Search Results for Hackers. - Narrowed by: 2011-2014 SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dHackers.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011-2014$0025092011-2014$0026ps$003d300$0026isd$003dtrue?dt=list 2025-10-30T22:03:48Z Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:51544 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Harper, Allen.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Introduction to criminology : a text/reader ent://SD_ILS/0/SD_ILS:51820 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Walsh, Anthony, 1941-<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Hacker, maker, teacher, thief : advertising's next generation ent://SD_ILS/0/SD_ILS:15781 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Fiandaca, Daniele.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Cyberethics : morality and law in cyberspace ent://SD_ILS/0/SD_ILS:51987 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Spinello, Richard A., author.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:49861 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Amoroso, Edward.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cyber power : Crime, conflict and security in cyberspace. ent://SD_ILS/0/SD_ILS:50041 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Ghernaouti-H&eacute;lie, Solange, 1958-....<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Community-based participatory research ent://SD_ILS/0/SD_ILS:50791 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Hacker, Karen.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Introducing globalization : analysis and readings ent://SD_ILS/0/SD_ILS:49634 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Mansbach, Richard W., 1943-<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Global criminology : crime and victimization in a globalized era ent://SD_ILS/0/SD_ILS:50051 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Jaishankar, K.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Android security : attacks and defenses ent://SD_ILS/0/SD_ILS:50224 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Misra, Anmol.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking exposed : mobile security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:50511 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Bergman, Neil.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Low tech hacking : street smarts for security professionals ent://SD_ILS/0/SD_ILS:17787 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Wiles, Jack.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Tron the original classic. ent://SD_ILS/0/SD_ILS:47388 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Bridges, Jeff, 1949-<br/>Format:&#160;Video disc<br/>Publication Date&#160;2011&#160;2009&#160;2008&#160;2007&#160;2006<br/> Cybercrime : investigating high-technology computer crime ent://SD_ILS/0/SD_ILS:46219 2025-10-30T22:03:48Z 2025-10-30T22:03:48Z by&#160;Moore, Robert, 1976-<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/>