Search Results for Hackers.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dHackers.$0026ps$003d300$0026isd$003dtrue?dt=list2025-05-13T23:22:51ZHackers : crime and the digital sublimeent://SD_ILS/0/SD_ILS:333442025-05-13T23:22:51Z2025-05-13T23:22:51Zby Taylor, Paul A., 1967-<br/>Format: Books<br/>Publication Date 1999<br/>Hackers &amp; painters : big ideas from the computer ageent://SD_ILS/0/SD_ILS:289232025-05-13T23:22:51Z2025-05-13T23:22:51Zby Graham, Paul.<br/>Format: Books<br/>Publication Date 2004<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:515442025-05-13T23:22:51Z2025-05-13T23:22:51Zby Harper, Allen.<br/>Format: Books<br/>Publication Date 2011<br/>The hacker's handbook : the strategy behind breaking into and defending Networksent://SD_ILS/0/SD_ILS:584702025-05-13T23:22:51Z2025-05-13T23:22:51Zby Young, Susan (Susan Elizabeth), 1968-<br/>Format: Books<br/>Publication Date 2003<br/>Inside Internet security : what hackers don't want you to know -ent://SD_ILS/0/SD_ILS:141942025-05-13T23:22:51Z2025-05-13T23:22:51Zby Crume, Jeff.<br/>Format: Books<br/>Publication Date 2000<br/>Hacker, maker, teacher, thief : advertising's next generationent://SD_ILS/0/SD_ILS:157812025-05-13T23:22:51Z2025-05-13T23:22:51Zby Fiandaca, Daniele.<br/>Format: Books<br/>Publication Date 2014<br/>Cyberethics : morality and law in cyberspaceent://SD_ILS/0/SD_ILS:519872025-05-13T23:22:51Z2025-05-13T23:22:51Zby Spinello, Richard A., author.<br/>Format: Books<br/>Publication Date 2014<br/>Introduction to criminology : a text/readerent://SD_ILS/0/SD_ILS:518202025-05-13T23:22:51Z2025-05-13T23:22:51Zby Walsh, Anthony, 1941-<br/>Format: Books<br/>Publication Date 2014<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:498612025-05-13T23:22:51Z2025-05-13T23:22:51Zby Amoroso, Edward.<br/>Format: Books<br/>Publication Date 2013<br/>Cyber power : Crime, conflict and security in cyberspace.ent://SD_ILS/0/SD_ILS:500412025-05-13T23:22:51Z2025-05-13T23:22:51Zby Ghernaouti-Hélie, Solange, 1958-....<br/>Format: Books<br/>Publication Date 2013<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-05-13T23:22:51Z2025-05-13T23:22:51Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Community-based participatory researchent://SD_ILS/0/SD_ILS:507912025-05-13T23:22:51Z2025-05-13T23:22:51Zby Hacker, Karen.<br/>Format: Books<br/>Publication Date 2013<br/>Introducing globalization : analysis and readingsent://SD_ILS/0/SD_ILS:496342025-05-13T23:22:51Z2025-05-13T23:22:51Zby Mansbach, Richard W., 1943-<br/>Format: Books<br/>Publication Date 2013<br/>Global criminology : crime and victimization in a globalized eraent://SD_ILS/0/SD_ILS:500512025-05-13T23:22:51Z2025-05-13T23:22:51Zby Jaishankar, K.<br/>Format: Books<br/>Publication Date 2013<br/>Android security : attacks and defensesent://SD_ILS/0/SD_ILS:502242025-05-13T23:22:51Z2025-05-13T23:22:51Zby Misra, Anmol.<br/>Format: Books<br/>Publication Date 2013<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:177872025-05-13T23:22:51Z2025-05-13T23:22:51Zby Wiles, Jack.<br/>Format: Books<br/>Publication Date 2012<br/>Cybercrime : investigating high-technology computer crimeent://SD_ILS/0/SD_ILS:462192025-05-13T23:22:51Z2025-05-13T23:22:51Zby Moore, Robert, 1976-<br/>Format: Books<br/>Publication Date 2011<br/>Tron the original classic.ent://SD_ILS/0/SD_ILS:473882025-05-13T23:22:51Z2025-05-13T23:22:51Zby Bridges, Jeff, 1949-<br/>Format: Video disc<br/>Publication Date 2011 2009 2008 2007 2006<br/>Handbook of Internet crimeent://SD_ILS/0/SD_ILS:411342025-05-13T23:22:51Z2025-05-13T23:22:51Zby Jewkes, Yvonne, 1966-<br/>Format: Books<br/>Publication Date 2010<br/>The girl who played with fireent://SD_ILS/0/SD_ILS:492612025-05-13T23:22:51Z2025-05-13T23:22:51Zby Larsson, Stieg, 1954-2004. Flickan som lekte med elden.<br/>Format: Video disc<br/>Publication Date 2010<br/>The girl who played with fireent://SD_ILS/0/SD_ILS:209572025-05-13T23:22:51Z2025-05-13T23:22:51Zby Larsson, Stieg, 1954-2004.<br/>Format: Books<br/>Publication Date 2009<br/>The girl with the dragon tattooent://SD_ILS/0/SD_ILS:63202025-05-13T23:22:51Z2025-05-13T23:22:51Zby Larsson, Stieg, 1954-2004.<br/>Format: Books<br/>Publication Date 2008<br/>Moving people and knowledge : scientific mobility in an enlarging European Unionent://SD_ILS/0/SD_ILS:436122025-05-13T23:22:51Z2025-05-13T23:22:51Zby Ackers, Louise, 1960-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy1001/2008935922.html">http://www.loc.gov/catdir/toc/fy1001/2008935922.html</a><br/>Format: Books<br/>Publication Date 2008<br/>Hacking : digital media and technological determinisment://SD_ILS/0/SD_ILS:413212025-05-13T23:22:51Z2025-05-13T23:22:51Zby Jordan, Tim, 1959-<br/>Format: Books<br/>Publication Date 2008<br/>Auditor's guide to information systems auditingent://SD_ILS/0/SD_ILS:335902025-05-13T23:22:51Z2025-05-13T23:22:51Zby Cascarino, Richard.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip072/2006033470.html">http://www.loc.gov/catdir/toc/ecip072/2006033470.html</a><br/>Format: Books<br/>Publication Date 2007<br/>The victorian internet : the remarkable story of the telegraph and the nineteenth century's on-line pioneersent://SD_ILS/0/SD_ILS:402772025-05-13T23:22:51Z2025-05-13T23:22:51Zby Standage, Tom.<br/>Format: Books<br/>Publication Date 2007<br/>At the edge of artent://SD_ILS/0/SD_ILS:88962025-05-13T23:22:51Z2025-05-13T23:22:51Zby Blais, Joline.<br/>Format: Books<br/>Publication Date 2006<br/>The unofficial guide to ethical hackingent://SD_ILS/0/SD_ILS:90172025-05-13T23:22:51Z2025-05-13T23:22:51Zby Fadia, Ankit, 1985-<br/>Format: Books<br/>Publication Date 2006<br/>Technology in actionent://SD_ILS/0/SD_ILS:318052025-05-13T23:22:51Z2025-05-13T23:22:51Zby Evans, Alan.<br/>Format: Books<br/>Publication Date 2006<br/>Hacking the cable modem : what cable companies don't want you to knowent://SD_ILS/0/SD_ILS:402292025-05-13T23:22:51Z2025-05-13T23:22:51Zby DerEngel, 1983-<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0715/2005033678-d.html">http://www.loc.gov/catdir/enhancements/fy0715/2005033678-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip063/2005033678.html">http://www.loc.gov/catdir/toc/ecip063/2005033678.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy1008/2005033678-b.html">http://www.loc.gov/catdir/enhancements/fy1008/2005033678-b.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Google hacking for penetration testersent://SD_ILS/0/SD_ILS:129762025-05-13T23:22:51Z2025-05-13T23:22:51Zby Long, Johnny.<br/>Format: Books<br/>Publication Date 2005<br/>Cyberculture : the key conceptsent://SD_ILS/0/SD_ILS:366332025-05-13T23:22:51Z2025-05-13T23:22:51Zby Bell, David, 1965 February 12-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip047/2003017827.html">http://www.loc.gov/catdir/toc/ecip047/2003017827.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Network security foundationsent://SD_ILS/0/SD_ILS:224992025-05-13T23:22:51Z2025-05-13T23:22:51Zby Strebe, Matthew.<br/>04 <a href="http://www.gbv.de/dms/hebis-darmstadt/toc/125038879.pdf">lizenzfrei</a>
Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-t.html</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018737839&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018737839&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-b.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-d.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Understanding work and employment : industrial relations in transitionent://SD_ILS/0/SD_ILS:391642025-05-13T23:22:51Z2025-05-13T23:22:51Zby Ackers, Peter, 1957-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy041/2003278005.html">http://www.loc.gov/catdir/toc/fy041/2003278005.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0615/2003278005-d.html">http://www.loc.gov/catdir/enhancements/fy0615/2003278005-d.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0725/2003278005-b.html">http://www.loc.gov/catdir/enhancements/fy0725/2003278005-b.html</a><br/>Format: Books<br/>Publication Date 2003<br/>The hacker ethicent://SD_ILS/0/SD_ILS:84722025-05-13T23:22:51Z2025-05-13T23:22:51Zby Himanen, Pekka<br/>Format: Books<br/>Publication Date 2001<br/>The hacker ethic : and the spirit of the information ageent://SD_ILS/0/SD_ILS:135532025-05-13T23:22:51Z2025-05-13T23:22:51Zby Himanen, Pekka.<br/>Format: Books<br/>Publication Date 2001<br/>The hacker ethic : and the spirit of the information ageent://SD_ILS/0/SD_ILS:206472025-05-13T23:22:51Z2025-05-13T23:22:51Zby Himanen, Pekka.<br/>Format: Books<br/>Publication Date 2001<br/>Digital democracy : issues of theory and practiceent://SD_ILS/0/SD_ILS:366302025-05-13T23:22:51Z2025-05-13T23:22:51Zby Hacker, Kenneth L.<br/>Format: Books<br/>Publication Date 2000<br/>A writer's referenceent://SD_ILS/0/SD_ILS:233382025-05-13T23:22:51Z2025-05-13T23:22:51Zby Hacker, Diana, 1942-<br/>Format: Books<br/>Publication Date 1999<br/>