search for books and compare prices
hackers matches 61 work(s)
< previous 25 | displaying 26 to 50 | next 11 >
Jump to start at |
Cover for 9781597494786 Cover for 9781597495684 Cover for 9780137008773 Cover for 9780470052358 Cover for 9780764557842 Cover for 9781420086935 Cover for 9780321498816 Cover for 9781404213524 Cover for 9780071495684 Cover for 9780071742559 Cover for 9780071832380 Cover for 9780072257090 Cover for 9780120713509 Cover for 9780763735364 Cover for 9780764597886 Cover for 9781598630626 Cover for 9781931841726 Cover for 9780764597589 Cover for 9780764596506 Cover for 9780764569593 Cover for 9780471782667 Cover for 9780674015432 Cover for 9781584503149 Cover for 9780201786958 Cover for 9780849308888 Cover for 9780203490044 Cover for 9781593270292 Cover for 9780816633456 Cover for 9780816633463 Cover for 9780471211655 Cover for 9780471456773 Cover for 9780471229469 Cover for 9780471463054 Cover for 9781567204605 Cover for 9780321108951 Cover for 9780471232827 Cover for 9780471237129 Cover for 9780764542800 Cover for 9780471432289
cover image for 9781597495684

Paperback:

9781597495684 | Revised edition (Syngress Media Inc, July 1, 2010), cover price $29.95
9781597494786 | Syngress Media Inc, September 17, 2009, cover price $29.95

cover image for 9780137008773

Paperback:

9780137008773, titled "Digital Crime and Digital Terrorism" | 2 edition (Prentice Hall, March 8, 2010), cover price $113.20

cover image for 9780470052358
A guide to computer hacking covers such topics as hacking methodology, social engineering, computer security, passwords, war dialing, wireless LANs, and messaging systems.

Paperback:

9780470052358 | 2 edition (For Dummies, October 30, 2006), cover price $24.99 | About this edition: A guide to computer hacking covers such topics as hacking methodology, social engineering, computer security, passwords, war dialing, wireless LANs, and messaging systems.
9780764557842 | For Dummies, April 1, 2004, cover price $24.99 | About this edition: A guide to computer hacking covers such topics as hacking methodology, social engineering, computer security, passwords, war dialing, wireless LANs, and messaging systems.

cover image for 9781420086935
Product Description: Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art...read more

Paperback:

9781420086935 | Auerbach Pub, December 1, 2008, cover price $62.95 | About this edition: Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy.

cover image for 9780321498816

Paperback:

9780321498816 | 1 edition (Pearson P T R, March 6, 2009), cover price $59.99

cover image for 9781404213524

Library:

9781404213524 | Rosen Central, January 30, 2008, cover price $30.25

cover image for 9780071832380

Paperback:

9780071832380 | 4th edition (McGraw-Hill Osborne Media, January 5, 2015), cover price $60.00
9780071742559, titled "Gray Hat Hacking the Ethical Hackers Handbook" | 3 edition (McGraw-Hill Osborne Media, January 6, 2011), cover price $60.00
9780071495684 | 2 edition (Osborne McGraw-Hill, December 20, 2007), cover price $49.99
9780072257090 | Osborne McGraw-Hill, November 16, 2004, cover price $49.99

cover image for 9780763735364

Hardcover:

9780120713509, titled "Population Dynamics of Rabies in Wildlife" | Academic Pr, January 1, 1986, cover price $110.00 | also contains Population Dynamics of Rabies in Wildlife

Paperback:

9780763735364 | 1 edition (Jones & Bartlett Pub, October 15, 2006), cover price $128.95

cover image for 9780764597886
Product Description: This is absolutely the ultimate guide to hacking Adobe’s wildly popular graphics software, written by an Adobe Certified professional photographer and designer. This is serious, down and dirty, tweaking – blowing away the default settings, customizing appearance, optimizing performance, customizing tools and offering readers total control over Photoshop like never before...read more

Paperback:

