Literatura académica sobre el tema "Hacking hack"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Hacking hack".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Hacking hack"

1

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda y Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking". Communications - Scientific letters of the University of Zilina 20, n.º 2 (30 de junio de 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Texto completo
Resumen
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Pratt, Mike. "Raptor Hacking". Wildlife Rehabilitation Bulletin 29, n.º 1 (30 de junio de 2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.

Texto completo
Resumen
In the raptor rehabilitation field, hacking is a special procedure for raising juvenile raptors that simulates natural fledging and allows young raptors—those that cannot yet fly and either are still restricted to or just leaving the nest—a gradual acclimation to independence. Hacking also is known as a ‘soft release.’ This paper focuses on hacking raptors and discusses advantages, disadvantages, hacking age, procedures, hack box design and construction, site selection, fledging age of raptor species, and hack release.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Adzhakhunov, E. A. y O. V. Nikolaev. "UAV control hack system". Journal of «Almaz – Antey» Air and Space Defence Corporation, n.º 2 (23 de junio de 2021): 35–41. http://dx.doi.org/10.38013/2542-0542-2021-2-35-41.

Texto completo
Resumen
The paper presents an alternative solution to the problem of drone hacking over a radio channel and uses signal spoofing of a global positioning system (GPS, GLONASS). Within the framework of the study, block diagram and operation algorithm of the system were developed and experimental data were obtained.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Aiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips y Ruby R. Farr. "Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking". Forensic Sciences 4, n.º 1 (30 de enero de 2024): 24–41. http://dx.doi.org/10.3390/forensicsci4010003.

Texto completo
Resumen
Adolescents are currently the most digitally connected generation in history. There is an ever-growing need to understand how typical adolescent risk-taking intersects with the vastly criminogenic potential of digital technology. Criminal hacking in older adolescents (16–19-year-olds) was assessed using an adapted Theory of Planned Behaviour (TPB) model, a cohesive theoretical framework that incorporates cognitive processes and human drivers (informed by psychology, cyberpsychology, and criminology theory). In 2021, a large-scale anonymous online survey was conducted across nine European countries. Criminal hacking was assessed using data from 3985 participants (M = 1895, 47.55%; F = 1968, 49.39%). This study formulated a powerful predictive model of youth hacking intention (accounting for 38.8% of the variance) and behaviour (accounting for 33.6% of the variance). A significant minority, approximately one in six (16.34%), were found to have engaged in hacking, and approximately 2% reported engaging in hacking often or very often. Increased age, being male, and offline deviant behaviour were significant predictors of hacking behaviour. In line with the TPB, intention was the strongest individual predictor of hacking behaviour, which in turn was significantly predicted by cognitive processes accounted for by TPB constructs: subjective norms of family and peers, attitudes towards hacking, and perceived behavioural control. These TPB constructs were found to be significantly associated with human factors of risk-taking, toxic online disinhibition, offline deviant behaviour, and demographic variables of age and gender. Implications for future research, interventions, policy, and practice are discussed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Pisarić, Milana. "The use of policeware to hack electronic evidence in Germany and the Netherlands". Nauka, bezbednost, policija 28, n.º 1 (2023): 16–26. http://dx.doi.org/10.5937/nabepo28-43759.

Texto completo
Resumen
Hacking as manipulation of software, data, computer system or network without the knowledge and permission of the user constitutes an act of criminal offence. However, given that certain technological tendencies make it difficult/impossible to collect electronic evidence, the question arises as to whether the authorities responsible for detecting and proving criminal offenses should be authorized to hack, i.e. to conduct investigations in the digital environment in such a way that they would be authorized to exploit technical, systemic and human vulnerabilities within the IT system, without knowledge and permission of the user, in order to gain a remote access to protected system and conduct further actions. Although a state authorities' hacking with the aim of collecting electronic evidence carries immense risks for information security and human rights and freedoms with it, one cannot dispute that the deployment of such techniques might be useful in criminal investigations. However, the application of hacking technique would not per se violate the right to privacy and other guaranteed rights and freedoms, only as far as such interference is properly regulated. Hence, the legal framework should explicitly regulate the lawful hacking as a special investigative measure, especially the conditions that should be met and mechanisms that should be applied. As hacking for the purposes of criminal investigation may be performed through various techniques, this paper focuses on a hacking technique based on a malware, and its regulations in two countries with explicit provisions - Germany and the Netherlands.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Fidler, David P. "The U.S. Election Hacks, Cybersecurity, and International Law". AJIL Unbound 110 (2016): 337–42. http://dx.doi.org/10.1017/aju.2017.5.

