Hackers
Resource Information
The concept Hackers represents the subject, aboutness, idea or notion of resources found in Forsyth County Public Library.This resource has been enriched with EBSCO NoveList data.
The Resource
Hackers
Resource Information
The concept Hackers represents the subject, aboutness, idea or notion of resources found in Forsyth County Public Library.
This resource has been enriched with EBSCO NoveList data.
- Label
- Hackers
103 Items that share the Concept Hackers
Context
Context of HackersSubject of
No resources found
No enriched resources found
- trueAccess denied
- trueAlif the unseen
- trueAmerican magic : a thriller
- trueAttack protocol : a novel
- trueAva in code land
- trueAvenger
- trueBefore and again
- trueBlackout
- trueBlackout : a novel
- trueBluescreen : a Mirador novel
- trueBreaking and entering : the extraordinary story of a hacker called "Alien"
- trueCan you crack the code? : a fascinating history of ciphers and cryptography
- trueCharm city : a Tess Monoghan novel
- trueCity spies
- trueClive Cussler's Dark vector : a novel from the NUMA files
- trueCollateral damage
- trueConcealed
- trueConstant fear
- trueCress
- trueCruel intent : a novel of suspense
- Cult of the dead cow : how the original hacking supergroup might just save the world
- trueCyber mage : a novel
- trueCyber-thief showdown
- trueDark constellations
- trueDark horse
- trueDark winter
- trueDivided in death
- trueDon't let go
- trueDon't look now
- trueDon't turn around
- trueExtinction
- trueFast and loose
- trueFrom Potter's field
- trueFuture crimes : everything is connected, everyone is vulnerable, and what we can do about it
- trueGame on : tempting twenty-eight
- trueGhost in the wires : my adventures as the world's most wanted hacker
- trueGunmetal gray
- Hacking for dummies
- Helpful hackers
- trueHomeland
- trueImmoral code
- trueIndependence Day
- trueInvasive
- Kingdom of lies : inside the world of cybersecurity defenders, criminals, and everyone in between
- trueKingdom of lies : unnerving adventures in the world of cybercrime
- trueLights out : a cyberattack, a nation unprepared, surviving the aftermath
- trueMalagash
- trueMrs. Smith's Spy School for Girls : power play
- trueNet force : dark web
- Network of deceit
- trueOff to be the wizard
- trueOn the line
- trueOnes and zeroes : a Mirador novel
- truePattern recognition
- truePhantom Wheel : a Hackers novel
- truePurity in death
- trueRise of the red hand
- trueRuse
- trueSandworm : a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers
- trueSeason of the witch
- trueSeconds to live
- trueShantorian
- trueSidney Sheldon's Reckless
- trueSpell hacker
- trueSurvive the Dome
- trueTalk of the town
- trueThe Director : a novel
- trueThe Emperor's revenge
- trueThe Polaris protocol : a Pike Logan thriller
- trueThe Rosewater redemption
- trueThe Seville communion
- trueThe blazing bridge
- trueThe bright side of going dark
- trueThe chaos of now
- trueThe dazzling heights
- trueThe evaporation of Sofi Snow
- trueThe fox
- trueThe girl in the spider's web : a Lisbeth Salander novel
- trueThe girl in the spider's web : a Lisbeth Salander novel : continuing Stieg Larsson's Millennium series
- trueThe girl who kicked the hornet's nest
- trueThe girl who lived twice
- trueThe girl who played with fire
- trueThe girl who played with fire
- trueThe girl who takes an eye for an eye
- trueThe hidden face of Fren-Z
- trueThe lost planet
- trueThe paladin : a spy novel
- trueThe readymade thief
- trueThe revolution
- trueThe stolen moon
- trueThe voter file
- trueThis is how they tell me the world ends : the cyberweapons arms race
- trueThis mortal coil
- trueTrackers, Book one
- trueUrban outlaws
- trueWe are Anonymous : inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency
- trueWe regret to inform you
- trueWhat Rose forgot
- trueWorm : the first digital world war
- trueYou : A Novel
- trueZap!
- trueZero day
- trueZeroes
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.forsythpl.org/resource/Qf-zPg4Ld6M/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.forsythpl.org/resource/Qf-zPg4Ld6M/">Hackers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.forsythpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.forsythpl.org/">Forsyth County Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Hackers
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.forsythpl.org/resource/Qf-zPg4Ld6M/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.forsythpl.org/resource/Qf-zPg4Ld6M/">Hackers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.forsythpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.forsythpl.org/">Forsyth County Public Library</a></span></span></span></span></div>