Auswahl der wissenschaftlichen Literatur zum Thema „Hacking hack“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Hacking hack" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Hacking hack"
Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda und Petar Cekerevac. „Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking“. Communications - Scientific letters of the University of Zilina 20, Nr. 2 (30.06.2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Der volle Inhalt der QuellePratt, Mike. „Raptor Hacking“. Wildlife Rehabilitation Bulletin 29, Nr. 1 (30.06.2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.
Der volle Inhalt der QuelleAdzhakhunov, E. A., und O. V. Nikolaev. „UAV control hack system“. Journal of «Almaz – Antey» Air and Space Defence Corporation, Nr. 2 (23.06.2021): 35–41. http://dx.doi.org/10.38013/2542-0542-2021-2-35-41.
Der volle Inhalt der QuelleAiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips und Ruby R. Farr. „Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking“. Forensic Sciences 4, Nr. 1 (30.01.2024): 24–41. http://dx.doi.org/10.3390/forensicsci4010003.
Der volle Inhalt der QuellePisarić, Milana. „The use of policeware to hack electronic evidence in Germany and the Netherlands“. Nauka, bezbednost, policija 28, Nr. 1 (2023): 16–26. http://dx.doi.org/10.5937/nabepo28-43759.
Der volle Inhalt der QuelleFidler, David P. „The U.S. Election Hacks, Cybersecurity, and International Law“. AJIL Unbound 110 (2016): 337–42. http://dx.doi.org/10.1017/aju.2017.5.
Der volle Inhalt der QuelleUl Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar und Mahnoor Arshad. „The Impacts of Ethical Hacking and its Security Mechanisms“. Pakistan Journal of Engineering and Technology 5, Nr. 4 (29.12.2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.
Der volle Inhalt der QuelleHussain, Syed Muzaffar. „AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS“. Journal of Correctional Issues 5, Nr. 1 (16.08.2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.
Der volle Inhalt der QuelleBohnsack, René, und Meike Malena Liesner. „What the hack? A growth hacking taxonomy and practical applications for firms“. Business Horizons 62, Nr. 6 (November 2019): 799–818. http://dx.doi.org/10.1016/j.bushor.2019.09.001.
Der volle Inhalt der QuelleJordan, Tim. „A genealogy of hacking“. Convergence: The International Journal of Research into New Media Technologies 23, Nr. 5 (06.04.2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.
Der volle Inhalt der QuelleDissertationen zum Thema "Hacking hack"
Cui, Zhiqiang. „Security Incidents in an Academic Setting: A Case Study“. Digital Commons @ East Tennessee State University, 2002. https://dc.etsu.edu/etd/664.
Der volle Inhalt der QuelleAxelsson, Andreas. „Bluetoothsäkerhet, neglegerad eller (o)kunskap“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131.
Der volle Inhalt der QuelleFransén, Johan, und Adnan Sorlija. „Hacka dig själv och upptäck attacker“. Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20852.
Der volle Inhalt der QuelleThis thesis is based on the idea of hacking your own system before an outside hacker does it to find the system vulnerabilities. This is done with an automated hacking tool that performs penetration tests against the created website. The database technology that is used is the event database Event Store that stores every event that take place against the website. The task of Event Store in this case is to discover the different penetration tests and to store the events and to give indications to the administrator that the website was under attack. The study is primarily aimed at finding out whether Event Store is advisable to implement with a website where different penetration testing shall be made, and what the advantages and disadvantages are to using Event Store. Results show that Event Store can be used to identify anomalies against a website during attacks. Intrusions against the website can with great probability be proven with the help of the developed system with Event Store.
Naarden, Lydia. „User acquisition growth hacks for startups : A case study“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230970.
