Gotowa bibliografia na temat „Hacking network”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Hacking network”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Hacking network"

1

Prasanth, A., P. Sankar Ganesh i S. P. Raja Gopalan. "Data Prevention from Network Hacking". International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (30.04.2018): 807–11. http://dx.doi.org/10.31142/ijtsrd11035.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Ul Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar i Mahnoor Arshad. "The Impacts of Ethical Hacking and its Security Mechanisms". Pakistan Journal of Engineering and Technology 5, nr 4 (29.12.2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.

Pełny tekst źródła
Streszczenie:
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived in a digital world, we need to protect our privacy from cyber-attacks. The proposed paper discussed ethical hacking and its ramifications, in which black hackers "hack" networks. The proposed research emphasizes ethical hacking tactics. This research also examines the impact of ethical hacking on business, education, health, society, the workplace, technology, sensitive information, and human life. Finally, a brief survey based on certain questions is better to grasp the public's understanding of ethical hacking. In summary, this research offers the user fascinating and helpful information when working on ethical hacking.
Style APA, Harvard, Vancouver, ISO itp.
3

Mohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor i Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING". International Journal of Law, Government and Communication 6, nr 22 (10.03.2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.

Pełny tekst źródła
Streszczenie:
Hacking or unauthorised access is criminalised in many jurisdictions, including Malaysia, Singapore, the United Kingdom, Hong Kong, and a few other countries. Hacking is the act of gaining access through the computer system or network without proper authority or exceeding the original authority given to him. Many commentators and researchers have reported on the conceptual and legal aspects of hacking. However, hacking's theoretical, conceptual, and legal aspects have remained under-researched. Therefore, this paper's primary objective is to outline the various theories, which could inform the criminalisation of hacking. The theories of routine activities, deterrence theory, social learning and self-control, general strain theory, and deviant subcultures are deliberated in this paper alongside illustrations within the context of hacking. This paper will shed light on the body of literature and contribute to a better understanding of hacking criminalisation from various theories discussed in this paper. Future research should be directed to provide empirical evidence of applying the theory to hacking criminalisation.
Style APA, Harvard, Vancouver, ISO itp.
4

Hancock, Bill. "Using network hacking techniques to disrupt military operational networks". Network Security 1998, nr 8 (sierpień 1998): 13–17. http://dx.doi.org/10.1016/s1353-4858(98)80075-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Osagie, M. S. U., i Amenze Joy Osagie. "A Bit of Hacking Techniques for Vulnerable Subdomain". Journal of Advances in Computing, Communications and Information Technology 1 (25.04.2021): 1–7. http://dx.doi.org/10.37121/jaccit.v1.133.

Pełny tekst źródła
Streszczenie:
Hacking as it is popularly called is an official phrase for unauthorised access to a network/data. However, there are different methods used in gaining access to a designated network; hence, this paper explained a few hacker’s intent using classified commercially available tools and techniques to expose the vulnerability of data and applications within networks. It also explained few simple ways of gaining access to a network without really having the key technical ability.
Style APA, Harvard, Vancouver, ISO itp.
6

Schneier, B. "Hacking the business climate for network security". Computer 37, nr 4 (kwiecień 2004): 87–89. http://dx.doi.org/10.1109/mc.2004.1297316.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

García-Cobo, Iván. "Quantum Network Intelligent Management System". Optics 3, nr 4 (15.11.2022): 430–37. http://dx.doi.org/10.3390/opt3040036.

Pełny tekst źródła
Streszczenie:
Quantum network materializes the paradigm change caused by the depletion of classical computation. Quantum networks have been built gathering reliable quantum repeaters connected by optical fiber networks. The need to build robust and resilient networks against hacking attacks is fundamental in the design of the future quantum Internet, detecting structural security as the major issue in the current development of the technology. A network management method is proposed to achieve its real-time adaptation and to protect itself against sabotage or accidents that render part of the network or its nodes useless.
Style APA, Harvard, Vancouver, ISO itp.
8

Botha, Martin, i Rossouw von Solms. "The utilization of trend analysis in the effective monitoring of information security. Part 2: the model". Information Management & Computer Security 10, nr 1 (1.03.2002): 5–11. http://dx.doi.org/10.1108/09685220210417454.

