win prizes eligible curtis sittenfeld Harry Potter House Eds rebus 30th anniversary book price comparison
Search our site
Lily and the Octopus by Steven Rowley Read the opening extract of the brand new Steven Rowley book before its publication on 05/10/2017

Computer fraud & hacking books

See below for a selection of the latest books from Computer fraud & hacking category. Presented with a red border are the Computer fraud & hacking books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer fraud & hacking books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

Fraud Prevention in Online Digital Advertising by Xingquan Zhu, Haicheng Tao, Zhiang Wu, Jie Cao Fraud Prevention in Online Digital Advertising
, , ,
The authors systematically review methods of online digital advertising (ad) fraud and the techniques to prevent and defeat such fraud in this brief. The authors categorize ad fraud into three major categories, including (1) placement fraud, (2) traffic fraud, and...
Format: Paperback - Released: 17/06/2017

Hacking the Hacker Learn From the Experts Who Take Down Hackers by Roger A. Grimes Hacking the Hacker Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women...
Format: Paperback - Released: 21/04/2017

The Cybersecurity to English Dictionary by Raef Meeuwisse The Cybersecurity to English Dictionary


Format: Paperback - Released: 06/02/2017

CEH Certified Ethical Hacker Bundle, Third Edition by Matt Walker CEH Certified Ethical Hacker Bundle, Third Edition

Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide
Format: Paperback - Released: 24/01/2017

Certified Ethical Hacker (CEH) Foundation Guide by Sagar Rahalkar Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from...
Format: Paperback - Released: 01/12/2016

Penetration Testing Essentials by Sean Philip Oriyano Penetration Testing Essentials

Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity.
Format: Paperback - Released: 00/12/2016

Penetration Testing with Raspberry Pi by Michael McPhee, Jason Beltrame Penetration Testing with Raspberry Pi
,
Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 About This Book * Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2 * Protect your...
Format: Paperback - Released: 30/11/2016

Cyber Crimes History of World's Worst Cyber Attacks by Vannesa Pitts Cyber Crimes History of World's Worst Cyber Attacks


Format: Paperback - Released: 25/11/2016

Other books in this genre

Advanced Persistent Security A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies by Ira Winkler Advanced Persistent Security A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies...
Format: Paperback - Released: 22/11/2016

Hacking Wireless Access Points Cracking, Tracking, and Signal Jacking by Jennifer (Information Assurance Affiliate Faculty, Regis University, Denver, CO, USA) Kurtz Hacking Wireless Access Points Cracking, Tracking, and Signal Jacking
, , , ,
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology...
Format: Paperback - Released: 16/11/2016

Information Fusion for Cyber-Security Analytics by Izzat M Alsmadi Information Fusion for Cyber-Security Analytics

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is...
Format: Hardback - Released: 22/10/2016

Identity Theft Breakthroughs in Research and Practice by Information Resources Management Association Identity Theft Breakthroughs in Research and Practice

Highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one's identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity...
Format: Hardback - Released: 16/09/2016

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition by Matt Walker CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition

Fully up-to-date coverage of every topic on the CEH v9 certification exam
Format: Book - Released: 08/09/2016

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Clint Bodungen, Bryan L. Singer, Aaron Shbeeb, Kyle Wilhoit Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
, , ,
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks with the tried-and-true Hacking Exposed way
Format: Paperback - Released: 01/09/2016

Hacked The Inside Story of America's Struggle to Secure Cyberspace by Charlie Mitchell Hacked The Inside Story of America's Struggle to Secure Cyberspace

Charlie Mitchell reveals the innovative and too-often hapless government and industry responses to growing cybersecurity threats. He examines internal government power struggles, the paralysis on Capitol Hill, and the industry's desperate effort to stay ahead of both the bad guys...
Format: Hardback - Released: 20/06/2016

Registered users have access to unique site features

Register now