Buy Computer Books : Hackers

This version is alphabetized by title. Click here to sort in order of current sales rank.

Please click any product name to check the price and shipping information

Search amazon.com for ...

All Products
Books & Audio Books
Magazine Subscriptions
Popular Music
Classical Music
VHS Videos
DVD
Electronics
Computers & Add-On
Software
Cameras & Photo
Office Products
Furniture
Kitchen & Housewares
Baby Products
Lawn - Garden - Patio
Tools & Hardware
Travel Accessories
Toys & Games
Video Games
Cell Phones
Bargain Outlet


Keywords:

  1. 'Bad boys' in cyberspace.(The Tech Guru)(employees as cyber-criminals) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Ara C. Trembly (Digital, 31 July, 2005)
  2. 'City of Angels' is nation's worst den of software pirates, SPA says in latest tally. (Los Angeles, California; the Software Publishers Association) : An article from : Software Industry Report (Digital, 01 June, 2005)
  3. 'Half-Life 2 : ' mortally wounded? Thanks to Hacker Hijinks, a key new game is stuck in development.(Game Master) : An article from : Computer User , by Paul Hyman (Digital, 18 April, 2005)
  4. 'Pro hacker' scores big with Internet security software.(Brief Article) : An article from : ColoradoBiz , by Eric Peterson (Digital, 28 July, 2005)
  5. 'Zombies' are the latest hacker-snatched PCs. : An article from : Fairfield County Business Journal , by Kathryn Balint (Digital, 28 July, 2005)
  6. 100% Internet Credit Card Fraud Protected , by Vesper (Paperback, 30 June, 2006)
  7. 1337 h4x0r h4ndb00k - tapeworm (2005-08-10, Paperback)
  8. 150 Things You Should Know About Security , by Lawrence Fennelly , Louis Tyska (Paperback, 20 November, 1997)
  9. 7 ways to prevent computer hacking.(Technology)(Brief Article) : An article from : Detroiter , by Nick Brookins (Digital, 25 July, 2005)
  10. A graphic picture of crime : this twisted pair of criminals had nothing to do with coaxial cables. They represent the new world of industrial espionage. ... : An article from : Security Management , by Dave Lang (Digital, 30 July, 2005)
  11. A Hacker's Guide to Project Management (Computer Weekly Professional) , by Andrew K. Johnston (Paperback, March, 1995)
  12. A Hacker Manifesto - McKenzie Wark (2004-10-04, Hardcover)
  13. A high-tech R & D Agenda.(Tech Talk; anti-hacking investigation)(Security Technology Studies) : An article from : Security Management , by Peter Piazza (Digital, 01 June, 2005)
  14. A Legal Guide to EDP Management , by Michael C. Gemignani (Hardcover, 17 February, 1989)
  15. A megabyte of prevention. (Up front : news, trends & analysis).(against computer crimes)(Industry Legal Issue)(Industry Trend or Event)(Brief Article) : An article from : Information Management Journal (Digital, 01 June, 2005)
  16. A recipe for hacker heartburn. : An article from : Security Management , by Henry M. Kluepfel (Digital, 28 July, 2005)
  17. Abstract Hacktivism : The making of a hacker culture , by Otto, von Busch , Karl, Palmås (Paperback, 12 January, 2006)
  18. Acquiring New ID : How To Easily Use The Latest Technology To Drop Out, Start Over, And Get On With Your Life - Ragnar Benson (1996-09, Paperback)
  19. Acsac '00 : Proceedings 16th Annual Computer Security Applications Conference December 11-15, 2000 New Orleans, Louisiana , by IEEE Computer Society (Paperback, 01 January, 2001)
  20. Acxiom hackers face 144-count indictment.(Legal)(Acxiom Corp.) : An article from : Arkansas Business , by Carl D. Holcombe (Digital, 01 June, 2005)
  21. Advances in Digital Forensics : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, ... Federation for Information Processing) , by Mark Pollitt , Sujeet Shenoi (Hardcover, 15 November, 2005)
  22. Adventures in Criminal Justice Research : Data Analysis for Windows Using SPSS Versions 11.0, 11.5, or Higher - George W. Dowdall (2003-07-22, Paperback)
  23. Affairs of State. : An article from : Security Management , by Teresa Anderson (Digital, 28 July, 2005)
  24. Aggressive Network Self-Defense , by Neil R. Wyler , Bruce Potter , Chris Hurley (Paperback, 01 February, 2005)
  25. An eye for an eye : will it stand up in court? (Tech Talk).(computer crime) : An article from : Security Management , by Peter Piazza (Digital, 31 July, 2005)
  26. An inside job. (special section - Computer-Information Security : Getting the Protection You Need) : An article from : Security Management , by Howard R. Keough (Digital, 28 July, 2005)
  27. An Overview of Computer Fraud and Abuse , by Paul R. Macdougall (Hardcover, 30 October, 2006)
  28. Anonymity and the Internet.(Brief Article) : An article from : The Futurist , by Dan Johnson (Digital, 28 July, 2005)
  29. Anti-Hacker Tool Kit, Third Edition - Mike Shema (2006-02-09, Paperback)
  30. Apache Security - Ivan Ristic (2005-03-15, Paperback)
  31. Are Data Protection Strategies Outdated?(recognizing weaknesses in and improving data security systems) : An article from : Security Management , by Lawrence B. Hall (Digital, 28 July, 2005)
  32. Are script kiddies hacking your system? How to fight the onslaught of cyber attacks.(Special focus : security) : An article from : District Administration , by Chip Shields (Digital, 31 July, 2005)
  33. Argentina, China, Russia account for more than $1 billion in piracy-related trade losses. (software piracy) : An article from : Software Industry Report (Digital, 28 July, 2005)
  34. Ashcroft Antes Cybercrime CHIPs.(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 01 June, 2005)
  35. ASTARO PROTECTS AGAINST WORMS THAT EXPLOIT WINDOWS 2000. : An article from : UNIX Update (Digital, 19 September, 2005)
  36. Asterisk Hacking - Ben Jackson (2007-06-29, Paperback)
  37. At Large : The Strange Case of the World's Biggest Internet Invasion , by David H. Freedman , Charles C. Mann (Paperback, 03 June, 1998)
  38. ATM/FRAME RELAY DATA NETWORKS VULNERABLE TO SECURITY BREACHES.(Industry Trend or Event) : An article from : Computer Security Update (Digital, 28 July, 2005)
  39. Avoid The Hook In The Phisherman's Bait : An article from : Accountancy SA , by Rika Butler (Digital, 24 September, 2005)
  40. Avoiding Cyber Fraud in Small Businesses : What Auditors and Owners Need to Know , by G. Jack Bologna , Paul Shaw (Hardcover, 26 May, 2000)
  41. Bad stuff. (Downside).(offences against the Internet) : An article from : Canada and the World Backgrounder (Digital, 28 July, 2005)
  42. BELLSOUTH SECURITY SERVICES GUARD AGAINST CYBER ATTACKS. : An article from : RBOC Update (Digital, 16 April, 2005)
  43. Better Policing With Microsoft Office : CRIME ANALYSIS, INVESTIGATIONS, AND - Mark A. Stallo & Christopher W. Bruce (2005-09-19, Plastic Comb)
  44. Better than talking?(young Feminists)(social aspects of recreational Viagra use) : An article from : Women's Health Activist , by Kate Steadman (Digital, 01 August, 2005)
  45. Beware of the botnets.(TECH NOUS) : An article from : New Zealand Management , by Glenn Baker (Digital, 25 July, 2005)
  46. Big Book of Apple Hacks , by Chris Seibold (Paperback, 01 December, 2007)
  47. Big Book of Windows Hacks , by Preston Gralla (Paperback, 01 August, 2007)
  48. Black Hat : Misfits, Criminals, and Scammers in the Internet Age , by John Biggs (Paperback, 10 June, 2004)
  49. Breaking Point : Tom Clancy's Net Force #4 (Audio Download, ..)
  50. BSD Hacks - Dru Lavigne (2004-05-24, Paperback)
  51. Buffer Overflow Attacks , by James C. Foster , Vitaly Osipov , Nish Bhalla (Paperback, 18 January, 2005)
  52. Buffer Overflow Attacks : : Detect, Exploit, Prevent , by James C. Foster (Digital, 06 April, 2006)
  53. Bush seeks bigger budget to combat money laundering, drug trafficking : An article from : Organized Crime Digest , by Anonymous (Digital, 09 September, 2005)
  54. Can the computer alter our thinking? (differences between Macintosh and IBM computer users) : An article from : Canadian Chemical News , by Marvin D. Silbert (Digital, 28 July, 2005)
  55. Can you hack it? Penetration testing gives companies a way to find their vulnerabilities before hackers use them to break in and cause harm. (Computer Security). : An article from : Security Management , by Frank Lam , Mike Beekey , Kevin Cayo (Digital, 30 July, 2005)
  56. Canning Spam : You've Got Mail (That You Don't Want) , by Jeremy Poteet (Paperback, 13 May, 2004)
  57. Cathedral and the Bazaar : Musings on Linux and Open Source by an Accidental Revolutionary , by Eric S. Raymond (Paperback, 15 January, 2001)
  58. CD and DVD Forensics - Paul Crowley (2006-11-28, Paperback)
  59. CEH : Official Certified Ethical Hacker Review Guide : Exam 312-50 - Kimberly Graves (2007-02-27, Paperback)
  60. Central station for virus reporting : Businesses have many options for reporting attempted intrusions by hackers, but they are reluctant to report viruses, ... : An article from : Security Management , by Peter Piazza (Digital, 30 July, 2005)
  61. Certified Ethical Hacker Exam Prep (Exam Prep 2 (Que Publishing)) - Michael Gregg (2006-04-07, Paperback)
  62. Challenges to maintain skills, abilities, & expertise : An article from : Presidents & Prime Ministers , by Arthur Levitt (Digital, 02 September, 2005)