Der volle Inhalt der QuelleThis study discusses several methods that startups can use to acquire new users for their product or service, from the perspective of a startup that forms the case study of this research and in comparison to other companies. As many startups are currently emerging, they seek cost-efficient ways for their company to grow. Companies such as Airbnb and Facebook used growth hacking when they started and lacked sufficient resources. Many blogs have been written about this phenomenon, but there is a lack of scientific research examining what needs to be done or considered. This research aims to contribute to filling that gap in relation to user acquisition. For six weeks, several strategies adopted by companies were tested at Locallife to determine which ones worked. The collected data were analysed and used for optimisations. Growth-hacking practices were performed on Facebook to identify which hacks lead to growth. The results show that the social media content calendar barely led to any conversions: after three weeks of execution and observation, the number of people that onboarded was unsatisfactory. However, local targeting content yielded satisfying results. Content with which the user can associate is more likely to attract the user's attention than general information about the product or service. Further, not only the tone of the campaign makes a difference for the audience; also the call to action influences people’s decision to onboard and the performance of the product or service. These findings are significant because they offer beginners and companies a perspective on which issues to consider when they decide to growth hack. Also, while many methods are discussed in blogs, only a few explain which adjustments were made before reaching a particular result, making it seem as if everything happened in one go. This research aims to explore the concept and show the efforts that need to be made for a startup to reach sustainable growth.
Barth, Klaus [Verfasser], B. [Gutachter] Kramp, T. [Gutachter] Hacki und W. [Gutachter] Seidner. „Funktionelle postoperative Befunde bei Patienten mit oropharyngealen Tumoren / Klaus Barth ; Gutachter: B. Kramp, T. Hacki, W. Seidner“. Berlin : Humboldt-Universität zu Berlin, 2001. http://d-nb.info/1207626155/34.
Der volle Inhalt der QuelleAlvarez, Juliana. „Vers le Design hacké : la nécessité d’une nouvelle posture épistémologique“. Thèse, 2017. http://hdl.handle.net/1866/19275.
Der volle Inhalt der QuelleToday’s hypermodern working environment is experiencing important social, environmental and technological changes pressing actors to acquire the know-how to solve complex problems. The new philosophy of "doing" and the rise of working collaboration strategies arising in our hypermodern society are not systematically reflected in design’s practice. Indeed, by trying to keep pace with a world in constant change, today's design discipline is struggling to keep up. The theories on collaborative innovation present some answers to develop this know-how by advocating a practice that deploys fluidity in projects or, in other words, an eco-auto-re-organisational strategy. However, in the absence of a practical and operational tool, collaborative innovation is still at the conceptual and utopian stage. This thesis aims to rethink project management in our hypermodern world. Starting from a specific example, the Hackathon, it explores new ways of thinking, doing and creating solutions based on an entirely innovative dynamics, grounded on an ethic and a practice specific to the new society of "doing" and inspired, in particular, by the hackers. The Hackathon is thus analyzed through an analytic grid called the Gyroscope of the project through which the actors, the actions and the organisation of the project are evaluated. The Gyroscope makes it possible to identify the project’s components in relation to each other and to understand the requirements needed to carry out each project according to the theoretical indicators of collaborative innovation. The analysis not only demonstrates that the Hackathon is indeed a concrete application of a new work ethic, but that its strength is in the early stages of the project’s conceptualization. The question that this analysis raises is: Is it possible to consider extending it to the whole development process, from ideation to implementation? This research presents an archaeological reading of the discipline of design which allows to identify the emblematic figures of the project through the historical periods that marked the design. The proposal of a new figure, the Hacking design, highlights the impact of hypermodernism's transformations on the practice of this discipline and the role of the practitioner, thus concluding that Design Thinking is now overtaken by an ethic of work that goes beyond a way of thinking, but involves a new epistemological posture. Many disciplines contiguous to Design, including Management, Entrepreneurship and Engineering, have therefore a strong interest in Design, which they perceive as a response to the success of collaborative innovation within organizations. The expectations towards the discipline of Design, from its theory to its practice are, therefore, very high.
Bücher zum Thema "Hacking hack"
Kent, Nabors, Hrsg. Dissecting the hack: The f0rb1dd3n network. Burlington, MA: Syngress, 2010.
Den vollen Inhalt der Quelle findenKnaster, Scott. Hacking MAC OS X Tiger: Serious hacks, mods and customizations. Indianapolis, Ind: Wiley, 2005.
Den vollen Inhalt der Quelle findenAL-smadi, Yacoub. Hacking: Android Hack. Independently Published, 2020.
Den vollen Inhalt der Quelle findenBuku Sakti Hacker. Efvy Zam, 2011.