Texto completo
Resumen
In October 2016, the United States accused Russia of hacking political organizations involved in the U.S. elections and leaking pilfered information to influence the outcome. In December, President Obama imposed sanctions for the hacking. This incident damaged President Obama's cybersecurity legacy. The “hack and leak” campaign targeted American self-government—a challenge to his administration's promotion of democracy in cyberspace. It created problems for the president's emphasis on international law and norms as “rules of the road” for cybersecurity. The episode exposed failures in his attempts to make deterrence an important instrument of U.S. cybersecurity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Ul Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar y Mahnoor Arshad. "The Impacts of Ethical Hacking and its Security Mechanisms". Pakistan Journal of Engineering and Technology 5, n.º 4 (29 de diciembre de 2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.

Texto completo
Resumen
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived in a digital world, we need to protect our privacy from cyber-attacks. The proposed paper discussed ethical hacking and its ramifications, in which black hackers "hack" networks. The proposed research emphasizes ethical hacking tactics. This research also examines the impact of ethical hacking on business, education, health, society, the workplace, technology, sensitive information, and human life. Finally, a brief survey based on certain questions is better to grasp the public's understanding of ethical hacking. In summary, this research offers the user fascinating and helpful information when working on ethical hacking.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Hussain, Syed Muzaffar. "AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS". Journal of Correctional Issues 5, n.º 1 (16 de agosto de 2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.

Texto completo
Resumen
This paper considers two different classes of computer hackers, with a special emphasis on disparate motivations of hacking. Hackers’ psychology widely discussed in the media is almost entirely unexplored by psychologists. In this study, hackers’ and crackers’ motivation is investigated, using the study of values scale. One hundred and fourteen participants completed our online research instrument. The study of values and demographic data were questioned. Participants were categorized as hackers and crackers through their responses on two items questioned in the demographic datasheet. Results indicated that hackers were found higher on the motivations of seeking knowledge, aesthetic sense, social interactions, and mysticism while crackers were found more motivated due to their economical and political interests. Findings suggested that hackers hack for the thrill of learning and gathering information to gain intelligence. Hackers hack to make society a better place to live. Compared to hackers, crackers are incapable of normal social interactions, and their hacking is based on the motivations of getting money and power.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Bohnsack, René y Meike Malena Liesner. "What the hack? A growth hacking taxonomy and practical applications for firms". Business Horizons 62, n.º 6 (noviembre de 2019): 799–818. http://dx.doi.org/10.1016/j.bushor.2019.09.001.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Jordan, Tim. "A genealogy of hacking". Convergence: The International Journal of Research into New Media Technologies 23, n.º 5 (6 de abril de 2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.

Texto completo
Resumen
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This article proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame, a history of hacking will be proposed in four phases. The first phase is the ‘prehistory’ of hacking in which four core practices were developed. The second phase is the ‘golden age of cracking’ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad ‘clever’ practice. In conclusion, it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information technocultures enacted by each hacker practice situating itself within a particular technoculture and then using that technoculture to change itself, both in changing potential actions that can be taken and changing the nature of the technoculture itself.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Hacking hack"

1

Cui, Zhiqiang. "Security Incidents in an Academic Setting: A Case Study". Digital Commons @ East Tennessee State University, 2002. https://dc.etsu.edu/etd/664.

