Category Archives: Hacking

Hackers & Painters: Big Ideas from the Computer Age

“The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you’re willing to risk the consequences. ” –from Hackers & Painters: Big Ideas from the Computer Age, by Paul … Continue reading

Posted in Algorithms, Culture, Format, Hacking, IT Business & IT Culture, Information Theory, Network Security, Networking, Operating Systems, Privacy, Programming Languages, pdf | Leave a comment

Hacking Exposed Wireless, Second Edition

The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today’s established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use … Continue reading

Posted in Format, Hacking, Mobile & Wireless Computing, Network Security, Privacy, Security & Encryption, Wireless Networks, pdf | Leave a comment

HACKING EXPOSED WEB APPLICATIONS 3/E

This fully updated bestseller covers the latest web application exploitation techniques and their proven countermeasures Hacking Exposed: Web Applications, Third Edition shows you how to meet the challenges of online security with the two-pronged “attack-countermeasure” approach. The Third Edition provides … Continue reading

Posted in Format, Hacking, Network Security, Privacy, Security & Encryption, pdf | Leave a comment

Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)

This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from … Continue reading

Posted in Computer Science, Culture, Format, Hacking, Internet & Networking, Modeling & Simulation, Network Security, Security & Encryption, pdf | Leave a comment

Hacking For Dummies

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It’s bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by … Continue reading

Posted in Computers & Internet, Format, Hacking, Programming, Security & Encryption, pdf | Leave a comment

The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives

This book is about the global cybercrime industry, which according to some estimates, is a US$1 trillion industry and is growing rapidly. It examines economic and institutional processes in the cybercrime industry, provides insights into the entrepreneurial aspect of firms … Continue reading

Posted in Advertising, Communications, Computer Science, Culture, Digital Law, Entrepreneurship, Ethics, Format, General Accounting, Hacking, Information Systems, Law, Manager's Guides to Computing, Media & the Law, Nonfiction, pdf | Leave a comment

Hackers: Heroes of the Computer Revolution – 25th Anniversary Edition

This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers — those brilliant and eccentric nerds from the late 1950s through the early ’80s who took risks, bent the rules, and pushed … Continue reading

Posted in Artificial Intelligence, Format, Hacking, History, Programming, Programming Languages, pdf | Leave a comment

Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy … Continue reading

Posted in Format, Hacking, Operating Systems, pdf | Leave a comment

Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the … Continue reading

Posted in Format, Hacking, Network Security, Networking, Privacy, pdf | Leave a comment

CEH Certified Ethical Hacker Study Guide

Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That’s the philosophy behind ethical … Continue reading

Posted in Format, Hacking, Study Guides, Sybex, pdf | Leave a comment