Pełny tekst źródła
Streszczenie:
A survey recently completed by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) revealed that corporations, banks, and governments all face a growing threat from computer crime, and in particular computer hacking. Computer hacking activities caused well over US$100 million in losses last year in the USA and the trend toward professional computer crime, such as computer hacking, is on the rise. Different methods are currently used to control the computer crime problem, for example, by controling access to and from a network by implementing a firewall. As the survey highlighted, most of these methods are insufficient. New means and ways which will minimise and control the hacking problem must therefore continuously be researched and defined. Proposes a method, using trend analysis, that could be utilized to minimise and control the hacking problem in an organisation.
Style APA, Harvard, Vancouver, ISO itp.
9

Hyunhee Park, Hyunhee Park. "Edge Based Lightweight Authentication Architecture Using Deep Learning for Vehicular Networks". 網際網路技術學刊 23, nr 1 (styczeń 2022): 195–202. http://dx.doi.org/10.53106/160792642022012301020.

Pełny tekst źródła
Streszczenie:
<p>When vehicles are connected to the Internet through vehicle-to-everything (V2X) systems, they are exposed to diverse attacks and threats through the network connections. Vehicle-hacking attacks in the road can significantly affect driver safety. However, it is difficult to detect hacking attacks because vehicles not only have high mobility and unreliable link conditions, but they also use broadcast-based wireless communication. To this end, V2X systems need a simple but a powerful authentication procedure on the road. Therefore, this paper proposes an edge based lightweight authentication architecture using a deep learning algorithm for road safety applications in vehicle networks. The proposed lightweight authentication architecture enables vehicles that are physically separated to form a vehicular cloud in which vehicle-to-vehicle communications can be secured. In addition, an edge-based cloud data center performs deep learning algorithms to detect car hacking attempts, and then delivers the detection results to a vehicular cloud. Extensive simulations demonstrate that the proposed authentication architecture significantly enhanced the security level. The proposed authentication architecture has 94.51 to 99.8% F1-score results depending on the number of vehicles in the intrusion detection system using control area network traffic.</p> <p>&nbsp;</p>
Style APA, Harvard, Vancouver, ISO itp.
10

Ellis, Tom, Xiao Wang i James J. Collins. "Gene Regulation: Hacking the Network on a Sugar High". Molecular Cell 30, nr 1 (kwiecień 2008): 1–2. http://dx.doi.org/10.1016/j.molcel.2008.03.005.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Hacking network"

1

Schuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks". Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2007.
Thesis Advisor(s): David Tucker. "March 2007." Includes bibliographical references (p. 55-56). Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
2

Akkaya, Deniz, i Fabien Thalgott. "Honeypots in network security". Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.

Pełny tekst źródła
Streszczenie:

Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.

Style APA, Harvard, Vancouver, ISO itp.
3

Maloušek, Zdeněk. "Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217444.

