Littérature scientifique sur le sujet « Hacking hack »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Hacking hack ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Hacking hack"
Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda et Petar Cekerevac. « Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking ». Communications - Scientific letters of the University of Zilina 20, no 2 (30 juin 2018) : 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Texte intégralPratt, Mike. « Raptor Hacking ». Wildlife Rehabilitation Bulletin 29, no 1 (30 juin 2011) : 34–38. http://dx.doi.org/10.53607/wrb.v29.78.
Texte intégralAdzhakhunov, E. A., et O. V. Nikolaev. « UAV control hack system ». Journal of «Almaz – Antey» Air and Space Defence Corporation, no 2 (23 juin 2021) : 35–41. http://dx.doi.org/10.38013/2542-0542-2021-2-35-41.
Texte intégralAiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips et Ruby R. Farr. « Intention to Hack ? Applying the Theory of Planned Behaviour to Youth Criminal Hacking ». Forensic Sciences 4, no 1 (30 janvier 2024) : 24–41. http://dx.doi.org/10.3390/forensicsci4010003.
Texte intégralPisarić, Milana. « The use of policeware to hack electronic evidence in Germany and the Netherlands ». Nauka, bezbednost, policija 28, no 1 (2023) : 16–26. http://dx.doi.org/10.5937/nabepo28-43759.
Texte intégralFidler, David P. « The U.S. Election Hacks, Cybersecurity, and International Law ». AJIL Unbound 110 (2016) : 337–42. http://dx.doi.org/10.1017/aju.2017.5.
Texte intégralUl Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar et Mahnoor Arshad. « The Impacts of Ethical Hacking and its Security Mechanisms ». Pakistan Journal of Engineering and Technology 5, no 4 (29 décembre 2022) : 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.
Texte intégralHussain, Syed Muzaffar. « AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS ». Journal of Correctional Issues 5, no 1 (16 août 2022) : 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.
Texte intégralBohnsack, René, et Meike Malena Liesner. « What the hack ? A growth hacking taxonomy and practical applications for firms ». Business Horizons 62, no 6 (novembre 2019) : 799–818. http://dx.doi.org/10.1016/j.bushor.2019.09.001.
Texte intégralJordan, Tim. « A genealogy of hacking ». Convergence : The International Journal of Research into New Media Technologies 23, no 5 (6 avril 2016) : 528–44. http://dx.doi.org/10.1177/1354856516640710.
Texte intégralThèses sur le sujet "Hacking hack"
Cui, Zhiqiang. « Security Incidents in an Academic Setting : A Case Study ». Digital Commons @ East Tennessee State University, 2002. https://dc.etsu.edu/etd/664.
Texte intégralAxelsson, Andreas. « Bluetoothsäkerhet, neglegerad eller (o)kunskap ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131.
Texte intégralFransén, Johan, et Adnan Sorlija. « Hacka dig själv och upptäck attacker ». Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20852.
Texte intégralThis thesis is based on the idea of hacking your own system before an outside hacker does it to find the system vulnerabilities. This is done with an automated hacking tool that performs penetration tests against the created website. The database technology that is used is the event database Event Store that stores every event that take place against the website. The task of Event Store in this case is to discover the different penetration tests and to store the events and to give indications to the administrator that the website was under attack. The study is primarily aimed at finding out whether Event Store is advisable to implement with a website where different penetration testing shall be made, and what the advantages and disadvantages are to using Event Store. Results show that Event Store can be used to identify anomalies against a website during attacks. Intrusions against the website can with great probability be proven with the help of the developed system with Event Store.
Naarden, Lydia. « User acquisition growth hacks for startups : A case study ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230970.
