Skip to main content
NLUMeg Library
Your cart is empty.
Cart
Lists
Public lists
New Arrivals
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
NLU Meghalaya Library
Online Public Access Catalogue (OPAC)
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog by keyword
Advanced search
Authority search
Tag cloud
Contact
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'ccl=su:"Hacking."'
Refine your search
Availability
Limit to records with available items
Authors
Arcuri, Jennifer
Carey, Marcus J.
Chell, Dominic
Crawley, Kim
Grimes, Roger A.
Hickey, Matthew
Jin, Jennifer
Oriyano, Sean-Philip
Troia, Vinny
Wylie, Phillip L.
Show more
Show less
Series
ITpro collection
Tribe of Hackers Ser
Topics
Computer crimes
Computer networks
Computers
COMPUTERS
Computer security
Computer Security
Cryptographie
Cryptography
Hackers
Hacking
Mobile apps
Penetration testing ...
Piratage informatiqu...
Pirates informatique...
R�eseaux d'ordinateu...
S�ecurit�e informati...
Show more
Show less
Your search returned 8 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to cart
Add to list
New list
Place hold
Results
1.
Image from Amazon.com
The mobile application hacker's handbook /
Dominic Chell ... [and three others].
by
Chell, Dominic
[author.]
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Indianapolis, IN :
John Wiley & Sons,
[2015]
Copyright date:
�2015
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
2.
Image from Amazon.com
Penetration testing essentials.
by
Oriyano, Sean-Philip
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Hoboken, NJ :
Sybex,
2017
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
3.
Image from Amazon.com
Hacking the hacker : learn from the experts who take down hackers /
Roger A. Grimes.
by
Grimes, Roger A
[author.]
Series:
ITpro collection
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Indianapolis, IN :
Wiley,
2017
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
4.
Image from Amazon.com
Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques /
Vinny Troia.
by
Troia, Vinny
[author.]
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Indianapolis, Indiana :
Wiley,
[2020]
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
5.
Image from Amazon.com
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity /
Marcus J. Carey & Jennifer Jin.
by
Carey, Marcus J. (Cybersecurity professional)
Jin, Jennifer
Series:
Tribe of Hackers Ser
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publication details:
Indianapolis :
Wiley,
2020
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
6.
Image from Amazon.com
Hands on hacking /
Matthew Hickey with Jennifer Arcuri.
by
Hickey, Matthew (Computer security expert)
[author.]
Arcuri, Jennifer
[author.]
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Indianapolis, Indiana :
Wiley,
2020
Other title:
Hands on hacking : become an expert at next gen penetration testing and purple teaming
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
7.
Image from Amazon.com
Hacking multifactor authentication /
Roger A. Grimes.
by
Grimes, Roger A
[author.]
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Indianapolis, IN :
John Wiley & Sons, Inc.,
[2021]
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
8.
Image from Amazon.com
The pentester blueprint : starting a career as an ethical hacker /
Phillip L. Wylie, Kim Crawley.
by
Wylie, Phillip L
[author.]
Crawley, Kim
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Indianapolis, IN :
John Wiley,
[2021]
Copyright date:
�2021
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
Not finding what you're looking for?
Make a
purchase suggestion