Your search returned 18 results.

Sort
Results
1.
Network forensics : tracking hackers through cyberspace by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-N.

2.
The unofficial guide to ethical hacking by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: Macmillan India, ©2001
Availability: Items available for loan: IIITD (1)Call number: 005.8 FAD-E.

3.
The girl who played with fire by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English Original language: Swedish
Publication details: New York : Maclehose press, ©2006
Availability: Items available for loan: IIITD (1)Call number: F LAR-G.

4.
Violent python : a cookbook for hackers, forensic analysts, penetration testers, and security engineers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Syngress Media, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.133 OCO-V.
  (1 votes)
5.
Hackers and painters : big ideas from the computer age by
Edition: Kindle ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: O'Reilly, ©2004
Availability: Items available for loan: IIITD (1)Call number: Kindle.

6.
Ghost in the wires by
Edition: Kindle ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Little, Brown and Company, ©2011
Availability: Items available for loan: IIITD (1)Call number: Kindle.

7.
Art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.8 MIT-A.

8.
Kingpin : how one hacker took over the billion-dollar cybercrime underground by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Broadway Books, ©2011
Availability: Items available for loan: IIITD (1)Call number: 364.16 POU-K.

9.
The art of deception : controlling the human element of security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana: Wiley, ©2002
Availability: Not available: IIITD: Checked out (1).

10.
Coding freedom : the ethics and aesthetics of hacking by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Princeton : Princeton University Press, ©2013
Availability: Items available for loan: IIITD (1)Call number: 174.90 COL-C.

11.
Cyber mercenaries : the state, hackers, and power by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge : Cambridge University Press, ©2018
Availability: Items available for loan: IIITD (1)Call number: 005.8 MAU-C.

12.
The cathedral and the bazaar : musings on linux and open source by an accidental revolutionary by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Beijing : O'Reilly, ©1999
Availability: Not available: IIITD: Checked out (1).

13.
The hacker playbook 2 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: North Charleston : CreateSpace, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

14.
The hacker playbook 3 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CreateSpace, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

15.
Social engineering : the science of human hacking by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : John Wiley & Sons, ©2018
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAD-S.

16.
Snow crash by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Penguin, ©1992
Availability: Items available for reference: IIITD: Not for loan (1)Call number: 813.54 STE-S.

17.
Android hacker's handbook by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : Wiley, ©2014
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 DRA-A.

18.
Hacker culture A to Z : a fun guide to the people, ideas, and gadgets that made the tech world by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Beijng : O'Reilly, ©2023
Online access:
Availability: Not available: IIITD: Checked out (1).

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in