  63. Chowhounds Guide to the San Francisco Bay Area, The , by Chowhound (Digital, ..)
  64. Cloak and data. (Data Encryption Standard) (special section - Computer-Information Security : Getting the Protection You Need) : An article from : Security Management , by Ronald J. Baum (Digital, 28 July, 2005)
  65. Co-opting the hacker culture.(Tech Forum) : An article from : Strategic Finance , by Michael Castelluccio (Digital, 31 July, 2005)
  66. Code Hacking : A Developer's Guide To Network Security (Networking Series) , by Richard Conway , Julian Cordingley (Paperback, May, 2004)
  67. Complete Hackers Handbook PB , by Dr K. (Paperback, 28 October, 2002)
  68. Computer and Intellectual Property Crime : Federal and State Law , by A. Hugh Scott (Hardcover, 01 November, 2001)
  69. Computer and Intrusion Forensics (Artech House Computer Security Series) - George Mohay (2003-04, Hardcover)
  70. Computer attack losses drop.(Tech Talk)(Brief Article) : An article from : Security Management (Digital, 01 June, 2005)
  71. Computer Audit, Control and Security , by Robert R. Moeller (Hardcover, 20 February, 2008)
  72. Computer chip theft booming, risk mgrs. warned.(risk managers) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Lisa S. Howard (Digital, 28 July, 2005)
  73. Computer Crime in Canada : An Introduction to Technological Crime and Related Legal Issues , by Robert W. Davis , Scott C. Hutchinson , Scott C. Hutchison (Hardcover, June, 1997)
  74. Computer Crime Surveys Yield Mixed Results : An article from : The Internal Auditor , by T McCollum (Digital, 14 September, 2005)
  75. Computer Crime, Information Warfare & Economic Espionage (Carolina Academic Press Law Casebook Series) , by David J. Loundy (Hardcover, January, 2003)
  76. Computer Crimes : High-Tech Theft , by N/A (Paperback, March, 1990)
  77. Computer Crimes and Digital Investigations , by Ian Walden (Hardcover, 09 April, 2007)
  78. Computer ethics : an antidote to despair by J.J. Buck Bloombecker. (Commentary) : An article from : Mid-Atlantic Journal of Business , by Chuck Chulvick (Digital, 28 July, 2005)
  79. Computer ethics : an antidote to despair. : An article from : Mid-Atlantic Journal of Business , by J J Buck Bloombecker (Digital, 28 July, 2005)
  80. Computer Ethics, Second Edition : Cautionary Tales and Ethical Dilemmas in Computing , by Tom Forester , Perry Morrison (Paperback, 16 December, 1993)
  81. Computer Evidence : Collection & Preservation (Networking Series) - Christopher LT Brown (2005-10-03, Paperback)
  82. Computer Forensics : An Essential Guide for Accountants, Lawyers, and Managers - Michael Sheetz (2007-02-26, Hardcover)
  83. Computer Forensics : Computer Crime Scene Investigation (Networking Series) (Networking Series) - John R Vacca (2005-05-27, Paperback)
  84. Computer Forensics : Evidence Collection and Management - Robert C. Newman (2007-03-09, Hardcover)
  85. Computer Forensics : Principles and Practices (Prentice Hall Security Series) - Linda Volonino (2006-08-21, Paperback)
  86. Computer Forensics and Cyber Crime : An Introduction - Marjie T. Britz (2003-08-01, Paperback)
  87. Computer Forensics JumpStart (Jumpstart (Sybex)) - Michael Solomon (2004-12-10, Paperback)
  88. Computer Fraud and Abuse Laws : An Overview of Federal Criminal Laws , by Charles Doyle (Paperback, October, 2002)
  89. Computer fraud perpetrated against small independent food retailers during the direct store delivery process. : An article from : Journal of Small Business Management , by Frank Harris , Linda Thiede Thomas (Digital, 28 July, 2005)
  90. Computer hacking and viruses on rise : An article from : Northern Colorado Business Report , by Amy Kegg (Digital, 09 September, 2005)
  91. Computer Insecurity : Risking the System , by Steven Furnell (Paperback, 30 September, 2005)
  92. Computer insecurity. (protecting against computer network crimes) (Issues in Focus : Communications for a New Century) : An article from : Issues in Science and Technology , by Peter G. Neumann (Digital, 28 July, 2005)
  93. Computer Network Security and Cyber Ethics , by Joseph Migga Kizza (Paperback, October, 2001)
  94. Computer Network Security and Cyber Ethics, 2d edition , by Joseph Migga Kizza (Paperback, 26 July, 2006)
  95. Computer networks under siege.(computer hackers)(Brief Article) : An article from : Fairfield County Business Journal , by Dan Strempel (Digital, 28 July, 2005)
  96. Computer Privacy Annoyances , by Dan Tynan (Paperback, 27 July, 2005)
  97. Computer Security , by John M., Carroll , Carroll (Hardcover, 05 March, 2007)
  98. Computer Security in The Workplace : A Quick And Simple Guide , by Michael P. Small & Ralph C. Burgess (Paperback, 17 December, 2004)
  99. Computers and Penal Legislation : A Study of the Legal Politics of a New Technology (CompLex) , by Stein Schjolberg (Paperback, April, 1984)
  100. Computing : A Hacker's Dictionary , by Henry Beard , Roy McKie (Paperback, November, 1999)
  101. Congress triples cyber security funding. (Up front : news, trends & analysis). : An article from : Information Management Journal , by Nikki Swartz (Digital, 30 July, 2005)
  102. Connectivity equals vulnerability. (Commentary).(avoiding viruses, hackers) : An article from : Arkansas Business , by Ted Clouser (Digital, 30 July, 2005)
  103. Contractor Admits Hackers Stole US Satellite Software.(Brief Article) : An article from : Wireless Satellite and Broadcasting Newsletter (Digital, 28 July, 2005)
  104. Convicted man says grade tampering rampant at Okla. college. (around the nation). : An article from : Community College Week (Digital, 30 July, 2005)
  105. Corporate Fraud , by Michael J. Comer (Hardcover, February, 1998)
  106. Costly callers : prosecuting voice mail fraud. (communication security) : An article from : Security Management , by William J. Cook (Digital, 13 April, 2005)
  107. Counter Hack : A Step-by-Step Guide to Computer Attacks and Effective Defenses - Ed Skoudis (2001-07-23, Paperback)
  108. Counter Hack Reloaded : A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (The Radia Perlman Series in Computer Networking and Security) , by Edward Skoudis , Tom Liston (Paperback, 23 December, 2005)
  109. Crackproof Your Software : Protect Your Software Against Crackers (With CD-ROM) , by Pavol Cerven (Paperback, October, 2002)
  110. Credit Unions Alert Members to Y2K Fraud.(Brief Article) : An article from : San Diego Business Journal , by Gary Devan (Digital, 28 July, 2005)
  111. Crime and Corruption in the Digital Age. : An article from : Journal of International Affairs , by Louise I. Shelley (Digital, 28 July, 2005)
  112. Crime and the Internet , by David Wall (Paperback, 21 December, 2001)
  113. Crime, Deviance and the Computer (International Library of Criminology, Criminal Justice and Penology) , by Richard C. Hollinger (Hardcover, March, 1997)
  114. Criminal law and criminology : A survey of recent books : An article from : Journal of Criminal Law & Criminology , by Bard R Ferrall (Digital, 02 September, 2005)
  115. Criminals' latest weapon of choice : keyboard replaces the gun as cybercrimes reach alarming rate.(Tracking Cybercrimes) : An article from : San Diego Business Journal , by Rene'e Beasley Jones (Digital, 31 July, 2005)
  116. Crisp : Preventing Workplace Violence : Positive Management Strategies (Fifty-Minute Series) , by Marianne Minor (Paperback, 01 August, 1994)
  117. Cyber-crime : The Challenge in Asia , by Roderic Broadhurst , Peter Grabosky (Hardcover, 31 March, 2005)
  118. Cyber-terrorism risk : An article from : Financial Executive , by Christopher Keegan (Digital, 13 September, 2005)
  119. Cyber Adversary Characterization : Auditing the Hacker Mind , by Tom Parker , Marcus Sachs , Eric Shaw , Ed Stroz , Matthew G. Devost (Paperback, June, 2004)
  120. Cyber Alert : How the World Is Under Attack from a New Form of Crime , by Peter Warren , Michael Streeter (Paperback, 01 July, 2005)
  121. Cyber crime doesn't pay : An article from : Boys' Life , by Melissa Abramovitz (Digital, 02 September, 2005)
  122. Cyber Crime Investigations : Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors , by Anthony Reyes , Richard Brittson , Kevin O'Shea , Jim Steel (Paperback, 26 February, 2007)
  123. Cyber Crime Investigator's Field Guide, Second Edition - Bruce Middleton (2004-07-15, Hardcover)
  124. Cyber Criminals on Trial , by Russell G. Smith , Peter Grabosky , Gregor Urbas (Hardcover, 25 October, 2004)
  125. Cyber Forensics : A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes , by Jr., Albert J. Marcella , Robert S. Greenfield (Paperback, 23 January, 2002)
  126. Cyber technology extends a bully's reach.(Behavioral Pediatrics) : An article from : Pediatric News , by Heidi Splete (Digital, 25 July, 2005)
  127. Cyber Terrorism : Political And Economic Implications , by Andrew M. Colarik (Hardcover, 31 January, 2006)
  128. Cyber Threats and Information Security : Meeting the 21st Century Challenge (Csis Report) , by Frank J. Cilluffo , Sharon L. Cardash , Michele Ledgerwood , Arnaud De Borchgrave , Csis Homeland Defense Project (Paperback, 21 May, 2001)
  129. Cyber Warfare and Cyber Terrorism , by Lech J. Janczewski , Andrew M. Colarik (Hardcover, 31 May, 2007)
  130. Cyberbullying : online bullying affects every school district.(The Online Edge) : An article from : District Administration , by Odvard Egil Dyrli (Digital, 20 December, 2005)
  131. Cyberbullying and Cyberthreats : Responding to the Challenge of Online Social Aggression, Threats, and Distress - Nancy E. Willard (2007-01-18, Perfect Paperback)
  132. Cybercop targets the criminal code.(Brief Article)(Statistical Data Included) : An article from : Business North Carolina (Digital, 28 July, 2005)
  133. Cybercops : An article from : Law & Order , by Charles Rusnell (Digital, 09 September, 2005)
  134. Cybercrime , by George E. Curtis (Hardcover, 15 February, 2006)
  135. Cybercrime : A Reference Handbook (Contemporary World Issues) , by Clemens Martin , Bernadette Schell , Mildred Vasan (Hardcover, 18 October, 2004)
  136. Cybercrime : Digital Cops in a Networked Environment (Ex Machina : Law, Technology, and Society) - J. M. Balkin (2007-03-01, Paperback)
  137. Cybercrime : How to Avoid Becoming a Victim , by H. Thomas Milhorn (Paperback, 26 March, 2007)
  138. Cybercrime : Law Enforcement, Security and Surveillance in the Information Age , by Brian Loader , Douglas Thomas (Paperback, 08 June, 2000)
  139. Cybercrime : Security and Surveillance in the Information Age , by Brian Loader , Thomas Douglas (Library Binding, 13 June, 2000)
  140. Cybercrime : The Investigation, Prosecution and Defense of a Computer-Related Crime - Darlene Demelo Moreau (2006-03-30, Paperback)
  141. Cybercrime : The Transformation of Crime in the Information Age (Crime and Society) , by David Wall (Hardcover, 01 September, 2007)
  142. Cybercrime : where is the outrage?(Tech Talk) : An article from : National Underwriter Life & Health , by Ara C. Trembly (Digital, 18 April, 2005)
  143. Cybercrime and Cyberterrorism : Current Issues , by John V. Blane (Paperback, December, 2003)
  144. Cybercrime and Security (3-Binder Set) , by Alan E. Brill , Fletcher N. Baldwin , Robert John Munro (Ring-bound, 30 September, 1998)
  145. Cybercrime and Society , by Majid Yar (Paperback, 01 June, 2006)
  146. Cybercrime causes chaos : An article from : Law & Order , by Tom Rataj (Digital, 09 September, 2005)
  147. Cybercrime insurance may be coming to a business near you : An article from : The Mississippi Business Journal , by Lynn Lofton (Digital, 15 September, 2005)
  148. Cybercrime soars. (Up Front : news, trends & analysis).(Computer Crime and Security Survey)(Brief Article)(Statistical Data Included) : An article from : Information Management Journal (Digital, 30 July, 2005)
  149. Cybercrimes, Criminal Justice and the Internet : The Transformation of Crime in the Information Age (Crime and Society) , by David Wall (Paperback, 01 March, 2007)
  150. Cyberfraud and Computer Crime. : An article from : Strategic Finance , by Glenn Cheney (Digital, 28 July, 2005)
  151. CyberNation : Tom Clancy's Net Force #6 (Audio Download, ..)
  152. CYBERPUNK : Outlaws and Hackers on the Computer Frontier, Revised - Katie Hafner (1995-11-01, Paperback)
  153. CYBERPUNKS.(the new breed of computer hackers) : An article from : New York Times Upfront , by John Markoff (Digital, 28 July, 2005)
  154. Cybershock : Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption , by Winn Schwartau (Paperback, 30 March, 2001)
  155. Cyberspace Crime (International Library of Criminology, Criminal Justice & Penology.) , by David S. Wall (Hardcover, June, 2003)
  156. Cyberstalking : Harassment in the Internet Age and How to Protect Your Family , by Paul Bocij (Hardcover, 30 March, 2004)
  157. Cyberswindle! (computer hacking) : An article from : Chief Executive (U.S.) , by Joseph L. McCarthy (Digital, 28 July, 2005)
  158. Cyberterrorism can be avoided. (Technology).(computer crime safety and security ) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Roger Crombie (Digital, 30 July, 2005)
  159. Cyberwarriors.(hacktivism, electrohippies) : An article from : Harvard International Review , by Dorothy Denning (Digital, 28 July, 2005)
  160. Cyberwars : Espionage on the Internet , by Jean Guisnel , Gui Masai , Winn Schwartau (Paperback, January, 2000)
  161. Dangerous Decisions : Problem Solving in Tomorrow's World , by Enid Mumford , E. Mumford (Paperback, 08 March, 2006)
  162. Data Mining and Predictive Analysis : Intelligence Gathering and Crime Analysis , by Colleen McCue (Paperback, 01 May, 2007)