Texto completo
Resumen
Academic institutes' networks, like commercial networks, have confidential and valuable information that attracts hackers. From 6 October 2000 to 29 March 2001, the authors collected data on possible attacks and probes against East Tennessee State University's campus network. The number of suspicious activities detected daily varied from 200,000 to more than 2,000,000, with ICMP-based attacks accounting for more than 81% of all attacks. While ICMP-based attacks were reasonably harmless, these activities as a whole depleted network bandwidth significantly. Severe attacks were detected daily. Port scans and host scans that involving 2 or more /24 subnets were detected every week. Attacks and probes were distributed throughout a typical day and week. Our research results suggested policy makers in academic institutions like ETSU should adopt standard measures to secure campus networks, including firewalls, intrusion detection systems, server management, and risk assessment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Axelsson, Andreas. "Bluetoothsäkerhet, neglegerad eller (o)kunskap". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131.

Texto completo
Resumen
Under 2017 hittades sårbarheten Blueborne som gjorde att en person kunde ta sig in i mobiltelefoner eller datorer helt obemärkt genom att enheten endast ha igång bluetooth. Bluetoothsäkerheten behövs tas på minst lika stort allvar som alla andra enheter som tillexempel wifi eller annan trådlös utrustning som kan äventyra att information hamnar i orätta händer, för skulle felaktig information nå en person med ont uppsåt så skulle konsekvenserna vara förödande för privatpersoner eller för företag. Denna uppsats behandlar frågor genom att intervjua personer på företag och genom enkätundersökning, det har påvisats att majoriteten av företag har bristande kunskap eller saknar någonting som kan varna en användare eller administratör vid en attack. Diskussion kring attackers potentiella förödelse mot företag när det kommer kring information och drift och hur det går att skydda sig.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Fransén, Johan y Adnan Sorlija. "Hacka dig själv och upptäck attacker". Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20852.

Texto completo
Resumen
Denna uppsats bygger på idén om att hacka det egna systemet före en utomstående hackare gör det för att upptäcka systemets läckor. Detta görs med ett automatiserat hackingverktyg som utför penetrationstester mot en utvecklad hemsida. Lagringstekniken som används är en eventdatabas med namnet Event Store som lagrar varje händelse som skedde mot hemsidan. Syftet med Event Store är att upptäcka de olika penetrationstesterna och lagra dess händelser för att sedan ge indikationer till administratören att hemsidan var under attack. Uppsatsen riktar sig främst på ifall Event Store är lämpligt att implementera tillsammans med en hemsida som blir attackerad med penetrationstester och vilka för- och nackdelar det finns med att använda Event Store. Resultatet visar att Event Store kan användas för att identifiera anomalier mot en hemsida vid hackingattacker. Med stor sannolikhet kan intrång mot hemsidan bevisas med hjälp utav det utvecklade systemet med Event Store.
This thesis is based on the idea of hacking your own system before an outside hacker does it to find the system vulnerabilities. This is done with an automated hacking tool that performs penetration tests against the created website. The database technology that is used is the event database Event Store that stores every event that take place against the website. The task of Event Store in this case is to discover the different penetration tests and to store the events and to give indications to the administrator that the website was under attack. The study is primarily aimed at finding out whether Event Store is advisable to implement with a website where different penetration testing shall be made, and what the advantages and disadvantages are to using Event Store. Results show that Event Store can be used to identify anomalies against a website during attacks. Intrusions against the website can with great probability be proven with the help of the developed system with Event Store.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Naarden, Lydia. "User acquisition growth hacks for startups : A case study". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230970.

