The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary (O'Reilly Linux)
by Eric S. Raymond Buy this book
|
 |
The New Hacker's Dictionary
by Eric S. Raymond(Compiler) Buy this book
|
 |
Hacker's Guide to Visual FoxPro 6.0
by Tamar E. Granor, et al Buy this book
|
 |
The Happy Hacker
by Carolyn P. Meinel Buy this book
|
|
Masters of Deception : The Gang That Ruled Cyberspace
by Michele Slatalla, Joshua Quittner (Contributor) Buy this book
|
 |
Takedown : The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw-By the Man Who Did It
by Tsutomu Shimomura, John Markoff Buy this book
|
 |
The Hacker Crackdown : Law and Disorder on the Electronic Frontier
by Bruce Sterling Buy this book
|
 |
The Fugitive Game : Online With Kevin Mitnick
by Jonathan Littman Buy this book
|
 |
Steal This Computer Book
by Wally Wang, Wallace Wang Buy this book
|
 |
The Software Conspiracy: Why Software Companies Put Out Faulty Products, How They Can Hurt You, and What You Can Do
by Mark Minasi Buy this book
|
 |
Secrets of a Super Hacker
by Knightmare, et al Buy this book
|
 |
Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption
by Winn Schwartau Buy this book
|
 |
Firewalls and Internet Security : Repelling the Wily Hacker (Addison-Wesley Professional Computing Series)
by William R. Cheswick, Steven M. Bellovin (Contributor) Buy this book
|
 |
Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves
by Randall K. Nichols, et al Buy this book
|
 |
The Complete Idiot's Guide to Protecting Yourself Online (Complete Idiot's Guide To...)
by Preston Gralla Buy this book
|
 |
The Watchman : The Twisted Life and Crimes of Serial Hacker Kevin Poulsen
by Jonathan Littman, Roger Donald (Editor) Buy this book
|
 |
At Large : The Strange Case of the World's Biggest Internet Invasion
by David H. Freedman, Charles C. Mann Buy this book
|
 |
Slaughtermatic
by Steve Aylett Buy this book
|
 |
At Large: the Strange Case of the World's Biggest Internet Invasion
by David H. Freedman, Charles C. Mann Buy this book
|
 |
The Ultimate Internet Terrorist : How Hackers, Geeks, and Phreaks Can Ruin Your Trip on the Information Superhighway...and What You Can Do to Protect
by Robert Merkle Buy this book
|
 |
Hacker Proof : The Ultimate Guide to Network Security
by Lars Klander, Edward J., Jr. Renehan Buy this book
|
 |
Investigating Computer- Related Crime A Handbook For Corporate Investigators
by Peter Stephenson Buy this book
|
 |
The Jazz
by Melissa Scott Buy this book
|
 |