  163. Defeating the Hacker : A non-technical guide to computer security , by Robert Schifreen (Hardcover, 05 May, 2006)
  164. Defensa Contra Hackers - Guia Practica , by Richard Mansfield (Paperback, March, 2001)
  165. Defrauding America, Vol. One 4th ed. , by Rodney Stich (Digital, ..)
  166. Designing BSD Rootkits : An Introduction to Kernel Hacking - Joseph Kong (2007-04-10, Paperback)
  167. Digital Crime : An article from : TELEMASP Bulletin , by Karon Murff (Digital, 31 October, 2005)
  168. Digital Crime and Digital Terrorism - Robert W. Taylor (2005-03-01, Paperback)
  169. Digital Crime And Forensic Science in Cyberspace (N/A) , by Panagiotis Kanellis , Evangelos Kiountouzis , Nicholas Kolokotronis , Drakoulis Martakos (Hardcover, 25 May, 2006)
  170. Digital Crime And Forensic Science in Cyberspace (N/A) , by Panagiotis Kanellis , Evangelos Kiountouzis , Nicholas Kolokotronis , Drakoulis Martakos (Paperback, 25 May, 2006)
  171. Digital detectives : companies turn to cybersleuths to protect their assets from an online black market. (Technology).(selling counterfeit products on the ... : An article from : Chief Executive (U.S.) , by Daniel Tynan (Digital, 31 July, 2005)
  172. Digital Evidence and Computer Crime : Forensic Science, Computers, and the Internet : An article from : FBI Law Enforcement Bulletin , by Matt Parsons (Digital, 12 September, 2005)
  173. Digital Evidence and Computer Crime, Second Edition - Eoghan Casey (2004-03-08, Hardcover)
  174. Digital Photography Hacks : 100 Industrial-Strength Tips & Tools - Derrick Story (2004-05, Paperback)
  175. DISK DETECTIVE - Secrets You Must Know to Recover Information from a Computer , by Norbert Zaenglein (Paperback, 01 September, 1998)
  176. DON CIP : a comprehensive solution to improve cyber and physical security of DON critical assets.(Department of the Navy Critical Infrastructure Protection) : An article from : CHIPS , by Donald Reiter (Digital, 25 July, 2005)
  177. Dot.Cons : Crime, Deviance and Identity on the Internet , by Yvonne Jewkes (Hardcover, 01 December, 2002)
  178. Dot.Cons : Crime, Deviance and Identity on the Internet , by Yvonne Jewkes (Paperback, December, 2002)
  179. Drug cartels, criminal orgainizations increase use of advanced technology : An article from : Organized Crime Digest , by Anonymous (Digital, 02 September, 2005)
  180. E-Commerce Security : Advice from Experts (IT Solutions series) , by Lawrence Oliva , Mehdi Khosrow-Pour (Paperback, 01 April, 2004)
  181. E-mail Content Poses Serious Risks.(Brief Article) : An article from : Security Management (Digital, 01 June, 2005)
  182. E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks , by Syngress Media Inc , Brian Bagnall , Syngress Publishing , James Stanger (Paperback, 30 October, 2000)
  183. eBay Hacks, 2nd Edition : Tips & Tools for Bidding, Buying, and Selling - David A. Karp (2005-06-02, Paperback)
  184. eBay Secrets : How to create Internet auction listings that make 30% more money while selling every item you list , by Steven Ellis White , Bryon Krug (Digital, 01 July, 2004)
  185. Economic Espionage and Industrial Spying (Cambridge Studies in Criminology) - Hedieh Nasheri (2004-11-08, Hardcover)
  186. Economic Espionage and Industrial Spying (Cambridge Studies in Criminology) , by Hedieh Nasheri (Paperback, 06 December, 2004)
  187. Electronic Crime (Geis Master Series in Criminology) , by Peter Grabosky (Paperback, 27 September, 2006)
  188. Electronic Theft : Unlawful Acquisition in Cyberspace , by Peter Grabosky , Russell G. Smith , Gillian Dempsey (Hardcover, 27 August, 2001)
  189. Emergent Information Technologies and Enabling Policies for Counter-Terrorism (IEEE Press Series on Computational Intelligence) , by Robert L. Popp , John Yen (Hardcover, 05 June, 2006)
  190. EnCase Computer Forensics : The Official EnCE : EnCaseeCertified Examiner Study Guide - Steve Bunting (2006-02-20, Paperback)
  191. Enemy at the Water Cooler : Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures , by Brian Contos , Dave Kleiman (Paperback, 23 August, 2006)
  192. Enterprise Network Security Guidelines : Prevention and Response to Hacker Attacks , by Faulkner Information Services (Digital, 01 June, 2001)
  193. Enterprise Security : IT Security Solutions : Concepts, Practical Experiences, Technologies - (2006-03-10, Hardcover)
  194. Essential PHP Security - Chris Shiflett (2005-10-13, Paperback)
  195. Etoy : community hacktivism and art. : An article from : Parachute : Contemporary Art Magazine , by Bertrand Gauguet (Digital, 28 July, 2005)
  196. Excel Hacks : 100 Industrial-Strength Tips and Tools - Raina Hawley (2004-03-01, Paperback)
  197. Exploiting Software : How to Break Code (Addison-Wesley Software Security Series) - Greg Hoglund (2004-02-17, Paperback)
  198. Exploring Social Issues : Using SPSS for Windows 95 Versions 7.5, 8.0, or Higher , by Joseph F. Healey , John Boli , Earl R. (Robert) Babbie , Fred S. Halley (Paperback, 25 September, 1998)
  199. Extreme Exploits : Advanced Defenses Against Hardcore Hacks (Hacking Exposed) - Victor Oppleman (2005-07-18, Paperback)
  200. Fake : Forgery, Lies, & eBay - Kenneth Walton (2007-05-08, Paperback)
  201. FBI to Industry : Share Your Pain.(report computer crime)(Brief Article) : An article from : Security Management (Digital, 28 July, 2005)
  202. Fear and loathing on the Internet. (Tech Talk).(international policy on racism and xenophobia on the Internet)(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 30 July, 2005)
  203. Fighting Back Against Online Predators.(Brief Article) : An article from : Security Management , by Dequendre Neeley (Digital, 28 July, 2005)
  204. Fighting Computer Crime : A New Framework for Protecting Information , by Donn B. Parker (Paperback, 27 August, 1998)
  205. Filtering debate affects businesses : An article from : Central Penn Business Journal , by John F III Haser (Digital, 12 September, 2005)
  206. Filtering out problems : e-mail spam and scams often infuriate corporate computer users. A surprisingly easy and effective solution, however, is the e- ... ticle) : An article from : Security Management , by Peter Piazza (Digital, 17 April, 2005)
  207. Financial computer intrusions recorded. (Tech Talk).(by US Treasury)(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 01 June, 2005)
  208. Firewall Architecture for the Enterprise , by Norbert Pohlmann , Tim Crothers (Paperback, 08 July, 2002)
  209. Firewalls and Internet Security : Repelling the Wily Hacker (2nd Edition) (Addison-Wesley Professional Computing Series) - William R. Cheswick (2003-02-24, Paperback)
  210. Florida Memorial Workers Accused of Changing Grades For Cash, Sex : An article from : Diverse Issues in Higher Education , by Anonymous (Digital, 19 September, 2005)
  211. Foiling Internet Hackers Provides Full-Time Jobs.(Brief Article) : An article from : Arkansas Business , by Jon Parham (Digital, 28 July, 2005)
  212. Forensic Computer Crime Investigation (Forensic Science) - (2005-09-19, Hardcover)
  213. Forensic Computing : A Practitioner's Guide (Practitioner Series) - A J Sammes (2000-09-15, Paperback)
  214. Forensic Discovery (Addison-Wesley Professional Computing Series) - Dan Farmer (2004-12-30, Hardcover)
  215. FOUR OUT OF TEN SOFTWARE PROGRAMS ARE PIRATED WORLDWIDE. : An article from : Software Industry Report (Digital, 30 July, 2005)
  216. Freeware Encryption and Security Programs : Protecting Your Computer and Your Privacy , by Michael Chesbro (Paperback, September, 2001)
  217. From Anarchy to Power The Net Comes of Age , by Wendy Grossman (Hardcover, 01 April, 2001)
  218. Gartner Survey : Retail Internet Fraud Is Twelve Times Higher Than Offline Fraud.(Industry Trend or Event) : An article from : EDP Weekly's IT Monitor (Digital, 01 June, 2005)
  219. Geek House : 10 Hardware Hacking Projects for Around Home (ExtremeTech) - Barry Press (2005-05-06, Paperback)
  220. Geeks On Call Security and Privacy : 5-Minute Fixes (Geeks on Call) , by Geeks On Call (Paperback, 19 December, 2005)
  221. Gender, Ethics And Information Technolgy , by Alison Adam (Hardcover, 12 May, 2005)
  222. Getting personal : identity thieves are everywhere. But the good guys are, too.(IT Security) : An article from : Computer User , by Elizabeth Millard (Digital, 31 July, 2005)
  223. Giving hackers the green light.(Tech Talk) : An article from : Security Management , by Peter Piazza (Digital, 18 April, 2005)
  224. Google Hacking for Penetration Testers, Volume 1 - Johnny Long (2005-02-06, Paperback)
  225. Google Maps Hacks - Rich Gibson (2006-01-17, Paperback)
  226. Google Talking , by Joshua Brashars , Johnny Long (Paperback, 28 November, 2006)
  227. Government infosec gets failing grade. (Tech Talk).(House Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations ... : An article from : Security Management , by Peter Piazza (Digital, 01 June, 2005)
  228. Gray Hat Hacking : The Ethical Hacker's Handbook - Shon Harris (2004-11-09, Paperback)
  229. Gray Hat Hacking, Second Edition , by Shon Harris , Allen Harper , Chris Eagle , Jonathan Ness (Paperback, 24 December, 2007)
  230. Guide to Computer Forensics and Investigations Third Edition , by Bill Nelson , Amelia Phillips , Frank Enfinger , Christopher Steuart (Paperback, 15 October, 2007)
  231. Hack Attacks Denied : A Complete Guide to Network Lockdown for UNIX, Windows, and Linux, Second Edition , by John Chirillo (Paperback, 06 September, 2002)
  232. Hack Attacks Revealed : A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second Edition - John Chirillo (2002-08-21, Paperback)
  233. Hack Attacks Testing : How to Conduct Your Own Security Audit - John Chirillo (2002-11-06, Paperback)
  234. Hack I.T. : Security Through Penetration Testing - T. J. Klevinsky (2002-02, Paperback)
  235. Hack Proofing ColdFusion , by Steve Casco , Rob Rusher , Greg Meyer , Sarge , David Vaccaro , David An (Paperback, April, 2002)
  236. Hack Proofing Linux : A Guide to Open Source Security , by James Stanger , Patrick T. Lane (Paperback, 10 July, 2001)
  237. Hack Proofing Sun Solaris 8 , by Randy Cook , Ido Dubrawsky , F. Williams Lynch , Ed Mitchell , Wyman Miles , F. William Lynch (Paperback, 15 October, 2001)
  238. Hack Proofing Your Identity , by Teri Bidwell (Paperback, 15 June, 2002)
  239. Hack Proofing Your Network (Second Edition) - Dan Kaminsky (2002-03, Paperback)
  240. Hack Proofing Your Network , by Ryan Russell , Caezar , Dan Kaminsky (Digital, 06 April, 2006)
  241. Hack the Stack : Using Snort and Ethereal to Master the 8 Layers of an Insecure Network - Michael Gregg (2006-10-17, Paperback)
  242. Hacked, Attacked, Abused , by Peter Lilley (Paperback, 22 January, 2003)
  243. Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios - (2001-10-18, Paperback)
  244. Hacker's Challenge 2 : Test Your Network Security & Forensic Skills , by Mike Schiffman , Bill Pennington , David Pollino , Adam J. O'Donnell (Paperback, 18 December, 2002)
  245. Hacker's Challenge 3 - David Pollino (2006-04-25, Paperback)
  246. Hacker's Delight - Henry S. Warren Jr. (2002-07-17, Hardcover)
  247. Hacker's Father Had False Sense of Security.(Brief Article) : An article from : Community College Week (Digital, 28 July, 2005)
  248. Hacker's Guide to Project Management, Second Edition (COMPUTER WEEKLY PROFESSIONAL) (Computer Weekly Professional) , by Andrew Johnston (Paperback, February, 2003)
  249. Hacker's Guide to Visual FoxPro 6.0 , by Tamar Granor , Ted Roche , Doug Hennig (Paperback, October, 1998)
  250. Hacker's Guide to Visual FoxPro 7.0 - Ted Roche (2002-01, Paperback)
  251. Hacker's Tales : Stories from the Electronic Front Line , by Dr K (Paperback, 01 April, 2004)
  252. Hacker-resistant software launched. (IT Strategies).(Datateck Inc.)(Brief Article) : An article from : Northern Ontario Business , by Leslie Sanders (Digital, 01 June, 2005)
  253. Hacker Attacks Spur Web Liability Products.(liability insurance for dot-com companies) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by AMANDA LEVIN (Digital, 14 April, 2005)
  254. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace - David Chanoff (2003-12-01, Paperback)
  255. Hacker Culture - Douglas Thomas (2003-06, Paperback)
  256. Hacker Debugging Uncovered (Uncovered series) , by Kris Kaspersky (Paperback, 01 June, 2005)