Texte intégralThis study discusses several methods that startups can use to acquire new users for their product or service, from the perspective of a startup that forms the case study of this research and in comparison to other companies. As many startups are currently emerging, they seek cost-efficient ways for their company to grow. Companies such as Airbnb and Facebook used growth hacking when they started and lacked sufficient resources. Many blogs have been written about this phenomenon, but there is a lack of scientific research examining what needs to be done or considered. This research aims to contribute to filling that gap in relation to user acquisition. For six weeks, several strategies adopted by companies were tested at Locallife to determine which ones worked. The collected data were analysed and used for optimisations. Growth-hacking practices were performed on Facebook to identify which hacks lead to growth. The results show that the social media content calendar barely led to any conversions: after three weeks of execution and observation, the number of people that onboarded was unsatisfactory. However, local targeting content yielded satisfying results. Content with which the user can associate is more likely to attract the user's attention than general information about the product or service. Further, not only the tone of the campaign makes a difference for the audience; also the call to action influences people’s decision to onboard and the performance of the product or service. These findings are significant because they offer beginners and companies a perspective on which issues to consider when they decide to growth hack. Also, while many methods are discussed in blogs, only a few explain which adjustments were made before reaching a particular result, making it seem as if everything happened in one go. This research aims to explore the concept and show the efforts that need to be made for a startup to reach sustainable growth.
Barth, Klaus [Verfasser], B. [Gutachter] Kramp, T. [Gutachter] Hacki et W. [Gutachter] Seidner. « Funktionelle postoperative Befunde bei Patienten mit oropharyngealen Tumoren / Klaus Barth ; Gutachter : B. Kramp, T. Hacki, W. Seidner ». Berlin : Humboldt-Universität zu Berlin, 2001. http://d-nb.info/1207626155/34.
Texte intégralAlvarez, Juliana. « Vers le Design hacké : la nécessité d’une nouvelle posture épistémologique ». Thèse, 2017. http://hdl.handle.net/1866/19275.
Texte intégralToday’s hypermodern working environment is experiencing important social, environmental and technological changes pressing actors to acquire the know-how to solve complex problems. The new philosophy of "doing" and the rise of working collaboration strategies arising in our hypermodern society are not systematically reflected in design’s practice. Indeed, by trying to keep pace with a world in constant change, today's design discipline is struggling to keep up. The theories on collaborative innovation present some answers to develop this know-how by advocating a practice that deploys fluidity in projects or, in other words, an eco-auto-re-organisational strategy. However, in the absence of a practical and operational tool, collaborative innovation is still at the conceptual and utopian stage. This thesis aims to rethink project management in our hypermodern world. Starting from a specific example, the Hackathon, it explores new ways of thinking, doing and creating solutions based on an entirely innovative dynamics, grounded on an ethic and a practice specific to the new society of "doing" and inspired, in particular, by the hackers. The Hackathon is thus analyzed through an analytic grid called the Gyroscope of the project through which the actors, the actions and the organisation of the project are evaluated. The Gyroscope makes it possible to identify the project’s components in relation to each other and to understand the requirements needed to carry out each project according to the theoretical indicators of collaborative innovation. The analysis not only demonstrates that the Hackathon is indeed a concrete application of a new work ethic, but that its strength is in the early stages of the project’s conceptualization. The question that this analysis raises is: Is it possible to consider extending it to the whole development process, from ideation to implementation? This research presents an archaeological reading of the discipline of design which allows to identify the emblematic figures of the project through the historical periods that marked the design. The proposal of a new figure, the Hacking design, highlights the impact of hypermodernism's transformations on the practice of this discipline and the role of the practitioner, thus concluding that Design Thinking is now overtaken by an ethic of work that goes beyond a way of thinking, but involves a new epistemological posture. Many disciplines contiguous to Design, including Management, Entrepreneurship and Engineering, have therefore a strong interest in Design, which they perceive as a response to the success of collaborative innovation within organizations. The expectations towards the discipline of Design, from its theory to its practice are, therefore, very high.
Livres sur le sujet "Hacking hack"
Kent, Nabors, dir. Dissecting the hack : The f0rb1dd3n network. Burlington, MA : Syngress, 2010.
Trouver le texte intégralKnaster, Scott. Hacking MAC OS X Tiger : Serious hacks, mods and customizations. Indianapolis, Ind : Wiley, 2005.
Trouver le texte intégralAL-smadi, Yacoub. Hacking : Android Hack. Independently Published, 2020.
Trouver le texte intégralBuku Sakti Hacker. Efvy Zam, 2011.
