Literatura académica sobre el tema "Hacking hack"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Hacking hack".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Hacking hack"
Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda y Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking". Communications - Scientific letters of the University of Zilina 20, n.º 2 (30 de junio de 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Texto completoPratt, Mike. "Raptor Hacking". Wildlife Rehabilitation Bulletin 29, n.º 1 (30 de junio de 2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.
Texto completoAdzhakhunov, E. A. y O. V. Nikolaev. "UAV control hack system". Journal of «Almaz – Antey» Air and Space Defence Corporation, n.º 2 (23 de junio de 2021): 35–41. http://dx.doi.org/10.38013/2542-0542-2021-2-35-41.
Texto completoAiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips y Ruby R. Farr. "Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking". Forensic Sciences 4, n.º 1 (30 de enero de 2024): 24–41. http://dx.doi.org/10.3390/forensicsci4010003.
Texto completoPisarić, Milana. "The use of policeware to hack electronic evidence in Germany and the Netherlands". Nauka, bezbednost, policija 28, n.º 1 (2023): 16–26. http://dx.doi.org/10.5937/nabepo28-43759.
Texto completoFidler, David P. "The U.S. Election Hacks, Cybersecurity, and International Law". AJIL Unbound 110 (2016): 337–42. http://dx.doi.org/10.1017/aju.2017.5.
Texto completoUl Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar y Mahnoor Arshad. "The Impacts of Ethical Hacking and its Security Mechanisms". Pakistan Journal of Engineering and Technology 5, n.º 4 (29 de diciembre de 2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.
Texto completoHussain, Syed Muzaffar. "AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS". Journal of Correctional Issues 5, n.º 1 (16 de agosto de 2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.
Texto completoBohnsack, René y Meike Malena Liesner. "What the hack? A growth hacking taxonomy and practical applications for firms". Business Horizons 62, n.º 6 (noviembre de 2019): 799–818. http://dx.doi.org/10.1016/j.bushor.2019.09.001.
Texto completoJordan, Tim. "A genealogy of hacking". Convergence: The International Journal of Research into New Media Technologies 23, n.º 5 (6 de abril de 2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.
Texto completoTesis sobre el tema "Hacking hack"
Cui, Zhiqiang. "Security Incidents in an Academic Setting: A Case Study". Digital Commons @ East Tennessee State University, 2002. https://dc.etsu.edu/etd/664.
Texto completoAxelsson, Andreas. "Bluetoothsäkerhet, neglegerad eller (o)kunskap". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131.
Texto completoFransén, Johan y Adnan Sorlija. "Hacka dig själv och upptäck attacker". Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20852.
Texto completoThis thesis is based on the idea of hacking your own system before an outside hacker does it to find the system vulnerabilities. This is done with an automated hacking tool that performs penetration tests against the created website. The database technology that is used is the event database Event Store that stores every event that take place against the website. The task of Event Store in this case is to discover the different penetration tests and to store the events and to give indications to the administrator that the website was under attack. The study is primarily aimed at finding out whether Event Store is advisable to implement with a website where different penetration testing shall be made, and what the advantages and disadvantages are to using Event Store. Results show that Event Store can be used to identify anomalies against a website during attacks. Intrusions against the website can with great probability be proven with the help of the developed system with Event Store.
Naarden, Lydia. "User acquisition growth hacks for startups : A case study". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230970.
Texto completoThis study discusses several methods that startups can use to acquire new users for their product or service, from the perspective of a startup that forms the case study of this research and in comparison to other companies. As many startups are currently emerging, they seek cost-efficient ways for their company to grow. Companies such as Airbnb and Facebook used growth hacking when they started and lacked sufficient resources. Many blogs have been written about this phenomenon, but there is a lack of scientific research examining what needs to be done or considered. This research aims to contribute to filling that gap in relation to user acquisition. For six weeks, several strategies adopted by companies were tested at Locallife to determine which ones worked. The collected data were analysed and used for optimisations. Growth-hacking practices were performed on Facebook to identify which hacks lead to growth. The results show that the social media content calendar barely led to any conversions: after three weeks of execution and observation, the number of people that onboarded was unsatisfactory. However, local targeting content yielded satisfying results. Content with which the user can associate is more likely to attract the user's attention than general information about the product or service. Further, not only the tone of the campaign makes a difference for the audience; also the call to action influences people’s decision to onboard and the performance of the product or service. These findings are significant because they offer beginners and companies a perspective on which issues to consider when they decide to growth hack. Also, while many methods are discussed in blogs, only a few explain which adjustments were made before reaching a particular result, making it seem as if everything happened in one go. This research aims to explore the concept and show the efforts that need to be made for a startup to reach sustainable growth.
Barth, Klaus [Verfasser], B. [Gutachter] Kramp, T. [Gutachter] Hacki y W. [Gutachter] Seidner. "Funktionelle postoperative Befunde bei Patienten mit oropharyngealen Tumoren / Klaus Barth ; Gutachter: B. Kramp, T. Hacki, W. Seidner". Berlin : Humboldt-Universität zu Berlin, 2001. http://d-nb.info/1207626155/34.
Texto completoAlvarez, Juliana. "Vers le Design hacké : la nécessité d’une nouvelle posture épistémologique". Thèse, 2017. http://hdl.handle.net/1866/19275.
Texto completoToday’s hypermodern working environment is experiencing important social, environmental and technological changes pressing actors to acquire the know-how to solve complex problems. The new philosophy of "doing" and the rise of working collaboration strategies arising in our hypermodern society are not systematically reflected in design’s practice. Indeed, by trying to keep pace with a world in constant change, today's design discipline is struggling to keep up. The theories on collaborative innovation present some answers to develop this know-how by advocating a practice that deploys fluidity in projects or, in other words, an eco-auto-re-organisational strategy. However, in the absence of a practical and operational tool, collaborative innovation is still at the conceptual and utopian stage. This thesis aims to rethink project management in our hypermodern world. Starting from a specific example, the Hackathon, it explores new ways of thinking, doing and creating solutions based on an entirely innovative dynamics, grounded on an ethic and a practice specific to the new society of "doing" and inspired, in particular, by the hackers. The Hackathon is thus analyzed through an analytic grid called the Gyroscope of the project through which the actors, the actions and the organisation of the project are evaluated. The Gyroscope makes it possible to identify the project’s components in relation to each other and to understand the requirements needed to carry out each project according to the theoretical indicators of collaborative innovation. The analysis not only demonstrates that the Hackathon is indeed a concrete application of a new work ethic, but that its strength is in the early stages of the project’s conceptualization. The question that this analysis raises is: Is it possible to consider extending it to the whole development process, from ideation to implementation? This research presents an archaeological reading of the discipline of design which allows to identify the emblematic figures of the project through the historical periods that marked the design. The proposal of a new figure, the Hacking design, highlights the impact of hypermodernism's transformations on the practice of this discipline and the role of the practitioner, thus concluding that Design Thinking is now overtaken by an ethic of work that goes beyond a way of thinking, but involves a new epistemological posture. Many disciplines contiguous to Design, including Management, Entrepreneurship and Engineering, have therefore a strong interest in Design, which they perceive as a response to the success of collaborative innovation within organizations. The expectations towards the discipline of Design, from its theory to its practice are, therefore, very high.
Libros sobre el tema "Hacking hack"
Kent, Nabors, ed. Dissecting the hack: The f0rb1dd3n network. Burlington, MA: Syngress, 2010.
Buscar texto completoKnaster, Scott. Hacking MAC OS X Tiger: Serious hacks, mods and customizations. Indianapolis, Ind: Wiley, 2005.
Buscar texto completoAL-smadi, Yacoub. Hacking: Android Hack. Independently Published, 2020.
