1. Blackout. (2015) Authors: Black, Peter Jay Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Penetration testing essentials. ([2017]) Authors: Oriyano, Sean-Philip Record Type: Book Extent: 1 online resource (xx, 340 pages ), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Hacking Vim 7.2 : ready-to-use hacks with solutions for common situations encountered by users of the Vim editor /: ready-to-use hacks with solutions for common situations encountered by users of the Vim editor. (©2010) Other Names: Schulz, Kim Record Type: Book Extent: 1 online resource (v, 228 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Geek and hacker stories : code, culture and storytelling from the technosphere /: code, culture and storytelling from the technosphere. (2018) Authors: Alleyne, Brian Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Mobile malware attacks and defense. (©2009) Other Names: Dunham, Ken; Abu-Nimeh, Saeed Record Type: Book Extent: 1 online resource (xxv, 409 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Hacken für Dummies. (2017) Authors: Beaver, Kevin Other Names: Franken, Gerhard translator.; (Translator) Schmidt, Jutta translator. Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Profiling hackers : the science of criminal profiling as applied to the world of hacking /: the science of criminal profiling as applied to the world of hacking. (2008 ©2009) Other Names: Chiesa, Raoul, 1973-; Ducci, Stefania; Ciappi, Silvio, 1965- Record Type: Book Extent: 1 online resource (xxiii, 262 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Defense against the black arts : how hackers do what they do and how to protect against it /: how hackers do what they do and how to protect against it. (©2012) Other Names: Varsalone, Jesse; McFadden, Matthew; Morrissey, Sean Record Type: Book Extent: 1 online resource (xvi, 396 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Blackout. (2015) Authors: Black, Peter Jay Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Underground : tales of hacking, madness and obsession on the electronic frontier /: tales of hacking, madness and obsession on the electronic frontier. (2011) Other Names: Assange, Julian; Dreyfus, Suelette Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