Search results
Jump to navigation
Jump to search
- | name = Out of the Inner Circle: A Hacker's Guide to Computer Security ...vide insight into the ways and methods of the [[Hacker (computer security)|hacking]] community in the days before [[Internet]] became prevalent. Although larg ...1 KB (190 words) - 22:18, 23 January 2025
- ...rs in the [[United Kingdom]] courts as an expert on digital evidence and [[computer forensics]] for both prosecution and defence as well as being a media pundi ...popular aspect of the book is the apparently salacious printouts of actual hacking attempts (although confidential details, such as passwords, are blacked out ...2 KB (345 words) - 20:55, 14 June 2023
- | name = Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of P | image = Hacking matter -- book cover.jpg ...2 KB (273 words) - 00:59, 28 November 2020
- ...ook | <!-- See [[Wikipedia:WikiProject Novels]] or [[Wikipedia:WikiProject Books]] --> | publisher = [[Bantam Books]] ...3 KB (415 words) - 20:42, 15 April 2024
- | publications = Books ...{ISBN|978-1-59327-144-2}}</ref> [[Andrew Huang (hacker)|Andrew Huang]]'s ''Hacking the Xbox'', and ''[[How Wikipedia Works]]''.<ref>{{cite book | last = Ayers ...4 KB (559 words) - 06:15, 21 March 2024
- ...ng: the art of exploitation|series=No Starch Press Series|publisher=Safari Books Online|first=Jon|last=Erickson|edition=2, illustrated|year=2008|ISBN= 978-1 [[Category:Computer security exploits]] ...1 KB (138 words) - 02:39, 24 November 2022
- ...f how social engineering can be combined with [[hacker (computer security)|hacking]]. * A person gains access to a company's internal computer system, guarded by a password that changes daily, by waiting for a snowstor ...3 KB (436 words) - 02:30, 24 July 2024
- | author = [[Paul Graham (computer programmer)|Paul Graham]] ...|archive-url=https://web.archive.org/web/20140315201737/http://netsecurity.about.com/od/readbookreviews/fr/aapr080804.htm|url-status=dead}}</ref><ref name=s ...4 KB (479 words) - 15:43, 25 August 2024
- [[File:Hackingexplota.jpg|right|250px|"Hacking, ''The art of exploitation''"]] ...dition ยป Linux Magazine |url=http://www.linux-magazine.com/Online/Features/Hacking-The-Art-of-Exploitation-2nd-Edition |access-date=2024-01-07 |website=[[Linu ...8 KB (1,112 words) - 11:42, 17 June 2025
- {{about|the book|the subculture|hacker culture}} ...s|author=Keay Davidson|author-link=Keay Davidson|url=http://www.sfgate.com/books/article/REVIEWS-IN-BRIEF-2857395.php|title=REVIEWS IN BRIEF - SFGate|newspa ...3 KB (307 words) - 04:05, 19 November 2024
- {{wiktionary|Hack|hack|hacked|hacking}} * [[Lifehacker]], a weblog about life hacks and software ...3 KB (456 words) - 01:54, 8 August 2025
- ...] and [[phreaker]]s that provides information mainly about [[telephone]]s, computer technology, and legal issues related to technology. ...oks such as ''Hacking for Dummies'' ({{ISBN|076455784X}}) and ''Steal This Computer Book''. Hackcanada was also featured often on the [[L0pht|Hacker News Netwo ...2 KB (250 words) - 16:30, 28 March 2025
- ...s notable for being one of the targets in the [[Hacker (computer security)|hacking scene]] during the 1990s. ...hey are inaccurate and generally misrepresent [[hacker (computer security)|hacking]].<ref>https://web.archive.org/web/20161001180822/http://attrition.org/erra ...3 KB (462 words) - 23:22, 25 March 2024
- ...curity+%22Tom+Liston%22&pg=PA224 |title=Mac OS X maximum security โ Google Books |isbn=9780672323812 |access-date=May 10, 2010|last1=Ray |first1=John |last2 ...rity+%22Tom+Liston%22 |title=Counter hack reloaded: a step-by ... โ Google Books |date=December 6, 2007 |isbn=9780131481046 |access-date=May 10, 2010|last1= ...2 KB (308 words) - 13:31, 20 December 2023
- |publisher = [[BBC Books]] '''''Blue Box''''' is a [[BBC Books]] original novel written by [[Kate Orman]] and based on the long-running Br ...2 KB (264 words) - 13:52, 4 October 2023
- [[Category:1999 non-fiction books]] [[Category:O'Reilly Media books]] ...4 KB (547 words) - 09:25, 25 July 2024
- {{short description|Australian computer criminal}} ...into US defense and government computer systems and the theft of an online computer security newsletter in the late 1980s and early 1990. ...7 KB (898 words) - 05:06, 23 June 2025
- | name = Hackers: Heroes of the Computer Revolution ...uter Revolution''''' ({{ISBN|0-385-19195-2}}) is a book by [[Steven Levy]] about [[Hacker (programmer subculture)|hacker culture]]. It was published in 1984 ...6 KB (791 words) - 16:51, 3 October 2024
- |genre = [[Computer security]], computer hackers ...elegram| first2 = Fort Worth| title = Giving praise for the Robin Hoods of hacking| work = St. Louis Post - Dispatch| location = St. Louis| date = 2005-05-06} ...7 KB (1,075 words) - 17:47, 24 May 2025
- ...ojs/index.php/fm/article/view/647/562 Technology and Pleasure: Considering Hacking Constructive], ''First Monday'', Volume 4, Number 2 - 1 February 1999 {{Arc In 2002, Hannemyr was awarded the [[Norwegian Computer Society]]'s [[Rosing Prize|Rosing Honorary Prize]], and in 2003, a vote amo ...2 KB (318 words) - 10:30, 16 January 2024