Computer fraud & hacking books

735 books were found.

Cyber Crime: Concepts, Methodologies, Tools and Applications

Cyber Crime: Concepts, Methodologies, Tools and Applications...

Author: Information Resources Management Association
ISBN: 9781613503232
Format: Hardback
$4857.60

A three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best...  Read More >>

The Psychology of Cyber Crime: Concepts and Principles

The Psychology of Cyber Crime: Concepts and Principles...

Author: Grainne Kirwan ,  Andrew Power
ISBN: 9781613503508
Format: Hardback
$488.40

Examining the psychology of cybercrime, this book considers many aspects of cybercrime, including research on offenders,...  Read More >>

How to Unblock Everything on the Internet

How to Unblock Everything on the Internet

Author: Ankit Fadia
ISBN: 9789325963573
Format: Paperback
$23.26

 Read More >>

A Bug Hunter's Diary

A Bug Hunter's Diary

Author: Tobias Klein
ISBN: 9781593273859
Format: Paperback
$105.47

Klein tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code,...  Read More >>

Julian Assange: The Unauthorised Autobiography

Julian Assange: The Unauthorised Autobiography

Author: Julian Assange
ISBN: 9781921758553
Format: Paperback
$19.99

WikiLeaks has helped redefine our idea of investigative journalism and our understanding of how information should...  Read More >>

CEH Certified Ethical Hacker All-in-One Exam Guide

CEH Certified Ethical Hacker All-in-One Exam Guide

Author: Matt Walker ,  Angela Walker
ISBN: 9780071772297
Format: Book
$132.00

Security experts and trainers cover all exam objectives for this new IT security certification in detail and provide...  Read More >>

Prevent Your Voicemail & Cell Phone Being Hacked

Prevent Your Voicemail & Cell Phone Being Hacked

Author: Myerson Laurence ,  Christina Thomas
ISBN: 9780956836137
Format: Paperback
$17.98

 Read More >>

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Defense against the Black Arts: How Hackers Do What...

Author: Jesse Varsalone ,  Matthew McFadden
ISBN: 9781439821190
Format: Paperback
$116.00

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack...  Read More >>

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

The Basics of Hacking and Penetration Testing: Ethical...

Author: Patrick Engebretson (Assistant Professor of Information Assurance; Senior Penetration Tester for security firm in the Midwest)
ISBN: 9781597496551
Format: Paperback
$79.07

Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This...  Read More >>

China's Cyberwarfare Capability

China's Cyberwarfare Capability

Author: Elisabette M Marvel
ISBN: 9781617612183
Format: Paperback
$113.52

Presents a open source assessment of China's capability to conduct computer network operations (CNO) both during...  Read More >>

Internet Child Abuse: Current Research and Policy

Internet Child Abuse: Current Research and Policy

Author: Julia Davidson (Kingston University, UK) ,  Petter Gottschalk (BI Norwegian Business School, Oslo, Norway)
ISBN: 9780415697804
Format: Paperback
$114.00

Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation...  Read More >>

Ghost in the Wires

Ghost in the Wires

Author: Kevin Mitnick ,  William Simon
ISBN: 9780316037709
Format: Hardback
$68.61

Kevin Mitnick's long-awaited memoir of computer hacking and FBI skirting, revealed now after seven years of government-mandated...  Read More >>

Real Hackers Handbook

Real Hackers Handbook

Author: Paul Day
ISBN: 9781847328250
Format: Paperback
$52.67

Examines the phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some...  Read More >>

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare: Techniques, Tactics and Tools for Security...

Author: Jason Andress (CISSP, ISSAP, CISM, GPEN) ,  Steve Winterfeld ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity and Military Intelligence.)
ISBN: 9781597496377
Format: Paperback
$105.47

Explores the battlefields, participants and the tools and techniques used during digital conflicts. This title discusses...  Read More >>

Gray Hat Hacking The Ethical Hackers Handbook

Gray Hat Hacking The Ethical Hackers Handbook

Author: Allen Harper ,  Shon Harris
ISBN: 9780071742559
Format: Paperback
$158.40

 Read More >>

Computer Forensics JumpStart

Computer Forensics JumpStart

Author: Michael G. Solomon ,  K. Rudolph
ISBN: 9780470931660
Format: Paperback
$49.95

 Read More >>

Crime and Terrorism Risk: Studies in Criminology and Criminal Justice

Crime and Terrorism Risk: Studies in Criminology and...

Author: Leslie W. Kennedy ,  Edmund F. McGarrell
ISBN: 9780415991827
Format: Paperback
$124.00

Crime and Terrorism Risk is a collection of original essays and articles that presents a broad overview of the issues...  Read More >>

Crime and Terrorism Risk: Studies in Criminology and Criminal Justice

Crime and Terrorism Risk: Studies in Criminology and...

Author: Leslie W. Kennedy ,  Edmund F. McGarrell
ISBN: 9780415991810
Format: Hardback
$368.00

Crime and Terrorism Risk is a collection of original essays and articles that presents a broad overview of the issues...  Read More >>

Underground

Underground

Author: Suelette Dreyfus ,  Julian Assange
ISBN: 9781742752037
Format: Undefined
$24.95

The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young...  Read More >>

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

XBOX 360 Forensics: A Digital Forensics Guide to Examining...

Author: Steven Bolt (Computer Forensics Leader, Instructor at the Defence Cyber Investigations Training Academy)
ISBN: 9781597496230
Format: Paperback
$158.27

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal...  Read More >>

Underground

Underground

Author: Suelette Dreyfus ,  Julian Assange
ISBN: 9781742752020
Format: Paperback
$19.99

The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young...  Read More >>

Social Engineering: The Art of Human Hacking

Social Engineering: The Art of Human Hacking

Author: Christopher Hadnagy ,  Paul Wilson
ISBN: 9780470639535
Format: Paperback
$92.37

 Read More >>

Managed Code Rootkits: Hooking into Runtime Environments

Managed Code Rootkits: Hooking into Runtime Environments...

Author: Erez Metula (CISSP, Founder of AppSec)
ISBN: 9781597495745
Format: Paperback
$131.87

Imagine being able to change the languages for the applications that a computer is running and taking control over...  Read More >>

IT Audit, Control, and Security

IT Audit, Control, and Security

Author: Robert R. Moeller
ISBN: 9780471406761
Format: Hardback
$173.95

Computer Audit, Control, and Security, 2nd Edition describes the types of internal controls, security, and integrity...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List