Trouver le texte intégralHacking : Ultimate Hacking for Beginners, How to Hack. CreateSpace Independent Publishing Platform, 2015.
Trouver le texte intégralPrakash, Abhijeet. Hack the World - Ethical Hacking. Lulu Press, Inc., 2015.
Trouver le texte intégralSolimene, Giacomo. I Hack You : Prontuario Del Hacking. Independently Published, 2018.
Trouver le texte intégralWagner, Alex. Hacking : How to Hack Web Apps. Independently Published, 2020.
Trouver le texte intégralHacking : Hacking for Beginners and Basic Security : How to Hack. Lulu Press, Inc., 2016.
Trouver le texte intégralEncyclopedia of hacking : Headline makers, hack attacks and hacking solutions. Greenwood Publishing Group : ABC-CLIO, LLC, 2005.
Trouver le texte intégralChapitres de livres sur le sujet "Hacking hack"
Varsalone, Jesse, et Christopher Haller. « Web Application Hacking and Defense ». Dans The Hack Is Back, 49–99. Boca Raton : CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-3.
Texte intégralVarsalone, Jesse, et Christopher Haller. « Hacking and Securing Your Operating System ». Dans The Hack Is Back, 1–20. Boca Raton : CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-1.
Texte intégralAnderie, Lutz. « Game Hacking : Von der Raubkopie zum Cybercrime Game Hack ». Dans Quick Guide Game Hacking, Blockchain und Monetarisierung, 1–21. Berlin, Heidelberg : Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60859-3_1.
Texte intégralSontopski, Natalie. « Hack back ! Die historische Abwertung von Queerness bei KI und Potenziale des ›hacking back‹ ». Dans KI-Kritik / AI Critique, 121–36. Bielefeld, Germany : transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839461891-007.
Texte intégralGoodman, Marc. « Kapitel 12 : Wenn man alles hacken kann ». Dans Global Hack, 289–309. München : Carl Hanser Verlag GmbH & Co. KG, 2015. http://dx.doi.org/10.3139/9783446444645.012.
Texte intégralBritton, Ren Loren, et Isabel Paehr. « What is it, I do(n't) not know ? I (we) do not know (but will feel) the name ». Dans Doing Research - Wissenschaftspraktiken zwischen Positionierung und Suchanfrage, 288–95. Bielefeld, Germany : transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839456323-035.
Texte intégral« Hardware Hacking ». Dans Hack Proofing Your Network, 609–54. Elsevier, 2002. http://dx.doi.org/10.1016/b978-192899470-1/50017-3.
Texte intégral« How Hackers Hack ». Dans Hacking the Hacker, 9–21. Indianapolis, Indiana : John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119396260.ch2.
Texte intégralRussell. « Hacking Methodology ». Dans Hack Proofing Your Web Applications, 1–41. Elsevier, 2001. http://dx.doi.org/10.1016/b978-192899431-2/50005-6.
Texte intégralGrand, Joe, Ryan Russell, Kevin D. Mitnick, Andrew “bunnie” Huang, Lee Barken, Marcus R. Brown, Job de Haas et al. « Hack Your Atari 2600 and 7800 ». Dans Hardware Hacking, 199–245. Elsevier, 2004. http://dx.doi.org/10.1016/b978-193226683-2/50013-2.
Texte intégralActes de conférences sur le sujet "Hacking hack"
Vinjosh Reddy, S., K. Sai Ramani, K. Rijutha, Sk Mohammad Ali et CH Pradeep Reddy. « Wireless hacking - a WiFi hack by cracking WEP ». Dans 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529269.
Texte intégralBorgia, S. « HACK : a Holistic modeling Approach for Cubesat cyberattacKs ». Dans Aerospace Science and Engineering. Materials Research Forum LLC, 2023. http://dx.doi.org/10.21741/9781644902677-41.
Texte intégralYunitasari, Yessi, Latjuba S. T. T. Sofyana et Maria Ulfah Siregar. « Cyber Crime Identifying Using Machine Learning Techniques - Based Sentiment Analysis ». Dans The 6th International Conference on Science and Engineering. Switzerland : Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-j46rcy.
Texte intégral