9780764597886 | John Wiley & Sons Inc, October 30, 2005, cover price $29.99 | About this edition: This is absolutely the ultimate guide to hacking Adobe’s wildly popular graphics software, written by an Adobe Certified professional photographer and designer.

cover image for 9781598630626
Product Description: Learn how to use good hacking to prevent your system from becoming the victim of attacks! "The Unofficial Guide to Ethical Hacking, Second Edition" defines the difference between hackers - those who crack a computer system for the sheer challenge of doing so - and crackers - an elusive class of computer criminals who break into systems, release viruses, and deface Web sites...read more

Paperback:

9781598630626, titled "The Unofficial Guide to Ethical Hacking" | 2 edition (Course Technology Ptr, September 15, 2005), cover price $49.99 | About this edition: Learn how to use good hacking to prevent your system from becoming the victim of attacks!
9781931841726 | Course Technology Ptr, February 1, 2002, cover price $49.99 | About this edition: Explains the difference between hackers and crackers, explores the benefits that hackers provide by notifying system administrators of flaws in the system, and discusses how to better protect a system.

cover image for 9780764597589

Paperback:

9780764597589 | John Wiley & Sons Inc, August 16, 2005, cover price $24.99

cover image for 9780471782667
The former hacker turned 'good guy' corporate computer security consultant presents a series of true stories about computer breaches while discussing the measures that might have been taken to prevent them.

Hardcover:

9780764569593, titled "The Art Of Intrusion: The Real Stories Behind The Exploits Of Hackers, Intruders, & Deceivers" | John Wiley & Sons Inc, March 4, 2005, cover price $45.00 | About this edition: The former hacker turned 'good guy' corporate computer security consultant presents a series of true stories about computer breaches while discussing the measures that might have been taken to prevent them.

Paperback:

9780471782667 | John Wiley & Sons Inc, December 27, 2005, cover price $16.95

Miscellaneous:

9780764589423, titled "The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers" | John Wiley & Sons Inc, February 9, 2005, cover price $16.95

cover image for 9780674015432
Explains how the demands of companies for protection of their patents and copyrights and the culture of file sharing has given rise to a class conflict in which creators of the information are lined up against a possessing class who monopolize what the hackers produce.

Hardcover:

9780674015432 | Harvard Univ Pr, October 4, 2004, cover price $21.95 | About this edition: Explains how the demands of companies for protection of their patents and copyrights and the culture of file sharing has given rise to a class conflict in which creators of the information are lined up against a possessing class who monopolize what the hackers produce.

cover image for 9781584503149
Offering a hands-on approach to learning essential security skills and techniques, this useful handbook covers such key issues as firewalls, DMZ and NAT architecture, encryption, authentication, Web hacking, operating system vulnerabilities, and hacking techniques and software, with a companion CD containing a custom security scanner, sample code, and more. Original. (Advanced)

Paperback:

9781584503149 | Pap/cdr edition (Charles River Media, May 1, 2004), cover price $54.95 | About this edition: Offering a hands-on approach to learning essential security skills and techniques, this useful handbook covers such key issues as firewalls, DMZ and NAT architecture, encryption, authentication, Web hacking, operating system vulnerabilities, and hacking techniques and software, with a companion CD containing a custom security scanner, sample code, and more.

cover image for 9780201786958
A guide to secure software covers such topics as rootkits, buffer overflows, reverse engineering tools, and locating bugs.

Paperback:

9780201786958 | Pearson P T R, February 1, 2004, cover price $64.99 | About this edition: A guide to secure software covers such topics as rootkits, buffer overflows, reverse engineering tools, and locating bugs.

cover image for 9780203490044
The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts.  Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a “path” to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Hardcover:

9780849308888 | Auerbach Pub, November 1, 2003, cover price $125.95 | About this edition: The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators.