  257. Hacker Disassembling Uncovered (Uncovered series) - Kris Kaspersky (2007-02-01, Paperback)
  258. Hacker Linux Uncovered , by Michael Flenov (Paperback, 01 November, 2005)
  259. Hacker Proof (General Interest) , by Kris Jamsa , Lars Klander (Paperback, 01 February, 2002)
  260. Hacker Web Exploitation Uncovered , by Marsel Nizamutdinov (Paperback, 28 June, 2005)
  261. Hacker, 2006 (La Biblia De / the Bible of...) , by Abel Mariano Matas Garcia , Carlos Miguez Perez , Justo Perez Agudin , Fernando Picouto Ramos , Antonio Angel Ramos Varon (Hardcover, November, 2005)
  262. Hackers , by Paul Taylor (Library Binding, September, 1999)
  263. Hackers : Crime in the Digital Sublime , by Paul Taylor (Paperback, 03 November, 1999)
  264. Hackers : Heroes of the Computer Revolution , by Steven Levy , Steven Levy (Paperback, 02 January, 2001)
  265. Hackers : should agents worry?(Q&A) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management (Digital, 31 July, 2005)
  266. Hackers 19 , by Adam O' Donnell , Bill Pennington , David Pollino (Paperback, October, 2003)
  267. Hackers 2 - Secretos y Soluciones Para La Segurida , by Stuart McClure (Paperback, June, 2001)
  268. Hackers and other hazards : An article from : Financial Executive , by Emily Q Freeman (Digital, 02 September, 2005)
  269. Hackers and Painters : Big Ideas from the Computer Age - Paul Graham (2004-05, Hardcover)
  270. Hackers Beware : The Ultimate Guide to Network Security - Eric Cole (2001-08-13, Paperback)
  271. Hackers de Java y J2ee Intermedio - Avanzado , by Brian Buege , Randy Layman , Art Taylor (Paperback, September, 2003)
  272. Hackers de Sitios Web , by Joel Scambray (Paperback, November, 2003)
  273. Hackers En Linux , by Brian Hatch (Paperback, February, 2003)
  274. Hackers threaten suicide attacks : An article from : The World Today , by Giles Trendle (Digital, 13 September, 2005)
  275. Hackers, viruses the ruin of some careless companies. (Focus Telecommunications).(what businesses should do)(Brief Article) : An article from : Mississippi Business Journal , by Elizabeth Kirkland (Digital, 30 July, 2005)
  276. Hacking : The Art of Exploitation - Jon Erickson (2003-10, Paperback)
  277. Hacking a Terror Network : The Silent Threat of Covert Channels , by Russ Rogers (Paperback, 01 December, 2004)
  278. Hacking BlackBerry : ExtremeTech - Glenn Bachmann (2006-10-30, Paperback)
  279. Hacking con Google/ Hacking with Google (Hackers Y Seguridad / Hackers and Security) , by Johnny Long (Paperback, 30 June, 2005)
  280. Hacking Cyberspace , by David J. Gunkel (Paperback, 15 February, 2001)
  281. Hacking del.icio.us (ExtremeTech) , by Leslie M. Orchard (Paperback, 12 July, 2006)
  282. Hacking Digital Cameras (ExtremeTech) - Chieh Cheng (2005-09-23, Paperback)
  283. Hacking etico / Gray Hat Hacking (Hackers & Seguridad / Hackers and Security) , by Shon Harris , Allen Harper , Chris Eagle , Jonathan Ness , Michael Lester (Paperback, 30 June, 2005)
  284. Hacking Exposed 5th Edition (Hacking Exposed) - Stuart McClure (2005-04-19, Paperback)
  285. Hacking Exposed Cisco Networks (Hacking Exposed) - Andrew Vladimirov (2005-12-15, Paperback)
  286. Hacking Exposed Computer Forensics (Hacking Exposed) - Chris Davis (2004-11-22, Paperback)
  287. Hacking Exposed Linux (Hacking Exposed) , by ISECOM (Paperback, 01 January, 2008)
  288. Hacking Exposed Malware & Rootkits (Hacking Exposed) , by Thorsten Holz (Paperback, 01 December, 2007)
  289. Hacking Exposed VoIP : Voice Over IP Security Secrets & Solutions (Hacking Exposed) - David Endler (2006-11-28, Paperback)
  290. Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed) - Joel Scambray (2006-06-05, Paperback)
  291. Hacking Exposed Windows : Windows Security Secrets and Solutions, Third Edition (Hacking Exposed) - Joel Scambray (2007-11-28, Paperback)
  292. Hacking Exposed Wireless (Hacking Exposed) - Johnny Cache (2007-03-26, Paperback)
  293. Hacking Firefox : More Than 150 Hacks, Mods, and Customizations (ExtremeTech) - Mel Reyes (2005-08-05, Paperback)
  294. Hacking For Dummies (For Dummies (Computer/Tech)) - Kevin Beaver (2006-10-30, Paperback)
  295. Hacking GMail (ExtremeTech) - Ben Hammersley (2005-12-19, Paperback)
  296. Hacking GoogleMaps and GoogleEarth (ExtremeTech) - Martin C. Brown (2006-07-24, Paperback)
  297. Hacking GPS (ExtremeTech) - Kathie Kingsley-Hughes (2005-03-25, Paperback)
  298. Hacking iSeries , by Shalom Carmel (Paperback, 10 February, 2006)
  299. Hacking Knoppix (ExtremeTech) - Scott Granneman (2006-01-04, Paperback)
  300. Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations - Scott Knaster (2005-07-14, Paperback)
  301. Hacking Mobile Phones , by Ankit Fadia (Paperback, 07 December, 2005)
  302. Hacking Movable Type (ExtremeTech) , by Jay Allen , Brad Choate , Ben Hammersley , Matthew Haughey , Ben Trott , Mena Trott , David Raynes (Paperback, 22 July, 2005)
  303. Hacking MySpace : Mods and Customizations to make MySpace Your Space (ExtremeTech) - John Pospisil (2006-08-28, Paperback)
  304. Hacking MythTV (ExtremeTech) - Jarod Wilson (2006-08-28, Paperback)
  305. Hacking Openoffice.org : Tips, Tricks, And Untold Secrets , by Bruce Byfield (Paperback, 30 May, 2007)
  306. Hacking Photoshop CS2 , by Shangara Singh (Paperback, 21 October, 2005)
  307. Hacking Roomba : ExtremeTech - Tod E. Kurt (2006-11-20, Paperback)
  308. Hacking RSS and Atom - Leslie M. Orchard (2005-09-09, Paperback)
  309. Hacking the Cable Modem : What Cable Companies Don't Want You to Know - DerEngel (2006-09-10, Paperback)
  310. Hacking the Code : : ASP.NET Web Application Security , by Mark Burnett (Digital, 06 April, 2006)
  311. Hacking the Code : ASP.NET Web Application Security , by Mark Burnett (Paperback, May, 2004)
  312. Hacking the IT Cube : The Information Technology Department Survival Guide , by douglas Chick (Paperback, 01 January, 2006)
  313. Hacking the TiVo, 2nd Edition , by William von Hagen (Paperback, 31 July, 2004)
  314. Hacking TiVo : The Expansion, Enhancement and Development Starter Kit with CD-ROM - Jeff Keegan (2003-10, Paperback)
  315. Hacking Ubuntu : Serious Hacks Mods and Customizations (ExtremeTech) - Neal Krawetz (2007-04-16, Paperback)
  316. Hacking Vim : A Cookbook to get the Most out of the Latest Vim Editor - Kim Schulz (2007-05-25, Paperback)
  317. Hacking Web Services (Internet Series) - Shreeraj Shah (2006-08-02, Paperback)
  318. Hacking Windows Vista : ExtremeTech - Steve Sinchak (2007-05-29, Paperback)
  319. Hacking Windows XP (ExtremeTech) - Steve Sinchak (2004-08-06, Paperback)
  320. Hacking Wireless (Titulos Especiales) , by Andrew A. Vladimirov (Paperback, 30 September, 2005)
  321. Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)) - Kevin Beaver (2005-09-13, Paperback)
  322. Hackish C++ Pranks & Tricks , by Michael Flenov (Paperback, 01 November, 2004)
  323. Hackish PC Pranks & Cracks , by Michael Flenov (Paperback, 28 April, 2005)
  324. HackNotes(tm) Linux and Unix Security Portable Reference , by Nitesh Dhanjani (Paperback, 26 June, 2003)
  325. HackNotes(tm) Network Security Portable Reference , by Michael Horton , Clinton Mugge (Paperback, 25 July, 2003)
  326. HackNotes(tm) Web Security Pocket Reference - Mike Shema (2003-06-30, Paperback)
  327. HackNotes(tm) Windows Security Portable Reference , by Michael O'Dea (Paperback, 04 June, 2003)
  328. Hacktivism or Vandalism?(Brief Article) : An article from : Security Management , by Dequendre Neeley (Digital, 28 July, 2005)
  329. Halting the Hacker : A Practical Guide to Computer Security (With CD-ROM) , by Donald L. Pipkin (Paperback, 26 August, 2002)
  330. Handbook of Computer Crime Investigation : Forensic Tools & Technology - (2001-10-15, Paperback)
  331. Hands-On Ethical Hacking and Network Defense - Michael T. Simpson (2005-10-19, Paperback)
  332. Happy new year. (Looking Inside).(various news items)(Column) : An article from : Fairfield County Business Journal , by Ed Klein (Digital, 30 July, 2005)
  333. Hardening Cisco Routers (O'Reilly Networking) - Thomas Akin (2002-02, Paperback)
  334. Hardware Hacking : Have Fun While Voiding Your Warranty - Joe Grand (2004-01-01, Paperback)
  335. Hardware Hacking Projects for Geeks - Scott Fullam (2003-11-01, Paperback)
  336. Hide Your Assets and Disappear : A Step-by-Step Guide to Vanishing Without a Trace - Edmund Pankau (2000-04-25, Paperback)
  337. High-Tech Crimes Revealed : Cyberwar Stories from the Digital Front , by Steven Branigan (Paperback, 27 August, 2004)
  338. High-tech manufacturers assess theft stats. : An article from : Security Management , by Michael Gips (Digital, 28 July, 2005)
  339. Hire thine enemy?(how to prevent computer attacks) : An article from : Security Management , by Dequendre Neeley (Digital, 28 July, 2005)
  340. Holding Internet Service Providers accountable : would indirect liability reduce costly cyberspace externalities?(Telecommunications & Technology) : An article from : Regulation , by Douglas Lichtman (Digital, 21 July, 2005)
  341. Home Hacking Projects for Geeks (Hacks) , by Tony Northrup , Eric Faulkner (Paperback, 01 December, 2004)
  342. Home on the page. (News and Trends). : An article from : Security Management (Digital, 16 April, 2005)
  343. HOME ON THE PAGE.(brief notes security notes)(Brief Article) : An article from : Security Management , by Michael A. Gips (Digital, 28 July, 2005)
  344. Home Theater Hacks : 100 Industrial-Strength Tips & Tools (Hacks) - Brett McLaughlin (2004-11-22, Paperback)
  345. Honeypots : Tracking Hackers - Lance Spitzner (2002-09-10, Paperback)
  346. Host Integrity Monitoring Using Osiris and Samhain , by Brian Wotring , Bruce Potter , Marcus Ranum (Paperback, 01 May, 2005)
  347. How to avoid getting caught in the Net.(online security)(Statistical Data Included) : An article from : Canadian Manager , by Bill Ringle (Digital, 28 July, 2005)
  348. How to test usability. : An article from : Soft-Letter (Digital, 28 July, 2005)
  349. Human Behavior and the Social Environment : Shifting Paradigms in Essential Knowledge for Social Work Practice, Fourth Edition , by Joe M. Schriver (Hardcover, 07 November, 2003)
  350. Hurdles to Cyberjustice.(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 01 June, 2005)
  351. I-Way Robbery : Crime on the Internet , by William C. Boni , Gerald L. Kovacich (Paperback, 18 May, 1999)
  352. I CRAVE CONTROL.(Brief Article) : An article from : Sojourners , by David Batstone (Digital, 28 July, 2005)
  353. ID theft : keep your information to yourself; If it can be shown that you failed to take adequate steps to protect information on your computers, your employees ... : An article from : Rural Telecommunications , by Phillip M. Perry (Digital, 31 July, 2005)
  354. Identifying and Exploring Security Essentials - Mary Clifford (2003-10-03, Paperback)
  355. Identity Theft : Protecting Yourself From an Unprotected World (Financial Alert Series) , by Ethan Pope (Paperback, 01 May, 2006)
  356. Ignoring the new frontier. (Tech Talk).(attitudes of risk managers and IT managers to cybercrime)(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 01 June, 2005)
  357. IIS Security , by Marty Jost (Paperback, 29 July, 2002)
  358. Implementing Biometric Security - John Chirillo (2003-04-01, Paperback)
  359. Incident Response : Computer Forensics Toolkit - Douglas Schweitzer (2003-04-11, Paperback)
  360. Incident Response : Investigating Computer Crime - Chris Prosise (2001-06-21, Paperback)
  361. Incident Response and Computer Forensics, Second Edition , by Chris Prosise , Kevin Mandia , Matt Pepe (Paperback, 17 July, 2003)
  362. Information Assurance : Security in the Information Environment (Computer Communications and Networks) , by Andrew Blyth , Gerald L. Kovacich (Paperback, 07 March, 2006)
  363. Information Assurance : Surviving the Information Environment , by Andrew Blyth , Gerald L. Kovacich (Paperback, 02 October, 2001)
  364. Information Insecurity : A Survival Guide to the Uncharted Territories of Cyber-threats And Cyber-security (Ict Task Force Series) (Ict Task Force Series) , by Eduardo Gelbstein , Ahmad Kamal (Paperback, 31 July, 2005)
  365. Information Risk And Security : Preventing And Investigating Workplace Computer Crime , by Edward Wilding (Hardcover, 31 May, 2006)