Texto completo
Resumen
Den här studien diskuterar metoder som startups kan använda sig av vid förvärvande av nya användare för sina produkter eller tjänster. Studien utgörs av en fallstudie baserat på en startups perspektiv och jämför denna med andra verksamheter. Då många startups är under framväxt söker de kostnadseffektivametoder för att få sin verksamhet att växa. Företag som Airbnb och Facebook använde "growth-hacking" under sina inledande faser då de saknade resurser. Många bloggar har skrivit om fenomenet, men det saknas ännu vetenskaplig forskning kring vad som är nödvändigt att utföra och ta hänsyn till. Den här studien ämnar bidra med insikter som saknas rörande förvärvande av användare. Under sex veckor testades flera olika strategier på Locallife. Dessa strategier har sedan tidigare varit beprövade av andra företag. Insamlad data blev analyserad och använd för optimering. Growth-hacking-strategier blev utförda på Facebook för att identifiera vilka metoder som åstadkom tillväxt av användare. Resultaten visade att kalendrar på sociala medier knappt ledde till några konverteringar: efter tre veckor av utförande och observation var antalet nya användare inte tillfredsställande. Däremot var lokalt anpassat marknadsföringsinnehåll effektivt och gav tillfredsställande resultat. Innehåll som användare kan relatera till är mer sannolikt att attrahera användarens uppmärksamhet än generell information om produkten eller tjänsten. Dessutom är den inte enbart kampanjens ton som påverkar åhörare: sättet att uttrycka sig på för att uppmana personer till handling påverkar individers beslut om att ansluta sig till produkten eller tjänsten. Dessa resultat är betydelsefulla då de erbjuder nybörjare och företag ett perspektiv på vilka frågor och problem som måste tas hänsyn till när de avser att utöka antalet användare. Dessutom, trots att många metoder är diskuterade i bloggar är det ytterst få som förklarar vilka justeringar som genomfördes för att nå ett specifikt resultat. Detta har fått det att framstå som att höga resultat har åstadkommits omedelbart. Den här studien ämnar utforska konceptet growth-hacking och framhäva ansträngningarna som krävs för att en startup ska nå hållbar tillväxt.
This study discusses several methods that startups can use to acquire new users for their product or service, from the perspective of a startup that forms the case study of this research and in comparison to other companies. As many startups are currently emerging, they seek cost-efficient ways for their company to grow. Companies such as Airbnb and Facebook used growth hacking when they started and lacked sufficient resources. Many blogs have been written about this phenomenon, but there is a lack of scientific research examining what needs to be done or considered. This research aims to contribute to filling that gap in relation to user acquisition. For six weeks, several strategies adopted by companies were tested at Locallife to determine which ones worked. The collected data were analysed and used for optimisations. Growth-hacking practices were performed on Facebook to identify which hacks lead to growth. The results show that the social media content calendar barely led to any conversions: after three weeks of execution and observation, the number of people that onboarded was unsatisfactory. However, local targeting content yielded satisfying results. Content with which the user can associate is more likely to attract the user's attention than general information about the product or service. Further, not only the tone of the campaign makes a difference for the audience; also the call to action influences people’s decision to onboard and the performance of the product or service. These findings are significant because they offer beginners and companies a perspective on which issues to consider when they decide to growth hack. Also, while many methods are discussed in blogs, only a few explain which adjustments were made before reaching a particular result, making it seem as if everything happened in one go. This research aims to explore the concept and show the efforts that need to be made for a startup to reach sustainable growth.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Barth, Klaus [Verfasser], B. [Gutachter] Kramp, T. [Gutachter] Hacki y W. [Gutachter] Seidner. "Funktionelle postoperative Befunde bei Patienten mit oropharyngealen Tumoren / Klaus Barth ; Gutachter: B. Kramp, T. Hacki, W. Seidner". Berlin : Humboldt-Universität zu Berlin, 2001. http://d-nb.info/1207626155/34.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Alvarez, Juliana. "Vers le Design hacké : la nécessité d’une nouvelle posture épistémologique". Thèse, 2017. http://hdl.handle.net/1866/19275.

Texto completo
Resumen
Face aux mutations sociales, environnementales et technologiques de notre société, la capacité de résoudre les problèmes complexes devient un incontournable. Les nouvelles philosophies du « faire » et l’élan collaboratif au sein du milieu de travail hypermoderne ne se reflètent pas systématiquement dans le design. En essayant de suivre le rythme d’un monde en transformation constante, le design d’aujourd’hui peine à se mettre à jour. Les théories portant sur l’innovation collaborative présentent des réponses pour répondre aux problèmes complexes en prônant la pratique d’une conduite à projet fluide, ou autrement dit, éco-auto-ré-organisationnelle. Or, faute d’outil opératoire, l’innovation collaborative reste encore au stade conceptuel, voire utopique. Cette thèse a comme objectif d’apporter une réflexion sur les conduites de et à projet en design dans le monde d’aujourd’hui. Partant d’un exemple précis, à savoir le Hackathon, elle explore les nouvelles façons de penser, de faire et de créer des solutions à partir d’une dynamique tout à fait innovatrice, basée sur une éthique et une pratique propre à la nouvelle société du « faire » inspirée, notamment, des hackers. Le Hackathon est ainsi analysé à travers une grille d’analyse nommée le Gyroscope du projet qui permet de souligner les principaux éléments constitutifs de la conduite à projet en relation les uns avec les autres et de saisir les spécificités requises pour que la conduite puisse répondre aux indicateurs théoriques de l’innovation collaborative. L’analyse démontre non seulement que le Hackathon est effectivement une application concrète d’une nouvelle éthique de travail, mais que sa force se trouve dans les premières étapes de la conceptualisation du projet. La question que cette analyse soulève est donc : Est-il possible d’envisager de l’étendre sur l’ensemble du processus de développement, soit de l’idéation à l’implantation ? Cette recherche présente une lecture archéologique de la discipline du design qui permet de souligner des figures emblématiques du projet à travers les périodes historiques qui ont marqué le design. La proposition d’une nouvelle figure, le Hacking design, souligne l’impact des transformations engendrées par l’hypermodernisme sur la pratique de cette discipline et le rôle du praticien, concluant ainsi que la pensée du design (Design thinking) est dorénavant dépassée par une éthique de travail qui va au-delà d’une pensée, mais implique une nouvelle posture épistémologique. De nombreuses disciplines contigües au Design, dont la Gestion, l’Entrepreneuriat et l’Ingénierie, présentent ainsi un intérêt marqué pour le Design qu’ils perçoivent comme une réponse tributaire au succès de l’innovation collaborative au sein des organisations. Les attentes envers le Design, de sa théorie à sa pratique, sont donc grandes.
Today’s hypermodern working environment is experiencing important social, environmental and technological changes pressing actors to acquire the know-how to solve complex problems. The new philosophy of "doing" and the rise of working collaboration strategies arising in our hypermodern society are not systematically reflected in design’s practice. Indeed, by trying to keep pace with a world in constant change, today's design discipline is struggling to keep up. The theories on collaborative innovation present some answers to develop this know-how by advocating a practice that deploys fluidity in projects or, in other words, an eco-auto-re-organisational strategy. However, in the absence of a practical and operational tool, collaborative innovation is still at the conceptual and utopian stage. This thesis aims to rethink project management in our hypermodern world. Starting from a specific example, the Hackathon, it explores new ways of thinking, doing and creating solutions based on an entirely innovative dynamics, grounded on an ethic and a practice specific to the new society of "doing" and inspired, in particular, by the hackers. The Hackathon is thus analyzed through an analytic grid called the Gyroscope of the project through which the actors, the actions and the organisation of the project are evaluated. The Gyroscope makes it possible to identify the project’s components in relation to each other and to understand the requirements needed to carry out each project according to the theoretical indicators of collaborative innovation. The analysis not only demonstrates that the Hackathon is indeed a concrete application of a new work ethic, but that its strength is in the early stages of the project’s conceptualization. The question that this analysis raises is: Is it possible to consider extending it to the whole development process, from ideation to implementation? This research presents an archaeological reading of the discipline of design which allows to identify the emblematic figures of the project through the historical periods that marked the design. The proposal of a new figure, the Hacking design, highlights the impact of hypermodernism's transformations on the practice of this discipline and the role of the practitioner, thus concluding that Design Thinking is now overtaken by an ethic of work that goes beyond a way of thinking, but involves a new epistemological posture. Many disciplines contiguous to Design, including Management, Entrepreneurship and Engineering, have therefore a strong interest in Design, which they perceive as a response to the success of collaborative innovation within organizations. The expectations towards the discipline of Design, from its theory to its practice are, therefore, very high.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Hacking hack"

1

Kent, Nabors, ed. Dissecting the hack: The f0rb1dd3n network. Burlington, MA: Syngress, 2010.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Knaster, Scott. Hacking MAC OS X Tiger: Serious hacks, mods and customizations. Indianapolis, Ind: Wiley, 2005.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

