Hackers
Resource Information
The concept Hackers represents the subject, aboutness, idea or notion of resources found in East Baton Rouge Parish Library.
The Resource
Hackers
Resource Information
The concept Hackers represents the subject, aboutness, idea or notion of resources found in East Baton Rouge Parish Library.
- Label
- Hackers
220 Items that share the Concept Hackers
Context
Context of HackersSubject of
No resources found
No enriched resources found
- A Christmas wish
- A for Anonymous : how a mysterious hacker collective transformed the world
- About that night
- Access denied
- Alicia's misadventures in computer land
- Alien vs. alien
- Alif the unseen
- American magic : a thriller
- Angel light : an old-fashioned love story
- Antisocial
- Ava in code land
- Avenger
- Becoming an ethical hacker
- Before and again
- Betrayed : the Nicole Jones series
- Blackout
- Blackout : a novel
- Blood ties
- Bluescreen : a Mirador novel
- Border hacker : a tale of treachery, trafficking, and two friends on the run
- Brain Jack
- Breaking and entering : the extraordinary story of a hacker called "Alien"
- Breakpoint
- Call me Elizabeth Lark : a novel
- Can you crack the code? : a fascinating history of ciphers and cryptography
- Child not found : a Tucker mystery
- City spies
- Cold harbor
- Collateral damage
- Concealed
- Constant fear
- Contraband
- Corrupted memory : a Tucker mystery
- Corsair
- Cress
- Cyber storm
- Cyber-thief showdown
- Cyberhacker
- Cybershock
- Cyberterror
- Dark horse
- Dark vector : a novel from the NUMA files
- Dark winter
- Day one
- Deadline Y2K : a thriller
- Debris line
- Delete all suspects
- Deus ex : Icarus effect
- Divided in death
- Don't let go
- Don't look now
- Don't turn around
- Drawing blood
- Eastern standard tribe
- Enclave
- Escapology
- Evil genius
- Extinction
- Fast and loose
- Final victim
- Firewall
- Fixation
- For the win
- For you & no one else
- From Potter's field
- Future crimes : everything is connected, everyone is vulnerable and what we can do about it
- Game on : tempting twenty-eight
- Gene mapper
- Generation gone, Vol. 1
- Ghost in the wires : my adventures as the world's most wanted hacker
- Gunmetal gray
- Hacked
- Hacked : a radical approach to hacker culture and crime
- Hacker
- Hacker cracker : a journey from the mean streets of Brooklyn to the frontiers of cyberspace
- Hacker, hoaxer, whistleblower, spy : the many faces of Anonymous
- Hackers
- Hacking for dummies
- Hacking for dummies
- Hammerjack : a novel
- Hard love
- Hardline
- Hardpressed
- Hardwired
- Her nightly embrace
- Hidden
- Homeland
- Immoral code
- Incognita
- Independence day
- Invasive
- Invisible armies
- Irontown blues
- It's only the end of the world
- Killer Colton Christmas
- Kingdom of lies : unnerving adventures in the world of cybercrime
- Kingdom of lies : unnerving adventures in the world of cybercrime
- Lights out : a cyberattack : a nation unprepared : surviving the aftermath
- Little brother
- Marriage confidential
- Messiah node
- Mind games
- Mr. Robot : red wheelbarrow
- Murder to the metal
- Nerve damage
- Night talk
- On the line
- One from without
- One more night with you
- Ones and zeroes : a Mirador novel
- Origami man
- Pattern recognition
- Perfect cover
- Phantom Wheel : a hackers novel
- Poisonfeather
- Power play
- Prettyboy must die
- Purity in death
- Radicalized
- Raptor six
- Reckless
- Resurrection Express : a thriller
- Rogue code : a novel
- Runaway heart : a novel
- Ruse
- Sabotage
- Sandworm : a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers
- Seal team six : hunt the dragon
- Season of the witch
- Second sister
- Self's punishment
- Set you free
- Shadowed
- Smoke and fire
- Snow crash
- Spellhacker
- Super Max and the mystery of Thornwood's revenge
- Survive the Dome
- Tabula rasa
- Terms of use
- The Devil's code
- The Emperor's revenge : an Oregon Files adventure
- The Girl with the dragon tattoo
- The Gomorrah gambit
- The Jennifer morgue
- The Leviathan Effect
- The Polaris protocol
- The Seville communion
- The accidental bad girl
- The android's dream
- The atrocity archives
- The blazing bridge
- The blue nowhere
- The bright side of going dark
- The case of the battling bots
- The chaos of now
- The dark net : inside the digital underworld
- The dazzling heights
- The delirium brief
- The director : a novel
- The empress file
- The evaporation of Sofi Snow
- The fool's run
- The fox
- The girl in the spider's web
- The girl who kicked the hornet's nest
- The girl who lived twice
- The girl who played with fire
- The girl who played with fire
- The girl who takes an eye for an eye
- The girl with the dragon tattoo, Volume 1
- The hanged man's song
- The hive construct
- The last goodbye : a novel
- The lost planet
- The minders
- The mountain in the sea
- The new world
- The paladin : a spy novel
- The readymade thief
- The reign of the Kingfisher
- The scarecrow : a novel
- The secret life of Damian Spinelli : as told to Diane Miller
- The short drop
- The software bomb
- The song of synth
- The squad : killer spirit
- The stolen moon
- The third instinct
- The trigger mechanism
- The voter file
- Their fractured light : a Starbound novel
- This cruel design
- This is how they tell me the world ends : the cyber-weapons arms race
- This machine kills secrets : how WikiLeakers, cypherpunks, and hacktivists aim to free the world's information
- This mortal coil
- This town is a nightmare
- Total surrender
- Trackers, Book one
- Transmission
- Urban outlaws
- Utopia : a novel
- Vanished
- Watch me
- Watched
- We are Anonymous : inside the hacker world of Lulzsec, Anonymous, and the global cyber insurgency
- We regret to inform you
- WebMage
- Weighing shadows
- What Rose forgot
- When gadgets betray us : the dark side of our infatuation with new technologies
- Wizzywig
- Worm : the first digital world war
- You : a novel
- Zer0es
- Zero day
- Zero day
- Zero days
- Zero days : a cyber thriller
- Zero history
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.ebrpl.com/resource/Qf-zPg4Ld6M/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.ebrpl.com/resource/Qf-zPg4Ld6M/">Hackers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.ebrpl.com/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.ebrpl.com/">East Baton Rouge Parish Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Hackers
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.ebrpl.com/resource/Qf-zPg4Ld6M/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.ebrpl.com/resource/Qf-zPg4Ld6M/">Hackers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.ebrpl.com/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.ebrpl.com/">East Baton Rouge Parish Library</a></span></span></span></span></div>