  366. Information Security : A Guide to Protecting Your Information and Computer Systems from Hackers.(Review) (book review) : An article from : Security Management , by Karim H. Vellani (Digital, 01 June, 2005)
  367. Information Security Policies, Procedures, and Standards : Guidelines for Effective Information Security Management - Thomas R. Peltier (2001-12-20, Paperback)
  368. Information Technology Law , by Ian J. Lloyd (Paperback, 19 April, 2005)
  369. Information Warfare : Time to Prepare. : An article from : Issues in Science and Technology , by BRUCE BERKOWITZ (Digital, 15 April, 2005)
  370. Information Warfare Principles and Operations - Edward Waltz (1998-08, Hardcover)
  371. InfoSec Career Hacking : : Sell Your Skillz, Not Your Soul , by Aaron W. Bayles , Chris Hurley , Johnny Long , Ed Brindley , Chris Klaus (Digital, 06 April, 2006)
  372. Infosec Career Hacking : Sell Your Skillz, Not Your Soul - Aaron W. Bayles (2005-04-01, Paperback)
  373. Inside Internet Security : What Hackers Don't Want You To Know , by Jeff Crume (Paperback, 25 August, 2000)
  374. Inside the Mind of the Insider.(profiling employees for potential malicious behavior)(Statistical Data Included) : An article from : Security Management , by Eric D. Shaw , Jerrold M. Post , Keven G. Ruby (Digital, 28 July, 2005)
  375. Inside the SPAM Cartel , by Spammer-X , Jeffrey Posluns (Editor) , Stu Sjouwerman (Foreword) (Paperback, 09 November, 2004)
  376. Institute : most companies have cyber risk insurance gaps.(Agency Technology On The Cutting Edge) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Michael Ha (Digital, 01 June, 2005)
  377. Integralis warns of Hotspot vampires.(Business)(Brief Article) : An article from : The Mobile Internet (Boston, MA) (Digital, 01 June, 2005)
  378. Intellectual Property and Computer Crimes (Intellectual Property Law and Business Crimes Series) , by Peter Toren (Hardcover, July, 2003)
  379. Intelligence and Security Informatics : First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings (Lecture Notes in Computer Science) , by Hsinchun Chen , Richard Miranda , Daniel D. Zeng , Chris Demchak , Therani Madhusudan (Paperback, 05 August, 2003)
  380. Intelligence and Security Informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, ... (Lecture Notes in Computer Science) , by Paul Kantor , Gheorghe Muresan , Fred Roberts , Daniel Zeng , Frei-Yue Wang , Hsinchun Chen , Ralph Merkle (Paperback, 05 August, 2005)
  381. Intelligence and Security Informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Lecture Notes in Computer Science) , by Sharad Mehrotra , Daniel D. Zeng , Hsinchun Chen (Paperback, June, 2006)
  382. INTERMEDIA DEBUTS INTERNET SECURITY OFFERINGS.(Company Business and Marketing) : An article from : Computer Security Update (Digital, 15 April, 2005)
  383. International Guide to Combating Cybercrime , by Jody Westby (Paperback, 25 February, 2003)
  384. International Guide to Cyber Security , by Jody R. Westy (Paperback, 25 April, 2005)
  385. Internet Besieged , by Dorothy E. Denning , Peter J. Denning (Paperback, 03 October, 1997)
  386. Internet Denial of Service : Attack and Defense Mechanisms (The Radia Perlman Series in Computer Networking and Security) - Jelena Mirkovic (2004-12-30, Paperback)
  387. Internet Forensics - Robert Jones (2005-10-07, Paperback)
  388. Internet Predator , by Karl Schwartz (Paperback, June, 1999)
  389. Internet Safety Parents' Guide , by Victoria Roddel (Paperback, 31 July, 2006)
  390. Internet Scams : What to Be Afraid of in Cyberspace , by Bryan Joyce (Paperback, July, 2001)
  391. Internet Security : Hacking, Counterhacking ,and Security , by Kenneth Einar Himma (Paperback, 15 October, 2006)
  392. Internet startup company draws FBI investigation : An article from : Northwest Arkansas Business Journal , by Mark Friedman (Digital, 13 September, 2005)
  393. Internet startup company draws FBI investigation. (Technology).(CSI Group L.L.C. ) : An article from : Arkansas Business , by Mark Friedman (Digital, 17 April, 2005)
  394. Internet Underground : The Way of the Hacker , by Mad Macz (Paperback, 01 January, 2002)
  395. Intrusion detection : the need for a security triangle. (What Businesses Can do to Ward off Internet Attacks). : An article from : San Diego Business Journal , by Mark Bonsack (Digital, 31 July, 2005)
  396. Intrusion Detection and Prevention , by Carl Endorf , Gene Schultz , Jim Mellander (Paperback, 18 December, 2003)
  397. Intrusion Detection in Distributed Systems : An Abstraction-Based Approach (Advances in Information Security) , by Peng Ning , Sushil Jajodia , Xiaoyang Sean Wang (Hardcover, 31 October, 2003)
  398. Invasion of Privacy : How to Protect Yourself in the Digital Age , by Michael Hyatt (Hardcover, 18 April, 2001)
  399. Invasion of Privacy! Big Brother and the Company Hackers , by Michael Weber (Paperback, 11 November, 2003)
  400. Invasion of the data snatchers. (IT Security). : An article from : Computer User , by Maggie Biggs (Digital, 31 July, 2005)
  401. Investigating Computer-Related Crime , by Peter Stephenson (Hardcover, 28 September, 1999)
  402. Investigating Computer Crime (Crc Series in Practical Aspects of Criminal and Forensic Investigations) , by Franklin Clark , Ken Diliberto (Hardcover, 11 July, 1996)
  403. Investigating Computer Crime In The 21st Century , by Ronald L. Mendell (Paperback, December, 2004)
  404. Investigating Computer Crime In The 21st Century : Investigating Computer Crime In The Twenty-first Century , by Ronald L. Mendell (Hardcover, January, 2005)
  405. Investigating High-Tech Crime , by Michael Knetzger , Jeremy Muraski (Paperback, 09 February, 2007)
  406. Investigating Internet fraud : An article from : Law & Order , by Philip Martin (Digital, 12 September, 2005)
  407. Investigations in the Workplace - CPP, CFE, PCI, Eugene F. Ferraro (2005-07-15, Hardcover)
  408. Investigative Data Mining for Security and Criminal Detection, First Edition - Jesus Mena (2003-01-31, Paperback)
  409. Invisible Threats : Financial and Information Technology Crimes and National Security, Volume 10 NATO Security through Science Series : Human and Societal Dynamics (Nato Security Through Science) , by U. Gori , I. Paparela (Hardcover, 01 September, 2006)
  410. Is the Internet just a web of misinformation? : An article from : Security Management , by Ronald L. Mendell (Digital, 28 July, 2005)
  411. Is your business safe from computer hackers? Five steps for keeping unwanted 'visitors' at bay. (Special Report : Office Tech). : An article from : San Diego Business Journal , by William Ray (Digital, 30 July, 2005)
  412. Is your Web site a hacker's delight?(includes related article on policy pointers) : An article from : Security Management , by Michael A. Gips (Digital, 28 July, 2005)
  413. J2EE & Java : Developing Secure Web Applications with Java Technology (Hacking Exposed) - Art Taylor (2002-09-24, Paperback)
  414. Jeffrey R. Bedser sheds light on the world of Internet crime and the cybersleuths who track it : An article from : Business News New Jersey , by Anonymous (Digital, 02 September, 2005)
  415. JUDGE DEMANDS DOCUMENTS ON FBI COMPUTER SPY SYSTEM. : An article from : EDP Weekly's IT Monitor (Digital, 28 July, 2005)
  416. JUDICIAL DECISIONS.(multiple articles) : An article from : Security Management , by Teresa Anderson (Digital, 28 July, 2005)
  417. Keep your computer system safe. : An article from : Arkansas Business (Digital, 01 August, 2005)
  418. Keeping Hackers Away with Firewalls.(Brief Article)(Buyers Guide) : An article from : Campaigns & Elections , by Reid Goldsborough (Digital, 28 July, 2005)
  419. Kerr's Computer Crime Law : (American Casebook Series) (American Casebook Series) - Orin S. Kerr (2006-10-04, Hardcover)
  420. Killer app turns homicidal. (Tech Forum).(getting rid of junk e-mail) : An article from : Strategic Finance , by Michael Castelluccio (Digital, 30 July, 2005)
  421. Kismet Hacking - Brad Haines (2007-11-16, Paperback)
  422. Knoppix Hacks : 100 Industrial-Strength Tips and Tools - Kyle Rankin (2004-10-25, Paperback)
  423. Know Your Enemy : Learning about Security Threats (2nd Edition) , by Honeynet Project The (Paperback, 17 May, 2004)
  424. Laguna , by Jack Walters (Digital, ..)
  425. LAN Switch Security : What Hackers Know About Your Switches (Networking Technology : Security) - Eric Vyncke (2007-09-06, Paperback)
  426. Latest fraud : Crooks creating clones of bank websites.(Marketing News) : An article from : Bank Marketing (Digital, 18 April, 2005)
  427. Latest piracy statistics show problem is worldwide and deeply rooted. (software piracy) : An article from : Software Industry Report (Digital, 01 June, 2005)
  428. Law in Cyber Space , by Commonwealth Secretariat (Paperback, 15 December, 2001)
  429. Law on the Electronic Frontier : Hume Papers on Public Policy 2.4 (Hume Papers on Public Policy, Vol 2, No 4) , by Hector MacQueen , M. Simpson (Paperback, June, 1995)
  430. Liability floats downstream. (Tech Talk).(legal issues of computer crimes in business)(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 30 July, 2005)
  431. Linksys WRT54G Ultimate Hacking - Paul Asadoorian (2007-05-15, Paperback)
  432. Linux Desktop Hacks : Tips & Tools for Customizing and Optimizing your OS (Hacks) - Nicholas Petreley (2005-03-28, Paperback)
  433. Linux Multimedia Hacks : Tips & Tools for Taming Images, Audio, and Video (Hacks) , by Kyle Rankin (Paperback, 17 November, 2005)
  434. Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting (Hacks) - William von Hagen (2005-12-22, Paperback)
  435. Linux System Programming : Talking Directly to the Kernel and C Library - Robert Love (2007-09-15, Paperback)
  436. Locking up open systems. (Computer Security) : An article from : Security Management , by Paul Crawford (Digital, 13 April, 2005)
  437. Low-tech Users Threaten Financial Sector Systems : An article from : The Internal Auditor , by T McCollum (Digital, 14 September, 2005)
  438. Mac OS X : Los Mejores Trucos , by Rael Dornfest , Kevin Hemenway (Paperback, 20 March, 2003)
  439. MAKE : Technology on Your Time Vol. 1 (Make : Technology on Your Time) , by Mark Frauenfelder (Paperback, 08 February, 2005)
  440. MAKE : Technology on Your Time Volume 05 (Make : Technology on Your Time) - Mark Frauenfelder (2006-02-09, Paperback)
  441. Make : Technology on Your Time, Vol. 2 - Mark Frauenfelder (2005-05-05, Paperback)
  442. Make punishment fit the crime.(Brief Article)(Editorial) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management (Digital, 17 April, 2005)
  443. Malware : Fighting Malicious Code - Ed Skoudis (2003-11-09, Paperback)
  444. Managerial Guide for Handling Cyber-Terrorism and Information Warfare , by Lech Janczewski , Andrew M. Colarik (Hardcover, March, 2005)
  445. Managerial Guide for Handling Cyber-Terrorism and Information Warfare , by Lech Janczewski , Andrew M. Colarik (Paperback, March, 2005)
  446. Managing A Network Vulnerability Assessment , by Thomas R. Peltier , Justin Peltier , John A. Blackley (Paperback, 28 May, 2003)
  447. Mapping Hacks : Tips & Tools for Electronic Cartography , by Schuyler Erle , Rich Gibson , Jo Walsh (Paperback, 09 June, 2005)
  448. Masters of Deception : The Worldwide White-Collar Crime Crisis and Ways to Protect Yourself , by Louis R. Mizell (Paperback, October, 1996)
  449. Matching wits against bits.(includes related articles on devices used to examine system audit logs and types of computer crimes)(prevention of computer ... : An article from : Security Management , by Ronald L. Mendell (Digital, 28 July, 2005)
  450. Maximum PC Guide to Extreme PC Mods , by Paul Capello , Jon Phillips (Paperback, 17 December, 2004)
  451. Maximum Security, Fourth Edition - Various (2002-12-16, Paperback)
  452. Members only. (controlling access to computer rooms) (special section - Computer-Information Security : Getting the Protection You Need) : An article from : Security Management , by Richard Pritzker (Digital, 28 July, 2005)
  453. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research , by James C Foster (Paperback, 01 November, 2006)
  454. Microsoft Takes Legal Action to Prevent Piracy.(along with Better Business Bureau)(Brief Article)(Statistical Data Included) : An article from : San Diego Business Journal , by Gig Patta (Digital, 28 July, 2005)