Den vollen Inhalt der Quelle findenHacking: Ultimate Hacking for Beginners, How to Hack. CreateSpace Independent Publishing Platform, 2015.
Den vollen Inhalt der Quelle findenPrakash, Abhijeet. Hack the World - Ethical Hacking. Lulu Press, Inc., 2015.
Den vollen Inhalt der Quelle findenSolimene, Giacomo. I Hack You: Prontuario Del Hacking. Independently Published, 2018.
Den vollen Inhalt der Quelle findenWagner, Alex. Hacking: How to Hack Web Apps. Independently Published, 2020.
Den vollen Inhalt der Quelle findenHacking : Hacking for Beginners and Basic Security: How to Hack. Lulu Press, Inc., 2016.
Den vollen Inhalt der Quelle findenEncyclopedia of hacking: Headline makers, hack attacks and hacking solutions. Greenwood Publishing Group: ABC-CLIO, LLC, 2005.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Hacking hack"
Varsalone, Jesse, und Christopher Haller. „Web Application Hacking and Defense“. In The Hack Is Back, 49–99. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-3.
Der volle Inhalt der QuelleVarsalone, Jesse, und Christopher Haller. „Hacking and Securing Your Operating System“. In The Hack Is Back, 1–20. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-1.
Der volle Inhalt der QuelleAnderie, Lutz. „Game Hacking: Von der Raubkopie zum Cybercrime Game Hack“. In Quick Guide Game Hacking, Blockchain und Monetarisierung, 1–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60859-3_1.
Der volle Inhalt der QuelleSontopski, Natalie. „Hack back! Die historische Abwertung von Queerness bei KI und Potenziale des ›hacking back‹“. In KI-Kritik / AI Critique, 121–36. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839461891-007.
Der volle Inhalt der QuelleGoodman, Marc. „Kapitel 12: Wenn man alles hacken kann“. In Global Hack, 289–309. München: Carl Hanser Verlag GmbH & Co. KG, 2015. http://dx.doi.org/10.3139/9783446444645.012.
Der volle Inhalt der QuelleBritton, Ren Loren, und Isabel Paehr. „What is it, I do(n't) not know? I (we) do not know (but will feel) the name“. In Doing Research - Wissenschaftspraktiken zwischen Positionierung und Suchanfrage, 288–95. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839456323-035.
Der volle Inhalt der Quelle„Hardware Hacking“. In Hack Proofing Your Network, 609–54. Elsevier, 2002. http://dx.doi.org/10.1016/b978-192899470-1/50017-3.
Der volle Inhalt der Quelle„How Hackers Hack“. In Hacking the Hacker, 9–21. Indianapolis, Indiana: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119396260.ch2.
Der volle Inhalt der QuelleRussell. „Hacking Methodology“. In Hack Proofing Your Web Applications, 1–41. Elsevier, 2001. http://dx.doi.org/10.1016/b978-192899431-2/50005-6.
Der volle Inhalt der QuelleGrand, Joe, Ryan Russell, Kevin D. Mitnick, Andrew “bunnie” Huang, Lee Barken, Marcus R. Brown, Job de Haas et al. „Hack Your Atari 2600 and 7800“. In Hardware Hacking, 199–245. Elsevier, 2004. http://dx.doi.org/10.1016/b978-193226683-2/50013-2.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Hacking hack"
Vinjosh Reddy, S., K. Sai Ramani, K. Rijutha, Sk Mohammad Ali und CH Pradeep Reddy. „Wireless hacking - a WiFi hack by cracking WEP“. In 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529269.
Der volle Inhalt der QuelleBorgia, S. „HACK: a Holistic modeling Approach for Cubesat cyberattacKs“. In Aerospace Science and Engineering. Materials Research Forum LLC, 2023. http://dx.doi.org/10.21741/9781644902677-41.
Der volle Inhalt der QuelleYunitasari, Yessi, Latjuba S. T. T. Sofyana und Maria Ulfah Siregar. „Cyber Crime Identifying Using Machine Learning Techniques - Based Sentiment Analysis“. In The 6th International Conference on Science and Engineering. Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-j46rcy.
Der volle Inhalt der Quelle