The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary (O'Reilly Linux)
by Eric S. Raymond Buy this book
|
![](http://images.amazon.com/images/P/1565927249.01.TZZZZZZZ.jpg) |
The New Hacker's Dictionary
by Eric S. Raymond(Compiler) Buy this book
|
![](http://images.amazon.com/images/P/0262680920.01.TZZZZZZZ.jpg) |
Hacker's Guide to Visual FoxPro 6.0
by Tamar E. Granor, et al Buy this book
|
![](http://images.amazon.com/images/P/0965509362.01.TZZZZZZZ.jpg) |
The Happy Hacker
by Carolyn P. Meinel Buy this book
|
|
Masters of Deception : The Gang That Ruled Cyberspace
by Michele Slatalla, Joshua Quittner (Contributor) Buy this book
|
![](http://images.amazon.com/images/P/0060926945.01.TZZZZZZZ.jpg) |
Takedown : The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw-By the Man Who Did It
by Tsutomu Shimomura, John Markoff Buy this book
|
![](http://images.amazon.com/images/P/0786889136.01.TZZZZZZZ.jpg) |
The Hacker Crackdown : Law and Disorder on the Electronic Frontier
by Bruce Sterling Buy this book
|
![](http://images.amazon.com/images/P/055356370X.01.TZZZZZZZ.jpg) |
The Fugitive Game : Online With Kevin Mitnick
by Jonathan Littman Buy this book
|
![](http://images.amazon.com/images/P/0316528692.01.TZZZZZZZ.jpg) |
Steal This Computer Book
by Wally Wang, Wallace Wang Buy this book
|
![](http://images.amazon.com/images/P/1886411212.01.TZZZZZZZ.jpg) |
The Software Conspiracy: Why Software Companies Put Out Faulty Products, How They Can Hurt You, and What You Can Do
by Mark Minasi Buy this book
|
![](http://images.amazon.com/images/P/0071348069.01.TZZZZZZZ.jpg) |
Secrets of a Super Hacker
by Knightmare, et al Buy this book
|
![](http://images.amazon.com/images/P/1559501065.01.TZZZZZZZ.jpg) |
Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption
by Winn Schwartau Buy this book
|
![](http://images.amazon.com/images/P/1560252464.01.TZZZZZZZ.jpg) |
Firewalls and Internet Security : Repelling the Wily Hacker (Addison-Wesley Professional Computing Series)
by William R. Cheswick, Steven M. Bellovin (Contributor) Buy this book
|
![](http://images.amazon.com/images/P/020163466X.01.TZZZZZZZ.jpg) |
Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves
by Randall K. Nichols, et al Buy this book
|
![](http://images.amazon.com/images/P/0072122854.01.TZZZZZZZ.jpg) |
The Complete Idiot's Guide to Protecting Yourself Online (Complete Idiot's Guide To...)
by Preston Gralla Buy this book
|
![](http://images.amazon.com/images/P/0789720353.01.TZZZZZZZ.jpg) |
The Watchman : The Twisted Life and Crimes of Serial Hacker Kevin Poulsen
by Jonathan Littman, Roger Donald (Editor) Buy this book
|
![](http://images.amazon.com/images/P/0316528579.01.TZZZZZZZ.jpg) |
At Large : The Strange Case of the World's Biggest Internet Invasion
by David H. Freedman, Charles C. Mann Buy this book
|
![](http://images.amazon.com/images/P/0684835584.01.TZZZZZZZ.jpg) |
Slaughtermatic
by Steve Aylett Buy this book
|
![](http://images.amazon.com/images/P/1568581033.01.TZZZZZZZ.jpg) |
At Large: the Strange Case of the World's Biggest Internet Invasion
by David H. Freedman, Charles C. Mann Buy this book
|
![](http://images.amazon.com/images/P/0684824647.01.TZZZZZZZ.jpg) |
The Ultimate Internet Terrorist : How Hackers, Geeks, and Phreaks Can Ruin Your Trip on the Information Superhighway...and What You Can Do to Protect
by Robert Merkle Buy this book
|
![](http://images.amazon.com/images/P/0873649702.01.TZZZZZZZ.jpg) |
Hacker Proof : The Ultimate Guide to Network Security
by Lars Klander, Edward J., Jr. Renehan Buy this book
|
![](http://images.amazon.com/images/P/188413355X.01.TZZZZZZZ.jpg) |
Investigating Computer- Related Crime A Handbook For Corporate Investigators
by Peter Stephenson Buy this book
|
![](http://images.amazon.com/images/P/0849322189.01.TZZZZZZZ.jpg) |
The Jazz
by Melissa Scott Buy this book
|
![](http://images.amazon.com/images/P/0312868022.01.TZZZZZZZ.jpg) |