1. Mobile malware attacks and defense. (©2009) Other Names: Dunham, Ken; Abu-Nimeh, Saeed Record Type: Book Extent: 1 online resource (xxv, 409 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Cyber crime and warfare : all that matters /: all that matters. (2013) Authors: Warren, Peter, 1960-; Streeter, Michael, 1957- Record Type: Book Extent: 1 online resource, illustrations (black and white, and colour) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Dissecting the hack : the V3rb0t3n network /: the V3rb0t3n network. (2015) Authors: Street, Jayson E; Sims, Kristin; Baskin, Brian Record Type: Book Extent: 1 online resource (xxi, 283 pages), illustrations (colour) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. We are Anonymous : inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency /: inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. (2013) Authors: Olson, Parmy Record Type: Book Extent: 1 online resource (528 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Stealing the network : how to own an identity /: how to own an identity. (©2005) Other Names: Alder, Raven; Mullen, Timothy M; Long, Johnny Record Type: Book Extent: 1 online resource (xxiv, 333 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