Warning: file_put_contents(cache/omni_43937f958d9d2d6b544153d6e8de5c73.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
DOS Programmer's Reference
DOS Programmer's Reference 1991...
View Book →Sécurité pour windows 2000 : Ressources anti-hackers
Available on Internet Archive....
View Book →Bluestone
إسطوانة bluestone Hacker 1 الجزء الأول أرجوا عدم إستخدامها ضد المسلمين...
View Book →
Hacking the academy : new approaches to scholarship and teaching from digital humanities
Includes bibliographical references. Description based on print version record....
View Book →CIA Reading Room cia-rdp95m00249r000801140014-3: TRANSCRIPT OF DDI REMARKS TO THE SECURITY AFFAIRS S
Declassified and Approved For Release 2012/12/12 : CIA-RDP95M00249R000801140014-3 TRANSCRIPT OF DDI REMARKS TO THE SECURITY AFFAIRS SUPPORT ASSOCIATION 13 NOVEMBER 1984 Declassified and Approved For R...
View Book →
Hackers, Heroes of the Computer Revolution. Chapters 1 and 2
Public domain book available via Project Gutenberg....
View Book →
The New Hacker's Dictionary
First published in 1991...
View Book →CIA Reading Room cia-rdp89b00297r000300580014-6: REQUEST FOR COMMENTS ON DOD TESTIMONY ON H. R. 2889
Declassified in Part - Sanitized Copy Approved for Release 2011/11/29: CIA-RDP89B00297R000300580014-6 ,-~ OLL85-2723/1 16 September 1985 MEMORANDUM FOR: Director, Office of Security Deputy Director, O...
View Book →
Iranian Hackers!
Hacked F.D.L.P. page after an Iranian general Qasem Soleimani was killed...
View Book →The girl who takes an eye for an eye
vii, 347 pages ; 25 cm...
View Book →
The web application hacker's handbook
First published in 2007...
View Book →Hacking : digital media and technological determinism
"This book provides an introduction to the community of hackers and an analysis of the meaning of hacking in twenty-first century societies."--Jacket....
View Book →
The Hackable City
Digital Media and Collaborative City-Making in the Network Society...
View Book →
The bushwhackers & other stories
Public domain book available via Project Gutenberg....
View Book →
Cloanto Personal Paint V 6.4
Cloanto Personal Paint V 6.4...
View Book →
Getting Started Becoming a Master Hacker
First published in 2019...
View Book →Bandidos y hackers
From the Library of Congress....
View Book →Peter-Hacks-Vertonungen : Verzeichnis der Vertonungen lyrischer Werke von Peter Hacks 1949 bis 2008
From the Library of Congress....
View Book →
[Stories, Poems, Jargon of Hack Drivers]
From the Library of Congress....
View Book →
Is Parallel Programming Hard, And, If So, What Can You Do About It?
...
View Book →
When autonomous vehicles are hacked, who is liable?
Who might face civil liability if autonomous vehicles (AVs) are hacked to steal data or inflict mayhem, injuries, and damage? How will the civil justice and insurance systems adjust to handle such cla...
View Book →
Hacking marketing : agile practices to make marketing smarter, faster, and more innovative
"Apply software-inspired management concepts to accelerate modern marketing In many ways, modern marketing has more in common with the software profession than it does with classic marketing managemen...
View Book →
Inside the enemy's computer : identifying cyber-attackers
x, 304 pages : 23 cm...
View Book →Certified ethical hacker (CEH) foundation guide
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Ba...
View Book →
Gray Hat Hacking
First published in 2004...
View Book →
Defense against the black arts : how hackers do what they do and how to protect against it
Includes index. Description based on print version record; resource not viewed....
View Book →Hacker's Creek Journal Volume 39 Issue 1
Founded in 1982, Hacker's Creek Pioneer Descendants is a group ddicated to Genealogy and the history of North Central West Virginia....
View Book →
Harley O. Hacker. April 30, 1928. -- Ordered to be printed
From the Library of Congress....
View Book →
Lisp Hackers
Interviews with 100x More Productive Programmers...
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →Wherever I lie is your bed. Edited by Margaret Jull Costa and Marilyn Hacker
From the Library of Congress....
View Book →
The Hackable City : Digital Media and Collaborative City-Making in the Network Society
This open access book presents a selection of the best contributions to the Digital Cities 9 Workshop held in Limerick in 2015, combining a number of the latest academic insights into new collaborativ...
View Book →
Comments on hacks and hunters.
Also available in digital form....
View Book →
Hack the experience : tools for artists from cognitive science
Description based on print version record; resource not viewed....
View Book →
Tucca--Ramma--Hacking
Also printed in the Jerseyman, May 190l, v. 7, no. 2, p. [9]-12. "Read before the semi-annual meeting of the Hunterdon County Historical Society, at Pittstown, N.J., July 21, 1900"--Cf. Jerseyman May ...
View Book →
Hacking Portugal
Making Portugal a global player in Software Development...
View Book →
Homer H. Hacker. May 26, 1926. -- Ordered to be printed
SERIALSETDELIVERY2...
View Book →Cyber infrastructure protection
vi, 315 p. : 23 cm...
View Book →
The Mobile Application Hacker's Handbook
First published in 2015...
View Book →
Hackers wanted : an examination of the cybersecurity labor market
Includes bibliographical references. Description based on print version record and CIP data provided by publisher....
View Book →
The Innovators
First published in 2014...
View Book →https://www.copyright.gov/1201/2024/petitions/renewal/Supp-Security-Research-A-Group-of-Hackers-at-D
An official website of the United States Government. Docket (/docket/COLC-2023-0004) / Document (COLC-2023-0004-0002) (/document/COLC-2023-0004-0002) / Comment PUBLIC SUBMISSION Comment from A group o...
View Book →
Homer H. Hacker. June 23, 1926. -- Committed to the Committee of the Whole House and ordered to be p
SERIALSETDELIVERY2...
View Book →