Here are entered works on the practice of breaking into computer systems and using techniques such as defacing or disabling Web sites, redirects, denial-of-service attacks, information theft, Web site parodies, etc., for politically or socially motivated purposes
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Hacker, Marilyn, 1942- Boy : Poetry for students. Volume 19 : presenting analysis, context and criticism on commonly studied poetry / David Galens project editor ; foreword by David Kelly
Hackers -- Australia -- Biography. : Underground : tales of hacking, madness & obsession on the electronic frontier / Suelette Dreyfus ; with research by Julian Assange
1997
1
Hackers -- Case studies : Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hacker Skills
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Hackers -- England -- Biography : Mostly human. Hacker down : the life and death of an ISIS social media star / with Laurie Segall ; director, Roxy Hunt ; producer, Tony Castle ; producer, Cullen Daly ; BFD Productions ; CNN Go
Hackers -- Government policy -- China : 21st century Chinese cyberwarfare : an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors / William T. Hagestad II
Hackers -- Psychology -- Fiction : Stealing the network : how to own an identity / Raven Alder [and others] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor
Hackers -- Social networks : Exploring malicious hacker communities : toward proactive cyber-defense / Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian
Hackers -- Tunisia -- Drama : Bedwin Hacker / Z'Yeux Noirs Movies presente ; un film de Nadia El Fani ; scenario et dialogues, Nadia El Fani ; producteurs délegués, Nadia et Bechir El Fani
Hacket, Peter -- Trials, litigation, etc : Report of the trial of Thomas Hunter, Peter Hacket, Richard M'Neil, James Gibb, and William M'Lean, operative cotton-spinners in Glasgow : before the High Court of Justiciary at Edinburgh, on Wednesday, January 3, 1838, and seven following days : for the crimes of illegal conspiracy and murder : with an appendix of documents and relative proceedings / by Archibald Swinton
1838
1
Hackett, Albert : The real Nick and Nora : Frances Goodrich and Albert Hackett, writers of stage and screen classics / David L. Goodrich
2001
1
Hackett, C. J. (Cecil John) : Images of the interior : seven Central Australian photographers / Philip Jones