Computer hackers
Resource Information
The concept Computer hackers represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
The Resource
Computer hackers
Resource Information
The concept Computer hackers represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
- Label
- Computer hackers
36 Items that share the Concept Computer hackers
Context
Context of Computer hackersSubject of
No resources found
No enriched resources found
- Chained exploits : advanced hacking attacks from start to finish
- Coding freedom : the ethics and aesthetics of hacking
- Dear Hacker : letters to the editor of 2600
- Dissecting the hack : the f0rb1dd3n network
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Exploiting software : how to break code
- Hacker techniques, tools, and incident handling
- Hacker's delight
- Hackers
- Hackers beware
- Hacking : the art of exploitation
- Hacking : the art of exploitation
- Hacking : the next generation
- Hacking for dummies
- Hacking for dummies
- Hands-on ethical hacking and network defense
- High-tech crimes revealed : cyberwar stories from the digital front
- Honeypots : tracking hackers
- Insider threat : protecting the enterprise from sabotage, spying, and theft
- Low tech hacking : street smarts for security professionals
- Mobile malware attacks and defense
- Network forensics : tracking hackers through cyberspace
- Ninja hacking : unconventional penetration testing tactics and techniques
- No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
- Penetration testing : a hands-on introduction to hacking
- Preventing good people from doing bad things : implementing least privilege
- Professional penetration testing : creating and learning in a hacking lab
- Professional penetration testing : creating and operating a formal hacking lab
- Rootkit arsenal : escape and evasion in the dark corners of the system
- Social engineering : the art of human hacking
- The art of deception : controlling the human element of security
- The art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers
- The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
- The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
- The basics of web hacking : tools and techniques to attack the web
- The rootkit arsenal : escape and evasion in the dark corners of the system
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/rt3VdGNsTZY/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/rt3VdGNsTZY/">Computer hackers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer hackers
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/rt3VdGNsTZY/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/rt3VdGNsTZY/">Computer hackers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>