Hackers T2

Hackers T2
ISBN-10
2897239409
ISBN-13
9782897239404
Category
Juvenile Fiction
Pages
231
Language
French
Published
2017-03-16T00:00:00-04:00
Publisher
Éditions Hurtubise
Author
Isabelle Roy

Description

Hacker aussi doué que discret, Alex a réussi à retracer son père disparu et à le rencontrer brièvement. Celui-ci lui révèle alors qu’il travaille à l’élaboration d’un certain type de codage pour ADNchaos, un puissant groupe de pirates informatiques. Il ignore toutefois ce que ces criminels veulent en faire. Déterminé à déjouer leurs conspirations, prêt à tout pour libérer son père, Alex décide de s’introduire là où ADNchaos dissimule ses serveurs...

Similar books

  • Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
    By OccupyTheWeb

    Why not start at the beginning with Linux Basics for Hackers?

  • Cybercrime and Digital Forensics: An Introduction
    By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar

    ... Anthony detectives overlooked Google search. Retrieved March 19, 2014 from www.bigstory.ap.org Baier, H. (2011/2012). On the use of hash functions in computer forensics. Retrieved from https://www.fbi.h-da.de Barrios, R. M., ...

  • SOUL HACKERS 2 Latest Guide: Best Tips, Tricks and Strategies
    By Cecilie Smed

    While it won't take you quite as long as other Atlus RPGs it can still be intimidating to know where to start. Here are tips that will help you on your journey to stop the end of the world.

  • Hack/Slash Omnibus Vol.2
    By Tim Seeley

    The HACK/SLASH collection readers have been waiting for, this second Omnibus collects the first 14 issues of the original ongoing series, and features classic slasher villains like Acid Washed and Father Wrath, as well as Cassie's first ...

  • Hacker's Delight
    By Henry S. Warren

    Compiles programming hacks intended to help computer programmers build more efficient software, in an updated edition that covers cyclic redundancy checking and new algorithms and that includes exercises with answers.

  • Hack/Slash: Resurrection Vol. 2
    By Tini Howard

    >>p/vox.7/// P/WP:2/2/57,472 Hoo 37/4/25577.2/// >/// ->ELNE ENM ExO-E2 LEE) rOA _| TIA= LNv-nVlaa2-NVHo - 3rolo[T=a -io all2 - lov'T EHL 3, LI LXE IXEN novo ID 'LEWOHaV2 *Earlø AW 'ao-I-Ove V =W =Onvo *3N2OH EHL \ H3|N|- >EAEN O I ...

  • Hacker Techniques, Tools, and Incident Handling
    By Sean-Philip Oriyano

    See graphical user interface hackers, 2, 4—9, 83, 316, 317, 331 hacking methodology, 1 5—1 6, 16f hacktivism, 7 half-open connections, 148 half-open scanning, 1 5 1 hand geometry systems, 101 hard disk killer, 2 6 1 hard drives, ...

  • Berek and Hacker’s Gynecologic Oncology
    By Jonathan Berek, Neville F. Hacker

    References 1. de Martel C, Plummer M, Vignat J, et al. Worldwide burden of cancer attributable to HPV by site, country and HPV type. Int J Cancer 2017;141(4):664–670. 2. Bray F, Ferlay J, Soerjomataram I, et al.

  • Hackers and Hacking: A Reference Handbook
    By Thomas J. Holt, Bernadette H. Schell

    (Contemporary world issues) Includes bibliographical references and index. ISBN 978–1–61069–276–2 (hard copy: alk. paper) — ISBN 978–1–61069–277–9 (ebook) 1. Computer hackers. 2. Computer crimes. 3. Computer security. 4.

  • Corporate Hacking and Technology-driven Crime
    By Thomas J. Holt, Bernadette Hlubik Schell

    Leadership: Research Findings, Practice, and Skills. ... Retrieved July 16, 2008, from http:// www.nzherald.co.nz/nz/news/article.cfm?c_ id=1&objectid=10521796 Glessner, J. T., Wang, K., Cai, G., Korvatska, O., Kim, C. E.,Wood, S., ...