Hacker

  • 61Season of the Witch , Natasha Mostert (2008)
    Gabriel Blackstone has an unusual talent. A computer hacker by trade, he is also able to enter the minds of others. But he uses his gift only reluctantly - until he is contacted by an ex-lover who… 803 грн (только Украина)

  • 62The Girl Who Played with Fire , Stieg Larsson (2010)
    In the electrifying follow-up to`The Girl with the Dragon Tattoo` Lisbeth Salander, the troubled, wise-beyond-her-years genius hacker, is the focus and fierce heart of the story. Mikael Blomkvist … 815 грн (только Украина)

  • 63Eric (A) , Terry Pratchett (1991)
    Eric calls up a demon to grant him three wishes - but what he gets is the Discworld`s most incompetent wizard... Eric is the Discworld`s only demonology hacker. The trouble is, he`s not very good at… 978 грн (только Украина)

  • 64Penetration Testing Essentials , Sean-Philip Oriyano
    Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn… 3251.98 руб электронная книга

  • 65Raspberry Pi User Guide , Eben Upton
    Make the most out of the world’s first truly compact computer It's the size of a credit card, it can be charged like a smartphone, it runs on open-source Linux, and it holds the promise of bringing… 1302.58 руб электронная книга

  • 66Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit , John Chirillo
    The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author… 4682.19 руб электронная книга

  • 67The Girl Who Takes an Eye for an Eye , Давид Лагеркранц (2017)
    Lisbeth Salander is back with a vengeance. The series that began with The Girl with the Dragon Tattoo continues as brilliant hacker Lisbeth Salander teams up with journalist Mikael… 533 грн (только Украина)

  • 68Malicious Cryptography. Exposing Cryptovirology , Adam Young
    Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning… 2926.78 руб электронная книга

  • 69Unauthorised Access. Physical Penetration Testing For IT Security Teams , Wil Allsopp
    The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the… 2926.78 руб электронная книга

  • 70The Owl Always Hunts at Night , Bjork S. (2016)
    When a young woman is found dead, the police are quick to respond. But what they find at the murder site is unexpected. The body is posed, the scene meticulously set. And there is almost no forensic… 450 руб