Limit search to available items
Save marked records Save all on page
SUBJECTS (1-16 of 16)
Hackers
1
Mark
  The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963-
Indianapolis : Wiley, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 MIT  4 WEEK LOAN  AVAILABLE
2
Mark
  The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963-
Indianapolis, Ind. : Wiley, c2002. -Access this resource online
c2002
EBOOKS
3
Mark
  Firebrand waves of digital activism 1994-2014 : the rise and spread of hacktivism and cyberconflict
Karatzogianni, Athina.
Houndmills, Basingstoke Hampshire ; New York, NY : Palgrave Macmillan, 2015.  
2015
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  HM 851 K1  8 WEEK LOAN  AVAILABLE
4
Mark
  Gray hat hacking : the ethical hacker's handbook

New York ; London : McGraw-Hill, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 G7  4 WEEK LOAN  AVAILABLE
5
Mark
  Hack attacks revealed : a complete reference with custom security hacking toolkit.
Chirillo, John, 1970-
New York ; Chichester : Wiley, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 CHI  4 WEEK LOAN  AVAILABLE
6
Mark
  Hacker culture
Thomas, Douglas, 1966-
Minneapolis, Minn. : University of Minnesota Press, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  306.1 THO  4 WEEK LOAN  AVAILABLE
7
Mark
  The hacker ethic and the spirit of the information age.
Himanen, Pekka.
London : Secker & Warburg, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  174.9 HIM  4 WEEK LOAN  AVAILABLE
8
Mark
  The hacker ethic, and the spirit of the information age.
Himanen, Pekka.
New York : Random House, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 M65 H6  8 WEEK LOAN  AVAILABLE
9
Mark
  A hacker manifesto
Wark, McKenzie, 1961-
Cambridge, Mass. : Harvard University Press, 2004.  
2004
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Leisure reading - mezzanine floor  303.4833 WAR  4 WEEK LOAN  AVAILABLE
10
Mark
  Hackers
Levy, Steven.
Farnham : O'Reilly, c2010.  
c2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  364.168 LEV  4 WEEK LOAN  AVAILABLE
11
Mark
  Hacking : digital media and technological determinism
Jordan, Tim, 1959-
Cambridge : Polity Press, 2008.  
2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 C66 J8  8 WEEK LOAN  AVAILABLE
12
Mark
  Hacking : the art of exploitation
Erickson, Jon, 1977-
San Francisco, Calif. : No Starch, 2007.  
2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 E6  4 WEEK LOAN  AVAILABLE
13
Mark
  Inside the enemy's computer identifying cyber-attackers
Guitton, Clement.
London : Hurst & Company, 2017. -Access this resource online
2017
EBOOKS
14
Mark
  Insider threat : protecting the enterprise from sabotage, spying, and theft
Cole, Eric.
Rockland, Mass. : Syngress, 2006.  
2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 C6  8 WEEK LOAN  AVAILABLE
15
Mark
  Internet security : hacking, counterhacking, and society

Sudbury, Mass. ; London : Jones and Bartlett, c2007.  
c2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.875 I57 I6  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  TK 5105.875 I57 I6  8 WEEK LOAN  AVAILABLE
16
Mark
  Underground
Dreyfus, Suelette.
Edinburgh : Canongate, 2012.  
2012
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  364.168 DRE  4 WEEK LOAN  AVAILABLE
Save marked records Save all on page
Locate in results