1
Published 2014
O'Reilly Media

2
by Easttom, Chuck
Published 2011
Pearson
Table of Contents: ... -- Denial of service attacks -- Malware -- Techniques used by hackers -- Industrial espionage in cyberspace...