  455. Mission-Critical Security Planner : When Hackers Won't Take No for an Answer , by Eric Greenberg (Digital, ..)
  456. Mission-Critical Security Planner : When Hackers Won't Take No for an Answer , by Greenberg , Eric Greenberg (Paperback, 01 February, 2001)
  457. More disaster planning needed. (computer disaster recovery : Automation Update) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Eli, Jr. Dabich (Digital, 28 July, 2005)
  458. MSU co-directing new Critical Infrastructure Protection Center.(Focus Tech Report 2.2) : An article from : Mississippi Business Journal , by Becky Gillette (Digital, 31 July, 2005)
  459. Music Piracy and Crime Theory (Criminal Justice : Recent Scholarship) , by Sameer Hinduja (Hardcover, 20 November, 2005)
  460. Must insurers pay cash for ATM theft? (The FC&S Answer).(stealing of actual machine) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Bruce Hillman (Digital, 16 April, 2005)
  461. Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security) , by Neil Archibald , Gilbert Ramirez , Noam Rathaus , Josh Burke , Brian Caswell , Renaud Deraison (Paperback, 01 August, 2005)
  462. Net Crimes & Misdemeanors : Outmaneuvering Web Spammers, Stalkers, and Con Artists - J. A. Hitchcock (2006-05-15, Paperback)
  463. Net.Wars , by Wendy M. Grossman (Hardcover, 01 January, 1998)
  464. Netspionage : The Global Threats to Information , by William C. Boni , Gerald L. Kovacich (Paperback, September, 2000)
  465. Network hackers : the hidden threats. : An article from : Club Management , by Bill Boothe (Digital, 31 July, 2005)
  466. Network Security : A Hacker's Perspective , by Ankit Fadia (Paperback, 18 December, 2002)
  467. Network Security : A Hacker's Perspective, , by Ankit Fadia (Paperback, 10 May, 2006)
  468. Network Security and Ethical Hacking , by Rajat, Khare (Paperback, 01 November, 2006)
  469. Network Security for Dummies - Chey Cobb (2002-10-10, Paperback)
  470. Network Security Hacks , by Andrew Lockhart (Paperback, 01 April, 2004)
  471. Network Security in the Workplace. : An article from : Alaska Business Monthly , by Colleen Madonna Flood Williams (Digital, 28 July, 2005)
  472. Network Security Tools : Writing, Hacking, and Modifying Security Tools , by Nitesh Dhanjani , Justin Clarke (Paperback, 04 April, 2005)
  473. New technology aiding battle against auto fraud. : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by J. Laurence Costin (Digital, 28 July, 2005)
  474. Nightwork : A History of Hacks and Pranks at MIT - Institute Historian T. F. Peterson (2003-03-14, Paperback)
  475. Nimda worm may be peaking, hard to track. : An article from : Federal Computer Market Report (Digital, 28 July, 2005)
  476. NIST releases raft of resources. (Tech Talk).(National Institute of Standards and Technology)(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 16 April, 2005)
  477. Of 'Phrack' and freedom. (computer-distributed newspaper 'Phrack' gagged by government) (Special Issue) : An article from : Columbia Journalism Review , by Mark Leccese (Digital, 28 July, 2005)
  478. On patrol in cyberspace : a look at progress among local, state, and federal efforts to combat cybercrime, including credit card fraud and identity theft. ... : An article from : Security Management , by Peter Piazza (Digital, 31 July, 2005)
  479. ONAIR.COM DEBUTS ERL STREAMING SECURITY.(Company Business and Marketing) : An article from : Computer Security Update (Digital, 01 June, 2005)
  480. OPEN SOURCE; THE NEW, NEW ECONOMY. : An article from : Arena Magazine , by Alan Roberts (Digital, 28 July, 2005)
  481. OS X for Hackers at Heart : The Apple of Every Hacker's Eye - Bruce Potter (2005-12-02, Paperback)
  482. Our silence is hackers' greatest ally. (report security breaches).(Technology Enabled) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Ara C. Trembly (Digital, 18 April, 2005)
  483. Palm and Treo Hacks : Tips & Tools for Mastering Your Handheld (Hacks) - Scott MacHaffie (2005-10-21, Paperback)
  484. Patriot's international implications : The USA Patriot Act expanded the definition of protected computers to include any outside the U.S. where commu ... Talk). : An article from : Security Management , by Peter Piazza (Digital, 16 April, 2005)
  485. PC Hacks : 100 Industrial-Strength Tips & Tools , by Jim Aspinwall (Paperback, 25 October, 2004)
  486. PC Magazine Windows Vista Security Solutions (PC Magazine) - Dan DiNicolo (2007-01-23, Paperback)
  487. PCI compliance : protecting customers and the franchise brand : give your franchise system a security check-up.(FW FOCUS : TECHNOLOGY)(Payment Card Industry ) : An article from : Franchising World , by Tom Epstein (Digital, 09 January, 2007)
  488. Perfect Passwords : Selection, Protection, Authentication , by Mark Burnett , Dave Kleiman (Paperback, 27 December, 2005)
  489. Perl Hacks : Tips & Tools for Programming, Debugging, and Surviving (Hacks) - chromatic (2006-05-08, Paperback)
  490. Phishing : Cutting the Identity Theft Line , by Rachael Lininger , Russell Dean Vines (Digital, ..)
  491. Phishing Exposed - Lance James (2005-11-10, Paperback)
  492. Phishing Exposed , by Lance James (Digital, 06 April, 2006)
  493. PHP Hacks : Tips & Tools For Creating Dynamic Websites (Hacks) - Jack Herrington (2005-12-12, Paperback)
  494. Physical and Logical Security Convergence : Powered By Enterprise Security Management - Brian T. Contos (2007-05-13, Paperback)
  495. Poison pen e-mail : A newly discovered vulnerability makes it possible for a hacker to send e-mail to a computer without the user's knowledge. (Tech Talk). : An article from : Security Management , by Peter Piazza (Digital, 16 April, 2005)
  496. Practical Hacking Techniques and Countermeasures , by Mark D. Spivey (Hardcover, 02 November, 2006)
  497. Practical Internet Law for Business , by Kurt M. Saunders (Hardcover, September, 2001)
  498. Preventing computer fraud : enemies from without and within are constantly looking for ways to break into vulnerable computer systems. All it takes is one ... : An article from : Strategic Finance , by Greg Hanna (Digital, 21 July, 2005)
  499. Privacy vs. cybersecurity : the advantages of doing business over the Internet are tremendous--but only if enterprises can ensure exchanging information ... article from : Information Management Journal , by John T. Phillips (Digital, 30 July, 2005)
  500. Prometheus rewired.(Tech Talk)(teaching computer hacking at the University of Calgary and the University of Leeds) : An article from : Security Management , by Peter Piazza (Digital, 31 July, 2005)
  501. Protecting Critical Infrastructures Against Cyber-Attack (Adelphi Papers) , by S. Lukasik (Hardcover, 30 September, 2003)
  502. Protecting Information on Laptops, PDAs, and Cell Phones.(personal digital assistants) : An article from : Strategic Finance , by Kimberly E. Frank , David Charron (Digital, 29 July, 2005)
  503. Public Policing in the 21st Century : Issues and Dilemmas in the U.S. and Canada , by James F. Hodgson , Catherine Orban (Paperback, March, 2005)
  504. Puzzles for Hackers , by Ivan Sklyarov (Paperback, 01 July, 2005)
  505. Q&A with Peter Kay. : An article from : Hawaii Business , by Peter Kay (Digital, 01 August, 2005)
  506. Reading Between the Lines : Steganography : An article from : Law & Order , by Michael W Sheetz (Digital, 13 September, 2005)
  507. Real Digital Forensics : Computer Security and Incident Response - Keith J. Jones (2005-09-23, Paperback)
  508. Real world problems of virtual crime. : An article from : Yale Journal of Law & Technology , by Beryl A. Howell (Digital, 01 August, 2005)
  509. Red Cannon : shooting down the hackers.(Bay Area Profile) : An article from : Computer User , by Elizabeth Millard (Digital, 18 April, 2005)
  510. Reduce software piracy to boost economies. (Tech Talk). : An article from : Security Management , by Peter Piazza (Digital, 17 April, 2005)
  511. Regional Summaries - Asia/Pacific, Eastern Europe, Western Europe, Latin America, Middle East & Africa, and North America.(Industry Trend or Event) : An article from : Software Industry Report (Digital, 14 April, 2005)
  512. Reversing : The Hacker's Guide to Reverse Engineering , by Eldad Eilam (Paperback, 04 April, 2005)
  513. Rights and Responsibilities of Participants in Networked Communities , by Dorothy Elizabeth Robling Denning , Herbert S. Lin (Paperback, October, 1994)
  514. Rootkits, Spyware/Adware, Keyloggers and Backdoors : Detection and Neutralization - Oleg Zaytsev (2006-09-01, Paperback)
  515. Runaway e-mail : external spam-blockers are often too cumbersome and time consuming.(Column) : An article from : The National Public Accountant , by Sam Stearman (Digital, 04 October, 2005)
  516. Sabotage in the American Workplace : Anecdotes of Dissatisfaction, Mischief and Revenge - Martin Sprouse (1992-04, Paperback)
  517. Safe specs : protecting yourself in the age of the Internet. (Giggle Bytes). : An article from : Computer User , by Lincoln Spector (Digital, 31 July, 2005)
  518. Safety Net : Protecting Your Business on the Internet , by Kathleen Sindell (Hardcover, 15 March, 2002)
  519. Scamorama , by Eve Edelson (Paperback, September, 2006)
  520. Scams & Swindles : Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds : How to Recognize And Avoid Rip-Offs In The Internet Age - (2006-05-30, Paperback)
  521. Scene of the Cybercrime : Computer Forensics Handbook - Debra Littlejohn Shinder (2002-08-10, Paperback)
  522. Secret Software : Making The Most Of Computer Resources For Data Protection, Information Recovery, Forensic Examination, Crime Investgation And More , by Norbert Zaenglein (Paperback, July, 2000)
  523. Secrets and Lies : Digital Security in a Networked World , by Bruce Schneier (Paperback, 30 January, 2004)
  524. Secrets of Computer Espionage : Tactics and Countermeasures - Joel McNamara (2003-06-02, Paperback)
  525. Secure Communications : Applications and Management , by Roger Sutton (Hardcover, 18 January, 2002)
  526. Secured Computing : A CISSP Study Guide , by Carl F. Endorf CISSP (Paperback, 30 June, 2006)
  527. SecureLogix applauds house support of Cyber Security Enhancement Act. : An article from : Federal Computer Market Report (Digital, 01 June, 2005)
  528. Securing Ajax Applications : Ensuring the Safety of the Dynamic Web - Christopher Wells (2007-07-11, Paperback)
  529. Securing Your Information in an Insecure World : What You Must Know about Hackers and Identity Thieves , by Hassan Osman (Paperback, 01 December, 2006)
  530. Security alert! If you've ever made these statements, you may be living in a techno-fool's paradise.(Technology)(computer security) : An article from : Detroiter , by Dan Beckett (Digital, 31 July, 2005)
  531. Security alert! The constant threat of worms, viruses, and spyware hacks has builders wondering where to turn. Start your security program by following these eight steps. : An article from : Builder , by Steve Zurier (Digital, 18 April, 2005)
  532. Security and Privacy, 1998 IEEE Symposium , by IEEE Computer Society , IEEE (Paperback, May, 1998)
  533. Security Breach : Wireless Networks Less Than Secure. (Tech Talk). : An article from : Rural Telecommunications , by Athena Platis (Digital, 28 July, 2005)
  534. Security Firm Offers Hacker Insurance. : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Tony Attrino (Digital, 28 July, 2005)
