Hacking
Resource Information
The concept Hacking represents the subject, aboutness, idea or notion of resources found in Austin Public Library.This resource has been enriched with EBSCO NoveList data.
The Resource
Hacking
Resource Information
The concept Hacking represents the subject, aboutness, idea or notion of resources found in Austin Public Library.
This resource has been enriched with EBSCO NoveList data.
- Label
- Hacking
59 Items that share the Concept Hacking
Context
Context of HackingSubject of
No resources found
No enriched resources found
- true1st case
- trueA for Anonymous : how a mysterious hacker collective transformed the world
- trueA hacker's mind : how the powerful bend society's rules, and how to bend them back
- trueAlias Emma : a novel
- trueAmerica the vulnerable : inside the new threat matrix of digital espionage, crime, and warfare
- trueAntisocial
- trueBlindside
- trueBounty : a novel
- trueBreaking and entering : the extraordinary story of a hacker called "Alien"
- trueCRACK99 : the takedown of a $100 million Chinese software pirate
- trueCan you crack the code?
- trueChannel Zero
- Cracking codes with Python : an introduction to building and breaking ciphers
- trueCyberwar : how Russian hackers and trolls helped elect a president : what we don't, can't, and do know
- trueDouble Digit
- trueElection meltdown : dirty tricks, distrust, and the threat to American democracy
- trueFancy Bear Goes Phishing : The Dark History of the Information Age, in Five Extraordinary Hacks
- trueGeorge and the unbreakable code
- trueHacker, hoaxer, whistleblower, spy : the many faces of Anonymous
- Hacking for dummies
- trueHacks : the inside story of the break-ins and breakdowns that put Donald Trump in the White House
- trueInvasion
- trueKompromat : how Russia undermined American democracy
- Learning Kali Linux : security testing, penetration testing, and ethical hacking
- trueLikewar : the weaponization of social media
- trueLittle brother
- trueMessing with the enemy : surviving in a social media world of hackers, terrorists, Russians, and fake news
- trueMiss Misery
- trueMurdoch's world : the last of the old media empires
- trueNightwatch on the Hinterlands
- trueObstruction of justice : how the deep state risked national security to protect the democrats
- trueOverthrow : a novel
- trueReputation : a novel
- trueSherlock Holmes and Frankenstein's diary
- trueSpaceside
- trueSpam nation : the inside story of organized cybercrime--from global epidemic to your front door
- trueStolen
- trueSurvive the Dome
- trueTeen Titans go!, Demo
- trueThe Cassandra virus
- trueThe art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers
- trueThe changling plague
- trueThe dawn of the code war : America's battle against Russia, China, and the rising global cyber threat
- trueThe devil's ransom
- trueThe eye of minds
- trueThe fifth domain : defending our country, our companies, and ourselves in the age of cyber threats
- trueThe forgetting machine
- trueThe hacked world order : how nations fight, trade, maneuver, and manipulate in the digital age
- trueThe misadventures of Max Crumbly : middle school mayhem
- trueThe perfect weapon : war, sabotage, and fear in the cyber age
- trueThe plot to betray America : how team Trump embraced our enemies, compromised our security, and how we can fix it
- trueThe plot to destroy democracy : how Putin and his spies are undermining America and dismantling the West
- trueThe stringer
- trueVersion zero
- trueWe are Anonymous : inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency
- trueWe are all targets : how renegade hackers invented cyber war and unleashed an age of global chaos
- trueWitch hunt : the story of the greatest mass delusion in American political history
- trueWorm : the first digital world war
- trueZenobia July
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.austintexas.gov/resource/5wlkOMNleFo/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.austintexas.gov/resource/5wlkOMNleFo/">Hacking</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.austintexas.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.austintexas.gov/">Austin Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Hacking
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.austintexas.gov/resource/5wlkOMNleFo/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.austintexas.gov/resource/5wlkOMNleFo/">Hacking</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.austintexas.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.austintexas.gov/">Austin Public Library</a></span></span></span></span></div>