Your search returned 57 results.

Sort
Results
1.
Masters of deception : the gang that ruled cyberspace Michelle Slatalla and Joshua Quittner by
Edition: 1st HarperPerennial ed
Publication details: New York Harper Perennial 1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.16809747 SLA.

2.
Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.] by
Publication details: Amsterdam Elsevier c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DUN.

3.
Network intrusion alert : an ethical hacking guide to intrusion detection Ankit Fadia, Manu Zacharia by
Publication details: Boston, MA Thomson Course Technology PTR c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FAD.

4.
Network security : a hacker's perspective Ankit Fadia by
Edition: 2nd ed
Publication details: Boston, MA Thompson Course Technology c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FAD.

5.
New York Cafe Michael Dean ; illustrated by Peter Richardson by
Edition: 1st editiion
Publication details: Oxford Oxford University Press 2008
Availability: Items available for loan: Anna Centenary Library (3)Call number: 823.0083 DEA, ...

6.
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing Johnny Long by
Publication details: Burlington, MA ; Oxford Elsevier Science [distributor], Syngress c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LON.

7.
Professional pen testing for Web applications Andres Andreu by
Publication details: New Delhi Wiley Pub 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AND.

8.
Profiling hackers : the science of criminal profiling as applied to the world of hacking Raoul Chiesa, Stefania Ducci, Silvio Ciappi by
Publication details: Boca Raton, FL Auerbach Publications c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CHI.

9.
The hacker diaries : confessions of teenage hackers Dan Verton by
Publication details: New York McGraw-Hill/Osborne c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 VER.

10.
The quantum connection Travis S. Taylor by
Publication details: Riverdale, NY Baen Books ; Distributed by Simon & Schuster 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.6 TAY.

11.
The rootkit arsenal : escape and evasion in the dark corners of the system Bill Blunden by
Publication details: Plano, TX Wordware Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BLU.

12.
Top 8 Katie Finn by
Publication details: New York Point c2008
Availability: Items available for loan: Anna Centenary Library (2)Call number: 823 FIN, ...

13.
CEH : certified ethical hacker study guide Kimberly Graves by
Publication details: Indianapolis, IN Wiley Pub c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 GRA.

14.
Chained exploits : advanced hacking attacks from start to finish Andrew Whitaker, Keatron Evans, Jack B. Voth by
Publication details: Boston Addison-Wesley c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WHI.

15.
Collateral damage Fern Michaels by
Publication details: New York Zebra c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.54 MIC.

16.
Dear hacker : letters to the editor of 2600 Emmanuel Goldstein, Christian Stahl, Johann Grabner ; [edited by] Laura by
Edition: 1st ed
Publication details: Hoboken, N.J Wiley Pub., Inc c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 GOL.

17.
Digital crime and digital terrorism Robert W. Taylor ... [et al.] by
Publication details: Upper Saddle River, NJ Pearson/Prentice Hall 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 TAY.

18.
Dissecting the hack : the forb1dd3n network Jayson E. Street ... [et al.] by
Edition: Rev. ed
Publication details: Amsterdam ; Boston Syngress c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 STR.

19.
Enemy at the water cooler : real-life stories of insider threats and enterprise security management countermeasures Brian T Contos by
Publication details: Rockland, MA Syngress 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 CON.

20.
Ethical hacking and network defense by Michael T. Simpson, Kent Backman and James E. Corley by
Publication details: Boston Course Technology, Cengage Learning c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SIM.

21.
Hackers beware Eric Cole by
Edition: 1st ed
Publication details: Indianapolis, IN New Riders c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 COL.

22.
Hacker's challenge 2 : test your network security and forensic skills Mike Schiffman ... [et al.] by
Publication details: New York McGraw-Hill/Osborne c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

23.
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions David Pollino ... [et al.] by
Publication details: New York McGraw-Hill c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 POL.

24.
Hacker's delight Henry S. Warren, Jr by
Publication details: Boston, MA Addison-Wesley c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 WAR.

25.
Hacking for dummies by Kevin Beaver by
Edition: 2nd ed
Publication details: Hoboken, NJ John Wiley [distributor], Wiley c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEA.

26.
Hacking GPS Kathie Kingsley-Hughes by
Publication details: Indianapolis, Ind Wiley Pub c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 KIN.