Miscellaneous:

9780203490044 | Auerbach Pub, November 24, 2003, cover price $94.95

cover image for 9781593270292
A provocative guide that explains how to transform the Microsoft game console into a PC provides step-by-step instructions on basic hacking techniques and reverse engineering skills along with information on Xbox security, hardware, and software. Original. (Intermediate) (view table of contents)

Paperback:

9781593270292 | No Starch Pr, July 1, 2003, cover price $24.99 | About this edition: Provides step-by-step instructions on basic hacking techniques and reverse engineering skills along with information on Xbox security, hardware, and software.

cover image for 9780816633463
The author of Cybercrime: Law Enforcement, Security, and Surveillance in the Information Age serves up a challenging new study of 'hacker' subculture, revealing its role in shaping the Internet and the values of the new 'digital age.'

Hardcover:

9780816633456 | Univ of Minnesota Pr, March 1, 2002, cover price $59.95 | About this edition: The author of Cybercrime: Law Enforcement, Security, and Surveillance in the Information Age serves up a challenging new study of 'hacker' subculture, revealing its role in shaping the Internet and the values of the new 'digital age.

Paperback:

9780816633463 | Univ of Minnesota Pr, June 1, 2003, cover price $22.50

cover image for 9780471456773
Product Description: Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management techniques to intelligently assess and manage the network security risks facing your organization Presents the material in a witty and lively style, backed up by solid business planning methods Companion Web site provides all worksheets and the security planning template...read more (view table of contents, read Amazon.com's description)

Paperback:

9780471211655 | John Wiley & Sons Inc, January 1, 2003, cover price $55.00 | About this edition: Offers customized security improvement plan templates, accompanying worksheets, and risk management techniques,

Miscellaneous:

9780471456773 | John Wiley & Sons Inc, February 13, 2003, cover price $40.00 | About this edition: Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management techniques to intelligently assess and manage the network security risks facing your organization Presents the material in a witty and lively style, backed up by solid business planning methods Companion Web site provides all worksheets and the security planning template

cover image for 9780471463054
Describes how to install and configure a security analysis and monitoring system using both Windows and UNIX. (view table of contents)

Paperback:

9780471229469 | Pap/cdr edition (John Wiley & Sons Inc, February 1, 2003), cover price $50.00 | About this edition: Describes how to install and configure a security analysis and monitoring system using both Windows and UNIX.

Miscellaneous:

9780471463054 | John Wiley & Sons Inc, February 5, 2003, cover price $50.00

cover image for 9781567204605
Product Description: Hackers get a bad rap. Businesses, industries, and even society as a whole covet their skills, yet they are often misunderstood and frequently despised. Is their vilification justified? This is the first book to use previously validated psychological inventories to explore and profile the personalities and behavioral traits of more than 200 self-admitted hackers...read more (view table of contents, read Amazon.com's description)

Hardcover:

9781567204605 | Praeger Pub Text, November 30, 2002, cover price $84.00 | About this edition: Hackers get a bad rap.

cover image for 9780321108951
Provides instructions for using honeypots to impede, trap, or monitor online attackers, and discusses how honeypots can be used, the roles they can play, and legal issues surrounding their use. (view table of contents)

Paperback:

9780321108951 | Pap/cdr edition (Addison-Wesley Professional, September 1, 2002), cover price $44.99 | About this edition: Provides instructions for using honeypots to impede, trap, or monitor online attackers, and discusses how honeypots can be used, the roles they can play, and legal issues surrounding their use.

cover image for 9780764542800
A former computer hacker who turned his life around reveals how he now works as a computer security expert, protecting corporations from other hackers.

Hardcover:

9780471237129 | John Wiley & Sons Inc, October 11, 2002, cover price $45.00 | About this edition: A former computer hacker who turned his life around reveals how he now works as a computer security expert, protecting corporations from other hackers.

Paperback:

9780764542800 | John Wiley & Sons Inc, October 17, 2003, cover price $16.95 | About this edition: A former computer hacker who turned his life around reveals how he now works as a computer security expert, protecting corporations from other hackers.

Miscellaneous:

9780471432289 | John Wiley & Sons Inc, October 2, 2001, cover price $16.95 | About this edition: A former computer hacker who turned his life around reveals how he now works as a computer security expert, protecting corporations from other hackers.

< previous 25 | displaying 26 to 50 | next 11 >