Work Work and do Work, if you Don't mind then Do Work... Never think how to do Work..... We Taught You How To Learn
Saturday, April 2, 2011
Hacking Books Names by Authours
Avenger McNab, Andy
Border Songs Lynch, Jim
Brain Jack Falkner, Brian
Computer Crime, Investigation, and the Law Easttom, Chuck & Taylor, Jeff
Confessions of a Public Speaker Berkun, Scott
Count Zero Gibson, William
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses Skoudis, Ed & Liston, Tom
Dear Hacker: Letters to the Editor of 2600 Goldstein, Emmanuel
Death Benefits: A Novel Perry, Thomas
Divided in Death Robb, Nora Roberts; J. D.
Doctor Who: Blue Box Orman, Kate
Exploiting software: how to break code Hoglund, Greg & McGraw, Gary
Geekonomics: The Real Cost of Insecure Software Rice, David
Gray Hat Hacking the Ethical Hackers Handbook, 3rd Edition Harper, Allen & Harris, Shon & Ness, Jonathan & Eagle, Chris & Lenkey, Gideon & Williams, Terron
Gray Hat Hacking: The Ethical Hacker's Handbook Harris, Shon
Hacker Cracker: A Journey From the Mean Streets of Brooklyn to the Frontiers of Cyberspace Nuwere, Ejovi & Chanoff, David
Hackers: Heroes of the Computer Revolution Levy, Steven
Hacking: The Next Generation (Animal Guide) Dhanjani, Nitesh & Rios, Billy & Hardin, Brett
Hidden Agendas Clancy, Tom & Pieczenik, Steve
In the beginning ...was the command line Stephenson, Neal
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime Underground Poulsen, Kevin
Neuromancer Gibson, William
Omnitopia Dawn Duane, Diane
Pattern Recognition Gibson, William
Piracy: The Intellectual Property Wars From Gutenberg to Gates Johns, Adrian
Self's punishment Schlink, Bernhard & Popp, Walter
Snow Crash Stephenson, Neal
Social Engineering: The Art of Human Hacking Hadnagy, Christopher
Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day Winkler, Ira
Springboard Clancy, created by Tom & Perry, Steve Pieczenik; written by Steve & Segriff, Larry
Steal This Computer Book 3: What They Won't Tell You About the Internet Wang, Wallace
Steal This File Sharing Book: What They Won't Tell You About File Sharing Wang, Wally
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD Long, Johnny & Russell, Ryan & Mullen, Timothy
The Art of Deception: Controlling the Human Element of Security Simon, Kevin D. Mitnick & William L.
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers Mitnick, Kevin D. & Simon, William L.
The Blue Nowhere Deaver, Jeffery
The database hacker's handbook: defending database servers Litchfield, David & Anley, Chris & Heasman, John
The Devil's Code Sandford, John
The Empress File Sandford, John
The Fool's Run Sandford, John
The Girl Who Played With Fire Keeland, Stieg Larsson; Translated From the Swedish by Reg
The Girl With the Dragon Tattoo Keeland, Stieg Larsson; Translated From the Swedish by Reg
The Hacker Crackdown: Law and Disorder on the Electronic Frontier Sterling, Bruce
The Limit Landon, Kristen
The Paris Option Ludlum, Robert
The Quantum Connection Taylor, Travis S.
The Seville Communion Pérez-Reverte, Arturo
The Water Room (Bryant & May Mysteries (Paperback)) Fowler, Christopher
The Wrong Man: A Novel Katzenbach, John
Transcendence McKitterick, Christopher
Vanity Fair Thackeray, William Makepeace
Zero History Gibson, William
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment