Hackers
Resource Information
The concept Hackers represents the subject, aboutness, idea or notion of resources found in Chemeketa Cooperative Regional Library Service (CCRLS).
The Resource
Hackers
Resource Information
The concept Hackers represents the subject, aboutness, idea or notion of resources found in Chemeketa Cooperative Regional Library Service (CCRLS).
- Label
- Hackers
- Authority link
- http://id.worldcat.org/fast/00872150
- Source
- fast
198 Items that share the Concept Hackers
Context
Context of HackersSubject of
No resources found
No enriched resources found
- A day to kill
- A geek girl's guide to murder
- Agents of S.H.I.E.L.D, The complete first season
- Agents of S.H.I.E.L.D, The complete second season
- trueAlif the unseen
- trueAntisocial
- trueAttack protocol : a novel
- Bad memory
- Blackhat
- Blackhat
- Blackout
- trueBlackout : a novel
- Blindside
- Blindside
- Bloody Sunday
- trueBrain jack
- trueBreaking and entering : the extraordinary story of a hacker called "Alien"
- trueBurning blue
- trueCavanaugh fortune
- Charm city
- trueCity spies
- trueCode conspiracy
- trueCodeSpell
- trueCollateral damage
- Compadres
- trueCorsair : a science fiction novel
- trueCult of the Dead Cow : how the original hacking supergroup might just save the world
- trueCyber-thief showdown
- CyberShock : surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption
- Cybergeddon
- trueDark winter
- trueDeep dark
- trueDemo
- trueDon't turn around
- trueDotmeme
- trueDuplicity
- trueExtinction
- trueFall : an Archer and Bennett thriller
- First strike
- trueFirst strike
- First strike : a thriller
- Flickan som lekte med elden : The girl who played with fire
- trueGenius : the revolution
- trueGeorge and the unbreakable code
- Getting it right on data security and breach notification legislation in the 114th Congress : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 5, 2015
- Ghost in the shell
- Ghost in the shell : stand alone complex, The laughing man
- Ghost in the shell, arise, Borders 1 & 2
- trueGhost in the wires : my adventures as the world's most wanted hacker
- Ghost ship : [a novel from the NUMA files]
- trueGirl gone viral
- trueGoldstrike : a thriller
- Hacker
- trueHacker
- Hackers
- Hacking
- trueHacking Harvard
- Helpful hackers
- trueHomeland
- trueImmoral code
- Independence Day : a Dewey Andreas novel
- trueIndependence day
- trueInherit the stars
- Into the fire
- trueInto the fire
- Into the fire
- trueKingdom of lies : unnerving adventures in the world of cybercrime
- La chica que soñaba con un cerillo y un galón de gasolina
- La reina en el palacio de las corrientes de aire
- Leverage, The 2nd season
- Leverage, The 4th season
- Leverage, The final season
- Little brother
- Live free or die hard
- Live free or die hard
- Lo que no te mata te hace más fuerte
- trueMalagash
- Masters of deception : the gang that ruled cyberspace
- trueMe and Banksy
- Mona Lisa overdrive
- trueMr. Robot : red wheelbarrow
- Mr. Robot, Season 1
- Mr. Robot, Season_3.0
- Mr. Robot, Season_4.0, The final season
- Män Som Hatar Kvinnor : Girl with the Dragon Tattoo
- Neuromancer
- trueNeuromancer
- No one lives twice
- trueO pioneer!
- trueOrigami man
- trueOvernight male
- truePhantom Wheel : a Hackers novel
- Prep & Landing ; : Prep & landing : naughty vs. nice
- trueProdigal son
- Prodigal son
- Pulse
- trueRoger's version
- trueSandworm : a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers
- trueSavage road : a thriller
- Science fair
- trueSeal Team Six : hunt the dragon
- trueSeconds to live
- trueSidney Sheldon's Reckless
- trueSmooth criminals, Volume 1, Stealing time
- Sneakers
- Sneakers
- Sneakers : Les escrocs
- Someone we know : a novel
- SpaceCamp ; : WarGames
- trueSpringboard
- Stieg Larsson's Dragon tattoo trilogy
- Stieg Larssons Luftslottet som sprängdes : Stieg Larsson's The girl who kicked the hornet's nest
- trueStreams of Babel
- trueSuper Max and the mystery of Thornwood's revenge
- Swordfish
- Take-down : the pursuit and capture of Kevin Mitnick, America's most wanted computer outlaw--by the man who did it
- The 5ifth estate
- The Devil's code
- trueThe Devil's code
- trueThe Director : a novel
- trueThe Exphoria code
- trueThe accidental bad girl
- The art of deception : controlling the human element of security
- trueThe art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers
- trueThe blue nowhere
- The blue nowhere
- The blue nowhere
- trueThe drone pursuit
- The emperor's revenge
- trueThe empress file
- trueThe eye of minds
- The fifth doctrine
- trueThe fifth doctrine
- The fifth estate
- The fool's run
- The fool's run
- trueThe fox
- trueThe fox
- The girl in the spider's web
- The girl in the spider's web
- The girl in the spider's web : a Lisbeth Salander novel
- trueThe girl in the spider's web : a Lisbeth Salander novel : continuing Stieg Larsson's Millennium series
- trueThe girl who kicked the hornet's nest
- The girl who lived twice
- The girl who lived twice
- trueThe girl who lived twice
- The girl who played with fire
- trueThe girl who played with fire
- The girl who played with fire
- The girl who takes an eye for an eye
- The girl who takes an eye for an eye
- trueThe girl who takes an eye for an eye
- The girl who takes an eye for an eye
- The girl with the dragon tattoo
- The girl with the dragon tattoo
- trueThe girl with the dragon tattoo
- The girl with the dragon tattoo, Chapter 1
- trueThe hanged man's song
- The hanged man's song
- The hanged man's song : a Kidd novel
- trueThe hive
- trueThe last minute
- The matrix collection
- trueThe oracle code : a graphic novel
- trueThe oracle year : a novel
- trueThe puppet master
- trueThe short drop
- The signal
- The throwaways
- The watchman : the twisted life and crimes of serial hacker Kevin Poulsen
- trueTheir fractured light : a Starbound novel
- trueThis cruel design
- This mortal coil
- trueThis mortal coil
- This mortal coil
- trueThis vicious cure
- trueTriumphant
- Tron
- Tron
- Tron : legacy
- Tron : legacy
- Undercover soldier
- trueUntil the end
- trueWWW: Wonder
- trueWarcross
- Warcross
- trueWarcross, 01
- Wargames
- trueWe are Anonymous : inside the hacker world of Lulzsec, Anonymous, and the global cyber insurgency
- trueWe regret to inform you
- Wildcard
- trueWildcard
- Wired
- Wired : a novel
- trueYou : a novel
- trueZap!
- ZerØes
- trueZerØes
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.ccrls.org/resource/tak6zJLagjA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.ccrls.org/resource/tak6zJLagjA/">Hackers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.ccrls.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.ccrls.org/">Chemeketa Cooperative Regional Library Service (CCRLS)</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Hackers
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.ccrls.org/resource/tak6zJLagjA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.ccrls.org/resource/tak6zJLagjA/">Hackers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.ccrls.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.ccrls.org/">Chemeketa Cooperative Regional Library Service (CCRLS)</a></span></span></span></span></div>