Your search returned 12 results.

Sort
Results
1.
Android hacker's handbook by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : Wiley, ©2014
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 DRA-A.

2.
Snow crash by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Penguin, ©1992
Availability: Items available for reference: IIITD: Not for loan (1)Call number: 813.54 STE-S.

3.
Social engineering : the science of human hacking by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : John Wiley & Sons, ©2018
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAD-S.

4.
The hacker playbook 3 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CreateSpace, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

5.
The hacker playbook 2 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: North Charleston : CreateSpace, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

6.
Cyber mercenaries : the state, hackers, and power by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge : Cambridge University Press, ©2018
Availability: Items available for loan: IIITD (1)Call number: 005.8 MAU-C.

7.
Coding freedom : the ethics and aesthetics of hacking by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Princeton : Princeton University Press, ©2013
Availability: Items available for loan: IIITD (1)Call number: 174.90 COL-C.

8.
Kingpin : how one hacker took over the billion-dollar cybercrime underground by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Broadway Books, ©2011
Availability: Items available for loan: IIITD (1)Call number: 364.16 POU-K.

9.
Art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.8 MIT-A.

10.
Violent python : a cookbook for hackers, forensic analysts, penetration testers, and security engineers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Syngress Media, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.133 OCO-V.
  (1 votes)
11.
The girl who played with fire by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English Original language: Swedish
Publication details: New York : Maclehose press, ©2006
Availability: Items available for loan: IIITD (1)Call number: F LAR-G.

12.
Network forensics : tracking hackers through cyberspace by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-N.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in