Search Results for Hackers. - Narrowed by: 2 SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dHackers.$0026qf$003dACCESS_LEVEL$002509Access$002bLevel$0025092$0025092$0026ps$003d300?dt=list 2025-05-13T17:33:25Z Hackers : crime and the digital sublime ent://SD_ILS/0/SD_ILS:33344 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Taylor, Paul A., 1967-<br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Hackers &amp;amp; painters : big ideas from the computer age ent://SD_ILS/0/SD_ILS:28923 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Graham, Paul.<br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:51544 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Harper, Allen.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> The hacker's handbook : the strategy behind breaking into and defending Networks ent://SD_ILS/0/SD_ILS:58470 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Young, Susan (Susan Elizabeth), 1968-<br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> Inside Internet security : what hackers don't want you to know - ent://SD_ILS/0/SD_ILS:14194 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Crume, Jeff.<br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> Hacker, maker, teacher, thief : advertising's next generation ent://SD_ILS/0/SD_ILS:15781 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Fiandaca, Daniele.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Cyberethics : morality and law in cyberspace ent://SD_ILS/0/SD_ILS:51987 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Spinello, Richard A., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Introduction to criminology : a text/reader ent://SD_ILS/0/SD_ILS:51820 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Walsh, Anthony, 1941-<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:49861 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Amoroso, Edward.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cyber power : Crime, conflict and security in cyberspace. ent://SD_ILS/0/SD_ILS:50041 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Ghernaouti-H&eacute;lie, Solange, 1958-....<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking exposed : mobile security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:50511 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Bergman, Neil.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Community-based participatory research ent://SD_ILS/0/SD_ILS:50791 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Hacker, Karen.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Introducing globalization : analysis and readings ent://SD_ILS/0/SD_ILS:49634 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Mansbach, Richard W., 1943-<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Global criminology : crime and victimization in a globalized era ent://SD_ILS/0/SD_ILS:50051 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Jaishankar, K.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Android security : attacks and defenses ent://SD_ILS/0/SD_ILS:50224 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Misra, Anmol.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Low tech hacking : street smarts for security professionals ent://SD_ILS/0/SD_ILS:17787 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Wiles, Jack.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Cybercrime : investigating high-technology computer crime ent://SD_ILS/0/SD_ILS:46219 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Moore, Robert, 1976-<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Tron the original classic. ent://SD_ILS/0/SD_ILS:47388 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Bridges, Jeff, 1949-<br/>Format:&#160;Video disc<br/>Publication Date&#160;2011&#160;2009&#160;2008&#160;2007&#160;2006<br/> Handbook of Internet crime ent://SD_ILS/0/SD_ILS:41134 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Jewkes, Yvonne, 1966-<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> The girl who played with fire ent://SD_ILS/0/SD_ILS:49261 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Larsson, Stieg, 1954-2004. Flickan som lekte med elden.<br/>Format:&#160;Video disc<br/>Publication Date&#160;2010<br/> The girl who played with fire ent://SD_ILS/0/SD_ILS:20957 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Larsson, Stieg, 1954-2004.<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> The girl with the dragon tattoo ent://SD_ILS/0/SD_ILS:6320 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Larsson, Stieg, 1954-2004.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Moving people and knowledge : scientific mobility in an enlarging European Union ent://SD_ILS/0/SD_ILS:43612 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Ackers, Louise, 1960-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy1001/2008935922.html">http://www.loc.gov/catdir/toc/fy1001/2008935922.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Hacking : digital media and technological determinism ent://SD_ILS/0/SD_ILS:41321 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Jordan, Tim, 1959-<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Auditor's guide to information systems auditing ent://SD_ILS/0/SD_ILS:33590 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Cascarino, Richard.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip072/2006033470.html">http://www.loc.gov/catdir/toc/ecip072/2006033470.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> The victorian internet : the remarkable story of the telegraph and the nineteenth century's on-line pioneers ent://SD_ILS/0/SD_ILS:40277 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Standage, Tom.<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> At the edge of art ent://SD_ILS/0/SD_ILS:8896 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Blais, Joline.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> The unofficial guide to ethical hacking ent://SD_ILS/0/SD_ILS:9017 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Fadia, Ankit, 1985-<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Technology in action ent://SD_ILS/0/SD_ILS:31805 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Evans, Alan.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Hacking the cable modem : what cable companies don't want you to know ent://SD_ILS/0/SD_ILS:40229 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;DerEngel, 1983-<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0715/2005033678-d.html">http://www.loc.gov/catdir/enhancements/fy0715/2005033678-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip063/2005033678.html">http://www.loc.gov/catdir/toc/ecip063/2005033678.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy1008/2005033678-b.html">http://www.loc.gov/catdir/enhancements/fy1008/2005033678-b.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:12976 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Long, Johnny.<br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Cyberculture : the key concepts ent://SD_ILS/0/SD_ILS:36633 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Bell, David, 1965 February 12-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip047/2003017827.html">http://www.loc.gov/catdir/toc/ecip047/2003017827.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Network security foundations ent://SD_ILS/0/SD_ILS:22499 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Strebe, Matthew.<br/>04 <a href="http://www.gbv.de/dms/hebis-darmstadt/toc/125038879.pdf">lizenzfrei</a> Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-t.html</a> Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018737839&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018737839&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-b.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Understanding work and employment : industrial relations in transition ent://SD_ILS/0/SD_ILS:39164 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Ackers, Peter, 1957-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy041/2003278005.html">http://www.loc.gov/catdir/toc/fy041/2003278005.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0615/2003278005-d.html">http://www.loc.gov/catdir/enhancements/fy0615/2003278005-d.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0725/2003278005-b.html">http://www.loc.gov/catdir/enhancements/fy0725/2003278005-b.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2003<br/> The hacker ethic ent://SD_ILS/0/SD_ILS:8472 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Himanen, Pekka<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> The hacker ethic : and the spirit of the information age ent://SD_ILS/0/SD_ILS:13553 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Himanen, Pekka.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> The hacker ethic : and the spirit of the information age ent://SD_ILS/0/SD_ILS:20647 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Himanen, Pekka.<br/>Format:&#160;Books<br/>Publication Date&#160;2001<br/> Digital democracy : issues of theory and practice ent://SD_ILS/0/SD_ILS:36630 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Hacker, Kenneth L.<br/>Format:&#160;Books<br/>Publication Date&#160;2000<br/> A writer's reference ent://SD_ILS/0/SD_ILS:23338 2025-05-13T17:33:25Z 2025-05-13T17:33:25Z by&#160;Hacker, Diana, 1942-<br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/>