Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
61 result(s) for "Computer hackers Fiction."
Sort by:
Phantom Wheel
\"A group of teenage hackers has been conned into creating the most devastating virus the world has ever seen, and now it's up to them to take down the shadowy corporation behind it before it's too late\"-- Provided by publisher.
How to own an identity
The first two books in this series \"Stealing the Network: How to Own the Box\" and \"Stealing the Network: How to Own a Continent\" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air. \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Burning blue
When Nicole Castro, the most beautiful girl in her wealthy New Jersey high school, is splashed with acid on the left side of her perfect face, the world takes notice. But quiet loner Jay Nazarro does more than that--he decides to find out who did it. Jay understands how it feels to be treated like a freak, and he also has a secret: He's a brilliant hacker. But the deeper he digs, the more danger he's in--and the more he falls for Nicole. Too bad everyone is turning into a suspect, including Nicole herself.
Stealing the Network: How to Own an Identity
The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Warcross
\"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire\"-- Provided by publisher.
Demo
Jinx, Gizmo, and Mammoth, from the HIVE Academy, have hacked into the Titans Tower game system, and the Titans get caught in a virtual reality gone mad.
Stealing the Network
A fictional continent is emerging as a major new economic, political and military force on the world stage. However, their rapid growth has left little in the way of time and money to sure up their Internet backbone, and it is vulnerable to a potentially catastrophic attack. Who are the bad guys? What do they want?.
Wildcard
\"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats\"-- Provided by publisher.
Cowboys and the Eternal September
The concept of a hacker originated in the 1970s, and began to gradually take shape in the 1980s. It began to be discussed actively in various contexts, particularly in relation with the rise of open-source operating systems such as GNU and Linux in the 1990s until the early 2000s. Subsequently, as the times changed, the qualities that were demanded of reputable programmers changed in a major way. Originally, the programmers' capabilities in terms of writing code were most important, while their sociability was less emphasized. However, as computers became more common among the general public, and their social impact increased, hackers were required to be more socially amenable in various ways. Therefore, a large number of open-source projects introduced codes of conduct.