AL-smadi, Yacoub. Hacking: Android Hack. Independently Published, 2020.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Buku Sakti Hacker. Efvy Zam, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Hacking: Ultimate Hacking for Beginners, How to Hack. CreateSpace Independent Publishing Platform, 2015.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Prakash, Abhijeet. Hack the World - Ethical Hacking. Lulu Press, Inc., 2015.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Solimene, Giacomo. I Hack You: Prontuario Del Hacking. Independently Published, 2018.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Wagner, Alex. Hacking: How to Hack Web Apps. Independently Published, 2020.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Hacking : Hacking for Beginners and Basic Security: How to Hack. Lulu Press, Inc., 2016.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Encyclopedia of hacking: Headline makers, hack attacks and hacking solutions. Greenwood Publishing Group: ABC-CLIO, LLC, 2005.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Hacking hack"

1

Varsalone, Jesse y Christopher Haller. "Web Application Hacking and Defense". En The Hack Is Back, 49–99. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Varsalone, Jesse y Christopher Haller. "Hacking and Securing Your Operating System". En The Hack Is Back, 1–20. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Anderie, Lutz. "Game Hacking: Von der Raubkopie zum Cybercrime Game Hack". En Quick Guide Game Hacking, Blockchain und Monetarisierung, 1–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60859-3_1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Sontopski, Natalie. "Hack back! Die historische Abwertung von Queerness bei KI und Potenziale des ›hacking back‹". En KI-Kritik / AI Critique, 121–36. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839461891-007.

Texto completo
Resumen
Die fehlende Inklusion von queerness in Anwendungen künstlicher Intelligenz wie Machine Learning (ML) oder Natural Language Processing (NLP) ist kein Zufall, sondern das Ergebnis eines heteronormativ geprägten gender-Diskurs. Dieser reguliert mit Hilfe von Technologie die Reproduktion von oftmals stereotypen Darstellungen von Geschlecht, während queere Perspektiven ausgeklammert werden. Dieser Beitrag möchte deswegen darstellen, dass es sich bei künstlicher Intelligenz um keine neutrale und objektive Technologie handelt, sondern nur um das neuste Glied in eine langen Reihe von Technologien, die queerness zugunsten einer starren binären Repräsentation von gender vernachlässigt oder sogar bewusst ausklammert. Ein Lösungsansatz können sogenannte Strategien des hacking back sein, welche durch Selbstermächtigung und Partizipation von queeren Perspektiven dem Feld der künstlichen Intelligenz mehr fluide Vielfalt hinzufügen .
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Goodman, Marc. "Kapitel 12: Wenn man alles hacken kann". En Global Hack, 289–309. München: Carl Hanser Verlag GmbH & Co. KG, 2015. http://dx.doi.org/10.3139/9783446444645.012.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Britton, Ren Loren y Isabel Paehr. "What is it, I do(n't) not know? I (we) do not know (but will feel) the name". En Doing Research - Wissenschaftspraktiken zwischen Positionierung und Suchanfrage, 288–95. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839456323-035.

Texto completo
Resumen
In this article Britton and Paehr play with language around concrete, which makes-firm in language ("Please make this more concrete!") and hardens the grounds that feet, canes and wheels touch every day. Through three patched, sprouted and decomposed collages of concrete material experiments, attempt to unsettle concrete's supposed firmness. N. N. is that which has not been named. In these images N. N. is not concretized and remains open. We are finding ways of making other worlds possible that resist the foreclosing of access or possibilities. The work of these authors germinates with the crip technoscience manifesto from Aimi Hamraie and Kelly Fritsch where access is defined as both related to attack and contact (2019). Instead of the 'integration' of disabled body-minds into normative space, Hamraie and Fritsch uphold the ways in which disabled makers hack or make otherwise trans*feminist presents. Hacking and playing with concrete, we find moments of formlessness through patching, decomposing and sprouting. The authors discover access potentials within something that has been figured as hard, and yet is ontologically, metaphorically and physically not stable. By keeping concrete "open" by adding more water or other materials to interrupt the "curing", and by churning/stirring this mixture, sprouting, decomposing and patchworking operate as practices that resist hardening, firming, closing and foreclosing. N.N. (nomen nomiandum) holds things open and resists formation because, I may not know, but together we can access it.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