Buscar texto completoBuku Sakti Hacker. Efvy Zam, 2011.
Buscar texto completoHacking: Ultimate Hacking for Beginners, How to Hack. CreateSpace Independent Publishing Platform, 2015.
Buscar texto completoPrakash, Abhijeet. Hack the World - Ethical Hacking. Lulu Press, Inc., 2015.
Buscar texto completoSolimene, Giacomo. I Hack You: Prontuario Del Hacking. Independently Published, 2018.
Buscar texto completoWagner, Alex. Hacking: How to Hack Web Apps. Independently Published, 2020.
Buscar texto completoHacking : Hacking for Beginners and Basic Security: How to Hack. Lulu Press, Inc., 2016.
Buscar texto completoEncyclopedia of hacking: Headline makers, hack attacks and hacking solutions. Greenwood Publishing Group: ABC-CLIO, LLC, 2005.
Buscar texto completoCapítulos de libros sobre el tema "Hacking hack"
Varsalone, Jesse y Christopher Haller. "Web Application Hacking and Defense". En The Hack Is Back, 49–99. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-3.
Texto completoVarsalone, Jesse y Christopher Haller. "Hacking and Securing Your Operating System". En The Hack Is Back, 1–20. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-1.
Texto completoAnderie, Lutz. "Game Hacking: Von der Raubkopie zum Cybercrime Game Hack". En Quick Guide Game Hacking, Blockchain und Monetarisierung, 1–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60859-3_1.
Texto completoSontopski, Natalie. "Hack back! Die historische Abwertung von Queerness bei KI und Potenziale des ›hacking back‹". En KI-Kritik / AI Critique, 121–36. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839461891-007.
Texto completoGoodman, Marc. "Kapitel 12: Wenn man alles hacken kann". En Global Hack, 289–309. München: Carl Hanser Verlag GmbH & Co. KG, 2015. http://dx.doi.org/10.3139/9783446444645.012.
Texto completoBritton, Ren Loren y Isabel Paehr. "What is it, I do(n't) not know? I (we) do not know (but will feel) the name". En Doing Research - Wissenschaftspraktiken zwischen Positionierung und Suchanfrage, 288–95. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839456323-035.
Texto completo"Hardware Hacking". En Hack Proofing Your Network, 609–54. Elsevier, 2002. http://dx.doi.org/10.1016/b978-192899470-1/50017-3.
Texto completo"How Hackers Hack". En Hacking the Hacker, 9–21. Indianapolis, Indiana: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119396260.ch2.
Texto completoRussell. "Hacking Methodology". En Hack Proofing Your Web Applications, 1–41. Elsevier, 2001. http://dx.doi.org/10.1016/b978-192899431-2/50005-6.
Texto completoGrand, Joe, Ryan Russell, Kevin D. Mitnick, Andrew “bunnie” Huang, Lee Barken, Marcus R. Brown, Job de Haas et al. "Hack Your Atari 2600 and 7800". En Hardware Hacking, 199–245. Elsevier, 2004. http://dx.doi.org/10.1016/b978-193226683-2/50013-2.
Texto completoActas de conferencias sobre el tema "Hacking hack"
Vinjosh Reddy, S., K. Sai Ramani, K. Rijutha, Sk Mohammad Ali y CH Pradeep Reddy. "Wireless hacking - a WiFi hack by cracking WEP". En 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529269.
Texto completoBorgia, S. "HACK: a Holistic modeling Approach for Cubesat cyberattacKs". En Aerospace Science and Engineering. Materials Research Forum LLC, 2023. http://dx.doi.org/10.21741/9781644902677-41.
Texto completoYunitasari, Yessi, Latjuba S. T. T. Sofyana y Maria Ulfah Siregar. "Cyber Crime Identifying Using Machine Learning Techniques - Based Sentiment Analysis". En The 6th International Conference on Science and Engineering. Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-j46rcy.
Texto completo