  535. Security in Computing, Second Edition , by Charles P. Pfleeger (Hardcover, 16 September, 1996)
  536. Security in Computing, Third Edition , by Charles P. Pfleeger , Shari Lawrence Pfleeger (Hardcover, 02 December, 2002)
  537. Security Program Design and Management , by Donald B. Tweedy (Hardcover, 22 August, 1989)
  538. Seguridad como problema cultural : primera de cuatro partes : la seguridad informatica en las empresas no se limita a una adecuada implantacion de un antivirus ... maliciosos. : An article from : E Semanal , by Joel Hernandez Huerta (Digital, 21 July, 2005)
  539. Seven ways to prevent computer hacking.(Technology) : An article from : Detroiter , by Nick Brookins (Digital, 31 July, 2005)
  540. Sex and the Internet : A Guide Book for Clinicians - Cooper (2002-06-14, Paperback)
  541. Show Me The Cyberinsurance Claims.(Brief Article)(Statistical Data Included) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Susanne Sclafane (Digital, 28 July, 2005)
  542. Simple Computer Security : Disinfect Your PC , by CA , Eric Geier , Jim Geier (Paperback, 23 January, 2007)
  543. Skywire keeps an eye on crime. (wireless data system for vending machines) : An article from : Beverage Industry , by Sarah Theodore (Digital, 28 July, 2005)
  544. Smart Home Hacks : Tips & Tools for Automating Your House (Hacks) - Gordon Meyer (2004-10-25, Paperback)
  545. Snort Intrusion Detection and Prevention Toolkit , by Brian Caswell , Jay Beale , Andrew R Baker (Paperback, 01 November, 2006)
  546. Social Engineering 101. (Tech Forum). : An article from : Strategic Finance , by Michael Castelluccio (Digital, 30 July, 2005)
  547. Sockets, Shellcode, Porting, & Coding : Reverse Engineering Exploits And Tool Coding For Security Professionals , by Stuart McClure , James C. Foster , Mike Price (Paperback, 30 March, 2005)
  548. Software Forensics : Collecting Evidence from the Scene of a Digital Crime - Robert Slade (2004-01-12, Paperback)
  549. Software Libre/ Open Source Security Tools : Herramientas de seguridad/ Security Tools (Hackers Y Seguridad / Hackers and Security) , by Tony Howlett (Paperback, 30 June, 2005)
  550. Software Piracy Exposed , by Paul Craig , Mark Burnett (Paperback, 01 May, 2005)
  551. Sounding the alarm on campus computer security. (technology today).(Brief Article) : An article from : Community College Week , by Ronald Roach (Digital, 28 July, 2005)
  552. SPA urges Feds to keep an eye on 24 'worst havens' of global software piracy. (Software Publishers Association) : An article from : Software Industry Report (Digital, 28 July, 2005)
  553. Spam / Inside the Spam Cartel (Hackers Y Seguridad / Hackers and Security) , by Spammer-x (Paperback, 30 June, 2005)
  554. Spam Wars : Our Last Best Chance to Defeat Spammers, Scammers & Hackers , by Danny Goodman (Paperback, November, 2004)
  555. Spamming gets a closer look : the U.S. government is taking more action than other countries against unwanted e-mail. (Capital edge : legislative & regulatory ... article from : Information Management Journal , by Bob Tillman (Digital, 30 July, 2005)
  556. Spies Among Us : How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day - Ira Winkler (2005-04-08, Hardcover)
  557. Stalking virulent computer hackers a full-time job for insurance companies. : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Allison Bell (Digital, 28 July, 2005)
  558. Steal This Computer Book 3 : What They Won't Tell You About the Internet - Wallace Wang (2003-05, Paperback)
  559. Steal This Computer Book 4.0 : What They Won't Tell You About the Internet - Wallace Wang (2006-04-15, Paperback)
  560. Stealing the Network : How to Own a Continent - FX (2004-05, Paperback)
  561. Stealing the Network : How to Own a Continent , by Ryan Russell , Jay Beale , Tim Mullen (Digital, 06 April, 2006)
  562. Stealing the Network : How to Own a Shadow (Stealing the Network) (Stealing the Network) - Johnny Long (2007-01-26, Paperback)
  563. Stealing the Network : How to Own an Identity (Stealing the Network) (Stealing the Network) - Timothy Mullen (2005-08-09, Paperback)
  564. Stealing the Network : How to Own the Box - Ryan Russell (2003-04-01, Paperback)
  565. Stealing Your Life : The Ultimate Identity Theft Prevention Plan - Frank W. Abagnale (2007-04-24, Hardcover)
  566. Steel Bolt Hacking , by douglas Chick (Paperback, January, 2004)
  567. Student charged in grade tampering threatens to implicate others.(Brief Article) : An article from : Community College Week (Digital, 16 April, 2005)
  568. Students Hacking and Being Hacked More.(Brief Article) : An article from : Community College Week , by Cindy Van Auken (Digital, 28 July, 2005)
  569. Subverting America : A Trojan Horse Legacy, Vol. One , by Rodney Stich (Digital, ..)
  570. Summer reading list.(Tools of the trade) : An article from : Strategic Finance (Digital, 01 August, 2005)
  571. Superhighway Robbery : Preventing E-Commerce Crime (Crime Science S.) , by Graeme R. Newman , R. V. G. Clarke (Hardcover, August, 2003)
  572. Surf at your own risk.(web surfing-management) : An article from : Security Management , by Peter Piazza (Digital, 01 August, 2005)
  573. Swing Hacks : Tips and Tools for Killer GUIs (Hacks) - Joshua Marinacci (2005-06-30, Paperback)
  574. Symantec internet security threat report identifies more attacks now targeting e-Commerce, web applications. : An article from : Software Industry Report (Digital, 01 August, 2005)
  575. Tackling cyber criminals.(New Business)(Brief Article) : An article from : Business Mexico , by Matthew Brayman (Digital, 01 June, 2005)
  576. Take it from the top. (special section - Computer-Information Security : Getting the Protection You Need) : An article from : Security Management , by James R. Wade (Digital, 13 April, 2005)
  577. Taking a bite out of cyber crime.(technology today) : An article from : Community College Week , by Reid Goldsborough (Digital, 18 April, 2005)
  578. Taking steps to ensure CRM data security.(customer relationship management) : An article from : Customer Interaction Solutions , by Ken Seitz (Digital, 05 June, 2006)
  579. Tech Makes Fighting Fraud Affordable.(Brief Article) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Ara C. Trembly (Digital, 28 July, 2005)
  580. Technical triage on virus risks.(computer viruses) : An article from : Security Management , by Richard Jacobs (Digital, 28 July, 2005)
  581. Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators - Jack Wiles (2007-02-01, Paperback)
  582. Terrorism via the Internet. : An article from : The Futurist , by Walter Laqueur (Digital, 28 July, 2005)
  583. Testing their metal. (metal detection technology) : An article from : Security Management , by Michael A. Gips (Digital, 28 July, 2005)
  584. Testing Web Security : Assessing the Security of Web Sites and Applications , by Steven Splaine (Paperback, 11 October, 2002)
  585. The Art of Deception : Controlling the Human Element of Security - Kevin D. Mitnick (2003-10-17, Paperback)
  586. The Art of Deception : Controlling the Human Element of Security , by Kevin D. Mitnick , William L. Simon , Steve Wozniak (Hardcover, 04 October, 2002)
  587. The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers - Kevin D. Mitnick (2005-12-27, Paperback)
  588. The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , by Kevin D. Mitnick , William L. Simon (Hardcover, 04 March, 2005)
  589. The Cathedral and the Bazaar : Musings on Linux and Open Source by an Accidental Revolutionary (O'Reilly Linux) - Eric S. Raymond (1999-10, Hardcover)
  590. The CEH Prep Guide : The Comprehensive Guide to Certified Ethical Hacking - Ronald L. Krutz (2007-10-22, Hardcover)
  591. The challenge of domestic terrorism to American criminal justice : An article from : Corrections Today , by Deborah J Daniels (Digital, 13 September, 2005)
  592. The CISSP Prep Guide : Mastering the Ten Domains of Computer Security - Ronald L. Krutz (2001-08-24, Hardcover)
  593. The Complete Hacker's Handbook : Everything You Need to Know About Hacking in the Age of the Web - Dr. X (2000-10-01, Paperback)
  594. The computer caper. (digital images of child pornography on a computer system) : An article from : Security Management , by Thomas E. Kaiser (Digital, 28 July, 2005)
  595. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage - Cliff Stoll (2005-09-13, Paperback)
  596. The cybercrime threat : Do hackers have an open door to your utility system? (Technology Play). : An article from : Public Utilities Fortnightly (1994) , by Lori A. Burkhart (Digital, 28 July, 2005)
  597. The Dark Side of the Internet : Protecting Yourself and Your Family from Online Criminals , by Paul Bocij (Hardcover, 30 October, 2006)
  598. The Database Hacker's Handbook : Defending Database Servers - David Litchfield (2005-07-14, Paperback)
  599. The Definitive Guide to Criminal Justice and Criminology on the World Wide Web (2nd Edition) - Frank Schmalleger (2001-08-06, Paperback)
  600. The Economic Costs and Implications of High-Technology Hardware Theft , by James N Dertouzos (Paperback, 25 April, 1999)
  601. The Encyclopedia of High-Tech Crime and Crime-Fighting (Facts on File Crime Library) , by Michael Newton (Hardcover, November, 2003)
  602. The Ethical Hack : A Framework for Business Value Penetration Testing , by James S. Tiller (Hardcover, 29 September, 2004)
  603. The ethical hack : An article from : CA Magazine , by Victor Keong , Adel Melek (Digital, 02 September, 2005)
  604. The evolution of federal computer crime policy : The ad hoc approach to an ever-changing problem : An article from : American Journal of Criminal Law , by Frank P Andreano (Digital, 02 September, 2005)
  605. The FTC cracks down.(Law of the Line)(Federal Trade Commission) : An article from : Hawaii Business , by Bob Godbey (Digital, 01 June, 2005)
  606. The Fugitive Game : Online with Kevin Mitnick , by Jonathan Littman (Paperback, 01 January, 1997)
  607. The gilded age : Little has changed in a century of american capitalism. (Diversions). : An article from : Computer User , by Michael Finley (Digital, 28 July, 2005)
  608. The global problem of computer crimes and the need for security. : An article from : Industrial Management , by Jyoti N. Prasad , Yunus Kathawala , Hans J. Bocker , David Sprague (Digital, 28 July, 2005)
  609. The Good the Spam and the Ugly , by Steve H. Graham (Paperback, 01 March, 2007)
  610. The Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks - Susan Young (2003-11-24, Hardcover)
  611. The Hacker Crackdown , by Bruce Sterling (Hardcover, May, 2002)
  612. The Hacker Crackdown : Law And Disorder On The Electronic Frontier - Bruce Sterling (1993-11-01, Mass Market Paperback)
  613. The Hacker Crackdown : Law and Disorder on the Electronic Frontier , by Bruce Sterling (Paperback, May, 2002)
  614. The Hacker Diaries : Confessions of Teenage Hackers - Dan Verton (2002-03-26, Hardcover)
  615. The Hacker Ethic - Pekka Himanen (2001-01-30, Hardcover)
  616. The Hacker Files.(protection against computer crimes) : An article from : Security Management , by Dequendre Neeley (Digital, 28 July, 2005)
  617. The Hacking of America : Who's Doing It, Why, and How , by Bernadette H. Schell , John L. Dodge (Hardcover, 30 November, 2002)
