Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"

Breaking and EnteringThis taut, true thriller dives into a dark world that touches us all, as seen through the brilliant.

, breakneck career of an extraordinary hacker a woman known only as Alien When she arrived at MIT i.

Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" , breakneck career of an extraordinary hacker a woman known only as Alien When she arrived at MIT i.

White-Hot Hack (Kate and Ian, #2)

White-Hot Hack Their love story began in Heart Shaped Hack Join Kate and Ian for the thrilling conclusion in White.

Hot Hack n nWhen cybercriminals doxed undercover hacker Ian Bradshaw and forced him to flee, he be.

White-Hot Hack (Kate and Ian #2)Hot Hack n nWhen cybercriminals doxed undercover hacker Ian Bradshaw and forced him to flee, he be.

Playing With Fire (#Hacker, #1)

Playing With Fire One brilliant young hacker n nOne experimental government aircraft n nOne chance to keep it all from.

Going up in flames n nStill recovering from her troubled past, Farris is no stranger to change But.

Playing With Fire (#Hacker #1)Going up in flames n nStill recovering from her troubled past, Farris is no stranger to change But.

@War: The Rise of the Military-Internet Complex

@WarA surprising, page turning account of how the wars of the future are already being fought todayThe.

United States military currently views cyberspace as the fifth domain of warfare alongside land, ai.

@War: The Rise of the Military-Internet ComplexUnited States military currently views cyberspace as the fifth domain of warfare alongside land, ai.

Kill Process (Kill Chain, #1)

Argest social networking company by night, she exploits her database access to profile domestic ab.

Kill Process (Kill Chain #1)Argest social networking company by night, she exploits her database access to profile domestic ab.

Kill Process By day, Angie, a twenty year veteran of the tech industry, is a data analyst at Tomo, the worlds l.

Black Dawn (Titan, #6)

Less about how deep Parker lives in Titan s virtual world Everything is controlled Chaos is master.

Black Dawn (Titan #6)Less about how deep Parker lives in Titan s virtual world Everything is controlled Chaos is master.

Black Dawn Parker Black wants the one woman he shouldn t have his buddy s girl Shes sweet and smart, but clue.

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News

Messing with the EnemyA former FBI Special Agent and leading cyber security expert offers a devastating and essential look.

At the misinformation campaigns, fake news, and electronic espionage operations that have become th.

Messing with the Enemy: Surviving in a Social Media World of Hackers Terrorists Russians and Fake NewsAt the misinformation campaigns, fake news, and electronic espionage operations that have become th.

Immoral Code

Immoral CodeT one of the big ones, like Google or Apple Keagan, her sweet, sensitive boyfriend, is happy to f.

T one of the big ones, like Google or Apple Keagan, her sweet, sensitive boyfriend, is happy to f.

Immoral CodeFor Nari, aka Narioka Diane, aka hacker digital alter ego d0l0s, it s college and then a career a.

Hacking with Smart Phones

Grasp anything about hacking The language and tasks discussed in my former books are very complex.

Hacking with Smart PhonesGrasp anything about hacking The language and tasks discussed in my former books are very complex.

Hacking with Smart PhonesAt a recent event I came across someone who had read both my previous books but was still unable to.

Threat Modeling: Designing for Security

Threat ModelingThe only security book to be chosen as a Dr Dobbs Jolt Award Finalist since Bruce Schneiers Secrets.

And Lies and Applied Cryptography Adam Shostack is responsible for security development lifecycle.

Threat Modeling: Designing for SecurityAnd Lies and Applied Cryptography Adam Shostack is responsible for security development lifecycle.

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing GuideRequiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a com.

Plete introduction to the steps required to complete a penetration test, or ethical hack, from begi.

Ethical Hacking and Penetration Testing GuidePlete introduction to the steps required to complete a penetration test, or ethical hack, from begi.

Zero Hour (Wired & Dangerous, #1)

Zero Hour The Fast and the Furious meets Mr Robot in USA Today bestselling author Megan Ericksons thrilling.

New romantic suspense series n nHacker extraordinaire Roarke Brennan lives each hour each breath.

Zero Hour (Wired & Dangerous #1)New romantic suspense series n nHacker extraordinaire Roarke Brennan lives each hour each breath.

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA SpyingHer soul draining, identity tracking vampiric media cartel that scans your emails and spies on you.

Tor and the Dark Art of AnonymityThe NSA hates Tor So does the FBI Even Google wants it gone, as do Facebook and Yahoo and every ot.

Her soul draining, identity tracking vampiric media cartel that scans your emails and spies on you.

Hacking: The Art of Exploitation

Hacking: The Art of ExploitationS commonly referred to as hacking It shows how hackers exploit programs and write exploits, instea.

HackingA comprehensive introduction to the techniques of exploitation and creative problem solving method.

S commonly referred to as hacking It shows how hackers exploit programs and write exploits, instea.

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Ghost in the WiresIf they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted.

The near the entrance While other nerds were fumbling with password possibilities, this adept break.

Ghost in the Wires: My Adventures as the World's Most Wanted HackerThe near the entrance While other nerds were fumbling with password possibilities, this adept break.