TITLE

Hidden Keys to Software Break-Ins and Unauthorized Entry (Book)

PUB. DATE
July 2004
SOURCE
IT Training;Jul/Aug2004, p36
SOURCE TYPE
Review
DOC. TYPE
Book Review
ABSTRACT
Reviews the book "Hidden Keys to Software Break-Ins and Unauthorized Entry," by D. Sklyarov.
ACCESSION #
13820480

 

Related Articles

  • Car PC Hacks. Maher, William // APC (Bauer Media Group);Feb2006, Vol. 26 Issue 2, p132 

    The article reviews the book "Car PC Hacks."

  • Hackers (Book). Burton, Hilary D. // Library Journal;11/1/1984, Vol. 109 Issue 18, p2074 

    Reviews the book 'Hackers: Heroes of the Computer Revolution,' by Steven Levy.

  • Hacker Culture (Book). Jordan, John W. // Argumentation & Advocacy;Winter2003, Vol. 39 Issue 3, p224 

    Reviews the non-fiction book 'Hacker Culture,' by Douglas Thomas.

  • HACKER CULTURE (Book). Flagan, Are // Afterimage;Sep/Oct2002, Vol. 30 Issue 2, p17 

    Reviews the book 'Hacker Culture,' by Douglas Thomas.

  • Take the Hacker's Challenge.  // IT Professional;Mar/Apr2003, Vol. 5 Issue 2, p55 

    Reviews the non-fiction book 'Hacker's Challenge Two: Test Your Network Security &: Forensic Skills,' by Mike Schiffman.

  • Teen hackers dispel the myth of the lonely nerd. Towner, Nathalie // Computer Weekly;5/2/2002, p38 

    Reviews the book 'The Hacker Diaries: Confessions of Teenage Hackers,' by Dan Verton.

  • Hacking Exposed. MacCana, Mike // Australian Personal Computer;Jul2003, Issue 295, p148 

    Reviews the book 'Hacking Exposed,' by Mike MacCana.

  • "Windows XP Hacks" (Book).  // Software World;Nov2003, Vol. 34 Issue 6, p26 

    Reviews the book "Windows XP Hacks".

  • Linux Server Hacks (Book).  // Software World;May2004, Vol. 35 Issue 3, p10 

    Reviews the book “Linux Server Hacks”.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics