HackingHere are entered works on unauthorized changes to computer files, systems, or networks as well as to works on third-party programmatic changes to a file, network, game, or other electronic device. See also what's at Wikipedia, your library, or elsewhere.
Broader term:Related term:Narrower terms:Used for: |
Filed under: Hacking
Filed under: Hacking -- Russia (Federation)
Filed under: Hacking -- Russia (Federation) -- PreventionFiled under: Hacktivism
Filed under: Hacktivism -- United States
Items below (if any) are from related and broader terms.
Filed under: Computer security- Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net)
- The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink)
- UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com)
- Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press)
- Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink)
- Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
- Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com)
- Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
- A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org)
- The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
- Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com)
- Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com)
- For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
Filed under: Computer security -- Asia
Filed under: Computer security -- Australia
Filed under: Computer security -- Law and legislationFiled under: Computer security -- United States- Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary
- Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment
- A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at fas.org)
Filed under: Computer networks -- Security measures- Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell
- Digital Identity, an Emergent Legal Concept: The Role and Legal Nature of Digital Identity in Commercial Transactions (Adelaide: University of Adelaide Press, c2011), by Clare Sullivan (PDF with commentary at Adelaide)
- The Internet Under Crisis Conditions: Learning from September 11 (2003), by National Research Council Computer Science and Telecommunications Board (HTML with commentary at NAP)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Stacks: Interoperability in Today's Computer Networks (c1992), by Carl Malamud (page images at HathiTrust)
- Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
- Trust in Cyberspace, ed. by Fred B. Schneider (HTML and page images at NAP)
- Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
Filed under: Computers -- Access control- Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites)
- Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
- A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org)
- Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Cambridge, MA and London: MIT Press, c2010), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org)
- Rating Maintenance Phase Program Document, by Tommy Hammer (HTML at usmc.mil)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at usmc.mil)
More items available under broader and related terms at left. |