"Hardware Hacking". En Hack Proofing Your Network, 609–54. Elsevier, 2002. http://dx.doi.org/10.1016/b978-192899470-1/50017-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

"How Hackers Hack". En Hacking the Hacker, 9–21. Indianapolis, Indiana: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119396260.ch2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Russell. "Hacking Methodology". En Hack Proofing Your Web Applications, 1–41. Elsevier, 2001. http://dx.doi.org/10.1016/b978-192899431-2/50005-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Grand, Joe, Ryan Russell, Kevin D. Mitnick, Andrew “bunnie” Huang, Lee Barken, Marcus R. Brown, Job de Haas et al. "Hack Your Atari 2600 and 7800". En Hardware Hacking, 199–245. Elsevier, 2004. http://dx.doi.org/10.1016/b978-193226683-2/50013-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Hacking hack"

1

Vinjosh Reddy, S., K. Sai Ramani, K. Rijutha, Sk Mohammad Ali y CH Pradeep Reddy. "Wireless hacking - a WiFi hack by cracking WEP". En 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529269.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Borgia, S. "HACK: a Holistic modeling Approach for Cubesat cyberattacKs". En Aerospace Science and Engineering. Materials Research Forum LLC, 2023. http://dx.doi.org/10.21741/9781644902677-41.

Texto completo
Resumen
Abstract. In recent years, the threat of cyberattacks has been growing rapidly in numerous industrial sectors that have an impact on our daily life. One of these is the space industry, where the risk of hacking a single satellite can lead to dangerous effects not only for economics but also for Earth critical infrastructure like: transportation systems, water networks, and electric grid. The vulnerability of complex space systems has already been demonstrated in the past. In 1998, for example, hackers took control of the ROSAT X-Ray satellite pointing its solar panels directly to the Sun and causing physical damage. Nowadays, since the attention is moved on small and less sophisticated system, such as CubeSat, the risk of cyber intrusions is even higher as the COTS (Commercial-Off-The-Shelf) technology they use is based on open-source operating systems. In order to counteract this imminent problem, the development of a high-fidelity CubeSat digital model is needed to study and solve related space cybersecurity issues. In fact, thanks to the virtual prototype, what-if simulations can be performed allowing to analyze different cyberattacks scenarios and predict undesirable events on the CubeSat flying on its operative orbit. Moreover, the building of the digital model requires a holistic modeling approach and simulation tools which allows to consider Multiphysics phenomena occurring on the space system itself. Finally, the possibility of connecting the virtual model to a real space system, obtaining the so-called Digital Twin (DT), will help engineers to conduct more accurate actions during the mission.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Yunitasari, Yessi, Latjuba S. T. T. Sofyana y Maria Ulfah Siregar. "Cyber Crime Identifying Using Machine Learning Techniques - Based Sentiment Analysis". En The 6th International Conference on Science and Engineering. Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-j46rcy.

Texto completo
Resumen
Social media analytics is a form of information analytics that is quite important in today's cyber situation. Cybercrime is criminal behaviour based on computers and internet networks. Cybercriminals usually hack systems to obtain the personal information of victims. There are many types of cybercrimes. There are four types of cybercrimes: Phishing scams, Hacking, Cyber Stalking and Cyber Bullying. This research aims to help the process analysis by the Police or investigative institutions of the private sector in knowing the results of public sentiment on social media related to current cyber crimes. Ciber Crime identifying using machine learning techniques, based sentiment analysis. Method used for sentiment analysis related to cybercrime is Random Forest, Naïve Bayes, and KNN. The highest accuracy value of the three methods tried is the Naive Bayes algorithm of 99.45%. The highest precision value uses the Naive Bayes algorithm of 99.80%, and the highest recall value uses the random forest algorithm of 100%.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía