Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"

Breaking and EnteringThis taut true thriller dives into a dark world that touches us all as seen through the brilliant

breakneck career of an extraordinary hacker a woman known only as Alien When she arrived at MIT i

Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" breakneck career of an extraordinary hacker a woman known only as Alien When she arrived at MIT i

White-Hot Hack (Kate and Ian, #2)

White-Hot Hack Their love story began in Heart Shaped Hack Join Kate and Ian for the thrilling conclusion in White

Hot Hack n nWhen cybercriminals doxed undercover hacker Ian Bradshaw and forced him to flee he be

White-Hot Hack (Kate and Ian #2)Hot Hack n nWhen cybercriminals doxed undercover hacker Ian Bradshaw and forced him to flee he be

Playing With Fire (#Hacker, #1)

Playing With Fire One brilliant young hacker n nOne experimental government aircraft n nOne chance to keep it all from

Going up in flames n nStill recovering from her troubled past Farris is no stranger to change But

Playing With Fire (#Hacker #1)Going up in flames n nStill recovering from her troubled past Farris is no stranger to change But

Kill Process (Kill Chain, #1)

Argest social networking company by night she exploits her database access to profile domestic ab

Kill Process (Kill Chain #1)Argest social networking company by night she exploits her database access to profile domestic ab

Kill Process By day Angie a twenty year veteran of the tech industry is a data analyst at Tomo the worlds l

Black Dawn (Titan, #6)

Black Dawn Parker Black wants the one woman he shouldn t have his buddy s girl Shes sweet and smart but clue

Less about how deep Parker lives in Titan s virtual world Everything is controlled Chaos is master

Black Dawn (Titan #6)Less about how deep Parker lives in Titan s virtual world Everything is controlled Chaos is master

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News

Messing with the Enemy: Surviving in a Social Media World of Hackers Terrorists Russians and Fake NewsAt the misinformation campaigns fake news and electronic espionage operations that have become th

Messing with the EnemyA former FBI Special Agent and leading cyber security expert offers a devastating and essential look

At the misinformation campaigns fake news and electronic espionage operations that have become th

Immoral Code

Immoral CodeFor Nari aka Narioka Diane aka hacker digital alter ego d0l0s it s college and then a career a

T one of the big ones like Google or Apple Keagan her sweet sensitive boyfriend is happy to f

Immoral Code T one of the big ones like Google or Apple Keagan her sweet sensitive boyfriend is happy to f

Hacking with Smart Phones

Hacking with Smart PhonesAt a recent event I came across someone who had read both my previous books but was still unable to

Grasp anything about hacking The language and tasks discussed in my former books are very complex

Hacking with Smart Phones Grasp anything about hacking The language and tasks discussed in my former books are very complex

Threat Modeling: Designing for Security

Threat ModelingThe only security book to be chosen as a Dr Dobbs Jolt Award Finalist since Bruce Schneiers Secrets

And Lies and Applied Cryptography Adam Shostack is responsible for security development lifecycle

Threat Modeling: Designing for SecurityAnd Lies and Applied Cryptography Adam Shostack is responsible for security development lifecycle

Ethical Hacking and Penetration Testing Guide

Plete introduction to the steps reuired to complete a penetration test or ethical hack from begi

Ethical Hacking and Penetration Testing GuideReuiring no prior hacking experience Ethical Hacking and Penetration Testing Guide supplies a com

Ethical Hacking and Penetration Testing GuidePlete introduction to the steps reuired to complete a penetration test or ethical hack from begi

Zero Hour (Wired & Dangerous, #1)

New romantic suspense series n nHacker extraordinaire Roarke Brennan lives each hour each breath

Zero Hour The Fast and the Furious meets Mr Robot in USA Today bestselling author Megan Ericksons thrilling

Zero Hour (Wired & Dangerous #1)New romantic suspense series n nHacker extraordinaire Roarke Brennan lives each hour each breath

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying

Her soul draining identity tracking vampiric media cartel that scans your emails and spies on you

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA SpyingHer soul draining identity tracking vampiric media cartel that scans your emails and spies on you

Tor and the Dark Art of AnonymityThe NSA hates Tor So does the FBI Even Google wants it gone as do Facebook and Yahoo and every ot

Hacking: The Art of Exploitation

Hacking: The Art of ExploitationS commonly referred to as hacking It shows how hackers exploit programs and write exploits instea

HackingA comprehensive introduction to the techniues of exploitation and creative problem solving method

S commonly referred to as hacking It shows how hackers exploit programs and write exploits instea