  618. The Hanged Man's Song (Audio Download, ..)
  619. The Hanged Man's Song (Unabridged) (Audio Download, ..)
  620. The Hanged Man's Song , by John Sandford (Paperback, 28 September, 2004)
  621. The Hate Factory , by Georgelle Hirliman (Digital, )
  622. The impact of identity theft through cyberspace. (CE Credit). : An article from : The Forensic Examiner , by Eric A. Kreuter (Digital, 31 July, 2005)
  623. The intelligent threat. (special section - Computer-Information Security : Getting the Protection You Need) : An article from : Security Management , by Douglas E. Campbell (Digital, 28 July, 2005)
  624. The International Handbook of Computer Security , by Jae K. Shim (Hardcover, 01 January, 2000)
  625. The International Handbook of Computer Security , by Jae K. Shim , Anique A. Qureshi , Joel G. Siegel (Hardcover, June, 2000)
  626. The Investigator's Guide to Computer Crime , by Carl J., Ph.D. Franklin (Hardcover, 20 January, 2006)
  627. The Investigator's Guide to Computer Crime , by Carl J., Ph.D. Franklin (Paperback, 20 January, 2006)
  628. The Masters of Deception : Gang That Ruled Cyberspace, The - Michele Slatalla (1996-01-10, Paperback)
  629. The Mezonic Agenda : Hacking the Presidency - Dr. Herbert Thompson (2004-09-23, Paperback)
  630. The New Hacker's Dictionary - 3rd Edition , by Eric S. Raymond (Paperback, 11 October, 1996)
  631. The Oracle Hacker's Handbook : Hacking and Defending Oracle - David Litchfield (2007-01-30, Paperback)
  632. The perils of personal computers. (includes related article) (special section - Computer-Information Security : Getting the Protection You Need) : An article from : Security Management , by Al Foster , James A. Schweitzer (Digital, 28 July, 2005)
  633. The Personal Internet Security Guidebook : Keeping Hackers and Crackers out of Your Home (The Korper and Ellis E-Commerce Books Series) , by Tim Speed , Juanita Ellis , Steffano Korper (Paperback, 26 May, 2006)
  634. The Social Net : Understanding Human Behavior In Cyberspace , by Yair Amichai-Hamburger (Paperback, 15 May, 2005)
  635. The Stock Detective Investor : Beat Online Hype and Unearth the Real Stock Market Winners , by Kevin Lichtman , Lynn N. Duke (Hardcover, 24 November, 2000)
  636. The Transnational Dimension of Cyber Crime and Terrorism (Hoover National Security Forum Series) , by Mariano-Florentino Cuellar , Ekaterina A. Drozdova , David D. Elliott , Seymour E. Goodman , Gregory D. Grove , Stephen J. Lukasik , Tonya L. Putnam , Abraham D. Sofaer (Paperback, August, 2001)
  637. The Unofficial Guide to Ethical Hacking (Miscellaneous) , by Ankit Fadia (Paperback, 02 February, 2002)
  638. The Unofficial Guide to Ethical Hacking, Second Edition - Ankit Fadia (2005-09-13, Paperback)
  639. The Wall Street Journal. Complete Identity Theft Guidebook : How to Protect Yourself from the Most Pervasive Crime in America (Wall Street Journal Identity Theft Guidebook : How to Protect) - Terri Cullen (2007-07-10, Paperback)
  640. The war on terrorism : cyberterrorists beware. (Up front : news, trends & analysis).(Brief Article) : An article from : Information Management Journal , by Shanna Groves (Digital, 29 July, 2005)
  641. The Watchman : The Twisted Life and Crimes of Serial Hacker Kevin Poulsen - Jonathan Littman (1997-03-31, Hardcover)
  642. The Weak Links in the Security Chain.(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 28 July, 2005)
  643. The Web Application Hacker's Handbook : Discovering and Exploiting Security Flaws - Dafydd Stuttard (2007-10-22, Paperback)
  644. Theft wave prompts Chubb to finance high-tech unit.(Risk and Insurance Management Society Conference Report) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by David M. Katz (Digital, 28 July, 2005)
  645. There are spies - and hackers - among us.(Nightmares)(Technology and the CEO : Nightmares, Daydreams, Solutions) : An article from : Chief Executive (U.S.) , by Peter Haapaneimi (Digital, 28 July, 2005)
  646. Thwarting 'evil geniuses' : An article from : Journal of Business , by Paul Read (Digital, 15 September, 2005)
  647. TIGHTENING YOUR INFORMATION SYSTEMS SECURITY.(Industry Trend or Event) : An article from : Computer Security Update , by Rachna Kumar (Digital, 28 July, 2005)
  648. Tighter cybersecurity.(Forum) : An article from : Issues in Science and Technology (Digital, 31 July, 2005)
  649. Toll Fraud and Telabuse : A Multibillion Dollar Problem , by John J. Haugh (Paperback, December, 1992)
  650. Tools for digital sleuths. (Tech Talk).(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 30 July, 2005)
  651. Tracking the cybercrime trail : in addition to knowing how to follow the bits of evidence, forensic detectives must know how to work with law enforcement. : An article from : Security Management , by Bryan Sartin (Digital, 01 August, 2005)
  652. Transnational Criminal Organizations, Cybercrime, and Money Laundering : A Handbook for Law Enforcement Officers, Auditor , by James R. Richards (Hardcover, 20 October, 1998)
  653. Trucos Windows XP , by Preston Gralla (Paperback, 22 June, 2004)
  654. U.S. congressional legislation. (Legal Reporter). : An article from : Security Management , by Teresa Anderson (Digital, 31 July, 2005)
  655. Ubuntu Hacks : Tips & Tools for Exploring, Using, and Tuning Linux (Hacks) - Jonathan Oxer (2006-06-14, Paperback)
  656. Ultimate Internet Outlaw : How Surfers Steal Sex, Software, Cds, Games, And More Top-Secret Stuff On The Information Superhighway , by Robert Merkle (Paperback, May, 1999)
  657. Ultimate Internet Terrorist : How Hackers, Geeks, And Phreaks Can Ruin Your Trip On The Information Superhighway . . . And What You Can Do To Protect Yourself , by Robert Merkle (Paperback, March, 1998)
  658. Uncovering the mystery of Shadowhawk. (hacker who committed computer crimes) : An article from : Security Management , by William J. Cook (Digital, 13 April, 2005)
  659. Underground Web Sites. : An article from : Security Management , by Dequendre Neeley (Digital, 28 July, 2005)
  660. Understanding and Managing Cybercrime - Sam C. McQuade (2005-10-20, Paperback)
  661. Universidade Hacker : Desvende Todos os Segredos do Submundo , by James Della Valle y Henrique Cesar Ulbrich (Paperback, 01 December, 2004)
  662. Using Geographic Information Systems in Law Enforcement : Crime Analysis and Community Policing : Using ArcView 3.X , by Mark A Stallo and Jim Rodgers (Paperback, 04 February, 2004)
  663. Using Microsoft Office to Improve Law Enforcement Operations : Crime Analysis, Community Policing, and Investigations , by Mark A. Stallo (Paperback, 28 August, 2003)
  664. Using the hacker's toolbox.(includes related articles on computer security) : An article from : Security Management , by Bruce Middleton (Digital, 28 July, 2005)
  665. Vandals with a conscience? (Tech Talk).(web site defacement declined after the September 11 attacks)(Brief Article) : An article from : Security Management , by Peter Piazza (Digital, 16 April, 2005)
  666. VIEWERS WARNED OF EMULATING MATRIX HACKING. : An article from : Computer Security Update (Digital, 17 April, 2005)
  667. Virtually Criminal , by Matthew Williams (Hardcover, July, 2006)
  668. Virtually Criminal , by Matthew Williams (Paperback, 25 July, 2006)
  669. Viruses : the epidemic grows worse. (computer viruses).(Technology) : An article from : National Underwriter Property & Casualty-Risk & Benefits Management , by Ara C. Trembly (Digital, 18 April, 2005)
  670. Viruses on rise, but are companies liable?(computer viruses) : An article from : Information Management Journal , by Nikki Swartz (Digital, 31 July, 2005)
  671. Voice mail hacking--wiretaps--covert video : thousands of dollars lost to corporate spies.(Global Communications) : An article from : Fairfield County Business Journal (Digital, 01 June, 2005)
  672. Voice mail hacking--wiretaps--covert video : thousands of dollars lost to corporate spies.(Security : advertising and resource guide)(Global Communicati ... cle from : Westchester County Business Journal (Digital, 17 April, 2005)
  673. VoIP Hacks : Tips & Tools for Internet Telephony (Hacks) - Ted Wallingford (2005-12-22, Paperback)
  674. Vouching for cybertools.(Tech Talk)(National Institute of Justice and the National Institute of Standards and Technology create Computer Forensic Tool ... : An article from : Security Management , by Peter Piazza (Digital, 31 July, 2005)
  675. Waive Goodbye to Liability.(penetration testing) : An article from : Security Management , by John N. Bumgarner (Digital, 28 July, 2005)
  676. Wardriving & Wireless Penetration Testing - Chris Hurley (2006-10-31, Paperback)
  677. Watching over the Web : a new leader in XML Web Services security. : An article from : Utah Business , by Ben Ling (Digital, 18 April, 2005)
  678. Watching the web : thoughts on expanding police surveillance opportunities under the cyber-crime convention. : An article from : Canadian Journal of Criminology and Criminal Justice , by Laura Huey , Richard S. Rosenberg (Digital, 01 August, 2005)
  679. Weather Toys : Building and Hacking Your Own 1-Wire Weather Station (ExtremeTech) - Tim Bitson (2006-10-16, Paperback)
  680. Weaving a secure Web. (Web page security) : An article from : Security Management , by Lincoln Stein (Digital, 28 July, 2005)
  681. Web Data Mining and Applications in Business Intelligence and Counter-Terrorism , by Bhavani Thuraisingham (Hardcover, 26 June, 2003)
  682. Web Hacking : Attacks and Defense - Stuart McClure (2002-08-08, Paperback)
  683. Web Hacking from the Inside Out , by Michael Flenov (Paperback, 01 January, 2007)
  684. Web of Deception : Misinformation on the Internet , by Anne P. Mintz , Steve Forbes (Paperback, 01 September, 2002)
  685. Web Stalkers : Protect Yourself from Internet Criminals & Psychopaths (911) , by Stephen Andert (Paperback, 01 January, 2005)
  686. Webster's New World Hacker Dictionary (Webster's New World) - Bernadette Schell (2006-09-05, Paperback)
  687. When Laws Jell.(drafting of computer crimes treaty by Council of Europe)(Editorial) : An article from : Security Management (Digital, 28 July, 2005)
  688. When students crack.(computer hacking) : An article from : Security Management (Digital, 28 July, 2005)
  689. White-collar crimes will get harder time. (Up front : news, trends & analysis). : An article from : Information Management Journal , by Nikki Swartz (Digital, 31 July, 2005)
  690. Who's Watching? : An article from : Strategic Finance , by Michael Castelluccio (Digital, 28 July, 2005)
  691. Who Else Knows You Best , by Ifida Known (Paperback, 28 February, 2006)
  692. Who goes there? (user-verification systems to restrict access to computer data) (special section - Computer-Information Security : Getting the Protection ... Need) : An article from : Security Management , by Charles Mayfield (Digital, 28 July, 2005)
  693. Wi-Foo : The Secrets of Wireless Hacking - Andrew Vladimirov (2004-06-28, Paperback)
  694. Wi-Foo II : The Secrets of Wireless Hacking (2nd Edition) - Andrew Vladimirov (2008-06-16, Paperback)
  695. WiFi Security , by Kevin Curran (Paperback, 22 September, 2004)
  696. Will security ills cancel out net profits? : As with flying, the stakes--and the consequences--are uncomfortably severe. (Pursuits). : An article from : Computer User , by Nelson King (Digital, 28 July, 2005)
  697. Windows 2000 (Hacking Exposed) , by Joel Scambray , Stuart McClure (Paperback, 29 August, 2001)
  698. Windows Forensic Analysis Including DVD Toolkit - Harlan Carvey (2007-04-24, Paperback)
  699. Windows Forensics : The Field Guide for Corporate Computer Investigations - Chad Steel (2006-05-15, Paperback)
  700. Windows Server 2003 (Hacking Exposed) - Joel Scambray (2006-10-27, Paperback)
  701. Windows Vista Security : Securing Vista Against Malicious Attacks - Roger A. Grimes (2007-07-02, Paperback)
  702. WIRELESS : Los Mejores Trucos , by Rob Flickenger (Paperback, 22 June, 2004)
  703. Wireless Crime and Forensic Investigation - Gregory Kipper (2007-02-26, Hardcover)
  704. Wireless Hacking : Projects for Wi-Fi Enthusiasts - Lee Barken (2004-10-01, Paperback)
  705. Wireless Hacks , by Rob Flickenger , Roger Weeks (Paperback, 01 November, 2005)
  706. Wireless Hacks : 100 Industrial-Strength Tips & Tools , by Rob Flickenger (Paperback, 16 September, 2003)
  707. Wireless war driving : Is your office access up in the air? (Technique). : An article from : Hawaii Business (Digital, 01 June, 2005)
  708. Wireshark & Ethereal Network Protocol Analyzer Toolkit , by Angela D Orebaugh , Gilbert Ramirez , Jay Beale (Paperback, 01 November, 2006)
  709. Writing Security Tools and Exploits , by James C. Foster (Paperback, 01 September, 2005)
  710. www.hackerheaven.edu.(computer hackers) : An article from : Community College Week , by SCOTT W. WRIGHT (Digital, 15 April, 2005)
  711. XML Hacks : 100 Industrial-Strength Tips and Tools (Hacks) , by Michael Fitzgerald (Paperback, 27 July, 2004)
  712. Y2k - Arthur Kopit (2000-01-01, Paperback)
  713. YAHOO FOR HACKERS.(Brief Article) : An article from : Sojourners , by Danny Duncan Collum (Digital, 28 July, 2005)
  714. Zero Comments , by Geert Lovink (Paperback, 30 September, 2007)
  715. ZOMBIE COMPUTERS. : An article from : ETC. : A Review of General Semantics , by Raymond Gozzi Jr. (Digital, 28 July, 2005)

Link to more stores on our main index page ...