, Ankit 1985-
Published: (2006)
Kesedaran keselamatan siber 101 penganalisaan ancaman siber
by: Madihah Mohd Saudi
Published: (2015)
by: Madihah Mohd Saudi
Published: (2015)
Protect your home PC hackers, viruses and privancy
Published: (2002)
Published: (2002)
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
Malware forensics investigating and analyzing malicious code
by: Aquilina, James M., et al.
Published: (2008)
by: Aquilina, James M., et al.
Published: (2008)
Gray hat hacking the ethical hacker's handbook
by: Harper, Allen
Published: (2011)
by: Harper, Allen
Published: (2011)
Network security a hacker's perspective
by: Fadia, Ankit 1985-
Published: (2017)
by: Fadia, Ankit 1985-
Published: (2017)
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013)
by: Johnson, Mark 1959-
Published: (2013)
Risky business protect your business from being stalked, conned, or blackmailed on the Web
by: Janal, Daniel S.
Published: (1998)
by: Janal, Daniel S.
Published: (1998)
Cyber security culture counteracting cyber threats through organizational learning and training
by: Trim, Peter R. J., et al.
Published: (2013)
by: Trim, Peter R. J., et al.
Published: (2013)
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Computer security
by: Gollmann, Dieter
by: Gollmann, Dieter
IT security metrics a practical framework for measuring security & protecting data
by: Hayden, Lance
Published: (2010)
by: Hayden, Lance
Published: (2010)
Introduction to computer security
by: Bishop, Matt
Published: (2005)
by: Bishop, Matt
Published: (2005)
Computer insecurity risking the system
by: Furnell, Steven
Published: (2005)
by: Furnell, Steven
Published: (2005)
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)
by: Wong, Caroline
Published: (2012)
Computer and cyber security principles, algorithm, applications, and perspectives
Principles of computer security security+TM and beyond
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri, et al.
Published: (2012)
by: Davidoff, Sherri, et al.
Published: (2012)
Fundamentals of network security
by: Canavan, John E.
Published: (2001)
by: Canavan, John E.
Published: (2001)
CSA guide to cloud computing implementing cloud privacy and security
by: Samani, Raj, et al.
Published: (2015)
by: Samani, Raj, et al.
Published: (2015)
Computers, ethics & social values
by: Johnson, Deborah G. 1945-, et al.
Published: (1995)
by: Johnson, Deborah G. 1945-, et al.
Published: (1995)
Trust and security in collaborative computing
by: Zou, Xukai 1963-, et al.
Published: (2008)
by: Zou, Xukai 1963-, et al.
Published: (2008)
Computer misuse response, regulation and the law
by: Fafinski, Stefan
Published: (2009)
by: Fafinski, Stefan
Published: (2009)
Similar Items
-
Computer forensics and cyber crime an introduction
by: Britz, Marjie
Published: (2009) -
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008) -
Guide to computer forensics and investigations
by: Nelson, Bill, et al. -
The best of 2600 A hacker odyssey
by: Goldstein, Emmanuel 1959-
Published: (2008) -
Computer forensies : jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)