27.
High-tech crimes revealed : cyberwar stories from the digital front Steven Branigan ; [foreword by William Cheswick] by
Publication details: Boston, MA Addison-Wesley 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 BRA.

28.
Honeypots : tracking hackers Lance Spitzner by
Publication details: Boston, MA Addison-Wesley c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SPI.

29.
Icecore : a Carl Hobbes thriller Matt Whyman by
Edition: 1st ed
Publication details: New York Atheneum Books for Young Readers 2007
Availability: Items available for loan: Anna Centenary Library (2)Call number: 813.6 WHY, ...

30.
Internet security : hacking, counterhacking, and society [edited by] Kenneth Einar Himma by
Publication details: Boston, MA Jones and Bartlett Publishers c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HIM.

31.
Certified ethical hacker Michael Gregg by
Publication details: Indianapolis, IN Que Certification c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 GRE.

32.
Certified ethical hacker Michael Gregg by
Publication details: Indianapolis, IN Que Certification c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 GRE.

33.
Exploiting software : how to break code Greg Hoglund, Gary McGraw by
Publication details: Boston, MA Addison-Wesley c2004
Availability: Items available for loan: Anna Centenary Library (3)Call number: QA76.9.A25 H635 2004 005.8, ...

34.
Gray hat hacking : the ethical hacker's handbook Shon Harris ... [et al.] by
Edition: 2nd ed
Publication details: New York McGraw-Hill c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAR.

35.
Gray hat hacking : the ethical hacker's handbook Shon Harris ... [et al.] by
Edition: 2nd ed
Publication details: New York McGraw-Hill c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: QA76.9.A25 G743 2008 005.8.

36.
Neuromancer William Gibson by
Publication details: New York Ace Books c1984
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.54 GIB.

37.
Neuromancer William Gibson by
Publication details: London Harper c1984
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.54 GIB.

38.
The blue nowhere Jeffery Deaver by
Publication details: New York Simon & Schuster 2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.54 DEA.

39.
The blue nowhere Jeffery Deaver by
Publication details: New York Simon & Schuster 2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.54 DEA.

40.
The empress file John Sandford; previously published under the name John Camp by
Edition: 1st ed
Publication details: New York H. Holt 1991
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.54 SAN.

41.
The empress file John Sandford; previously published under the name John Camp by
Edition: 1st ed
Publication details: New York H. Holt 1991
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.54 SAN.

42.
The hanged man's song John Sandford by
Publication details: New York Berkley Books c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.54 SAN.

43.
The hanged man's song John Sandford by
Publication details: New York Pocket Books c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.54 SAN.

44.
Neuromancer William Gibson by
Publication details: New York Ace Books c1984
Availability: No items available.

45.
Neuromancer William Gibson by
Publication details: London Harper c1984
Availability: No items available.

46.
The blue nowhere Jeffery Deaver by
Publication details: New York Simon & Schuster 2001
Availability: No items available.

47.
The blue nowhere Jeffery Deaver by
Publication details: New York Simon & Schuster 2001
Availability: No items available.

48.
The empress file John Sandford; previously published under the name John Camp by
Edition: 1st ed
Publication details: New York H. Holt 1991
Availability: No items available.

49.
The empress file John Sandford; previously published under the name John Camp by
Edition: 1st ed
Publication details: New York H. Holt 1991
Availability: No items available.

50.
The hanged man's song John Sandford by
Publication details: New York Berkley Books c2003
Availability: No items available.

51.
The hanged man's song John Sandford by
Publication details: New York Pocket Books c2003
Availability: No items available.

52.
The blue nowhere Jeffery Deaver by
Publication details: New York Simon & Schuster 2001
Availability: No items available.

53.
The blue nowhere Jeffery Deaver by
Publication details: New York Simon & Schuster 2001
Availability: No items available.

54.
The empress file John Sandford; previously published under the name John Camp by
Edition: 1st ed
Publication details: New York H. Holt 1991
Availability: No items available.

55.
The empress file John Sandford; previously published under the name John Camp by
Edition: 1st ed
Publication details: New York H. Holt 1991
Availability: No items available.

56.
The hanged man's song John Sandford by
Publication details: New York Berkley Books c2003
Availability: No items available.

57.
The hanged man's song John Sandford by
Publication details: New York Pocket Books c2003
Availability: No items available.

Pages

Find us on the map

Powered by Koha