Pełny tekst źródła
Streszczenie:
Computer networks are used in much wider extent than 20 years ago. People use the computer mainly for communication, entertainment and data storage. Information is often stored only in electronic devices and that is why the security of the data is so important. The objective of my thesis is to describe network security problems and their solutions. First chapter deals with the network security, security checks and attacks. It describes procedures used in practise. First part deals with traffic scanning and filtering at various layers of the TCP/IP model. Second part presents the types of proxy and its pros and cons. Network Address Translation (NAT) is a favourite technique of managing IP addresses of inside and outside network which helps to improve the security and lower the costs paid for IP addresses. NAT description, IPSec, VPN and basic attacks are described in this section. The second chapter of the thesis presents set of Perl scripts for network security checking. The purpose of the project is not to check the whole network security. It is designed for contemporary needs of IBM Global Services Delivery Centrum Brno. The first script checks running applications on target object. The aim is to detect services that are not necessary to run or that are not updated. The second one checks the security of the Cisco device configuration. There is a list of rules that has to be kept. The third script inspects the Nokia firewall configuration which is on the border of IBM network. If some of the rule is broken, it shows the command that has to be proceeded at the particular device. The output of the first and the second script is an HTML file. The third script uses the command line for the final report. The last part of this chapter gives advice to configure Cisco devices. It is a list of security recommendations that can be used by configuring e.g. routers. The appendix presents two laboratory exercises. The aim is to give students an opportunity to learn something about programs and technologies which are used in practise by IT experts to check the weaknesses of their networks.
Style APA, Harvard, Vancouver, ISO itp.
4

Olovson, Natali. "Hacking for the State? : The Use of Private Persons in Cyber Attacks and State Responsibility". Thesis, Försvarshögskolan, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10218.

Pełny tekst źródła
Streszczenie:
While there are many examples to turn to regarding the thriving phenomenon of private persons being exploited to launch cyber attacks on behalf of states, this thesis will direct it’s attention onto two special cases. Russia has been accused of being the state actor behind the cyber attacks on Estonia in 2007 and Georgia in 2008. The cases are chosen as Estonia have been recognised as the first coordinated cyber attack on a foreign country, and Georgia being the first case were cyber attacks have been utilised in synchronisation with military action. The purpose of the thesis is to analyse the facts of each case in relation to the International Law Commission’s Draft Articles on Responsibility of States for Internationally Wrongful Acts (DARSIWA). The analysis will work through article 4, article 5, article 8 and article 11. The main question is how Russia may be hold as legally responsible under international law for the private conduct of ’patriotic’ hackers, the Nashi Youth Group and the Russian Business Network. The thesis concludes that while the circumstances of each case highly indicate state-involvement, this cannot be proven under the respective criterias of the articles and Russia does therefore not bear legal responsibility.
Style APA, Harvard, Vancouver, ISO itp.
5

Haywood, Douglas. "The ethic of the code : values, networks and narrative among the civic hacking community". Thesis, Goldsmiths College (University of London), 2018. http://research.gold.ac.uk/23348/.

Pełny tekst źródła
Streszczenie:
Computer hacking has come to represent something negative within mainstream society and is typically associated with malicious or criminal acts. However, for those involved in hacking, this practice typically means something quite different and much more positive in nature. Recently, hacking has also gained increasing popular appeal with greater interest in the role of hackers in the history of technology. This portrayal, however, represents hacking in a binary way, portraying the activity as either ‘good’ or ‘bad’ rather than as the reality of a complex and heterogeneous set of practices and ethics. It is within this context that the Civic Hacking movement has emerged. Those involved in Civic Hacking apply these ethics on a global and local scale to create projects which aim to solve a range of social problems using technology and borrowing from the approaches and practices of hacking. These ‘problems’ can include crime; violence; humanitarian disasters such as tsunamis, famine or earthquake; improvements needed to local government in terms of the democratic process or infrastructure; providing access to healthcare, education or banking in remote areas; involving local communities in issues and a range of other challenges which require solutions. This research project explores hacking as a non-technologically specific social practice based around a collection of Hacker Ethics. Through research focusing on hacking events, I argue that Civic Hacking is indicative of the influence of the Hacker Ethic in wider areas of society. In particular, I explore how Civic Hacking is situated within the wider history of hacking; to what extent the technological artefacts produced by Civic Hacking are shaped by the ethics of these groups; whether Civic Hacking is indicative of a democratisation of technologies; and the types of communities which form around Civic Hacking.
Style APA, Harvard, Vancouver, ISO itp.
6

Maggs, Catherine. "WikiLeaks and Communicative Counterpower". Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/13511.

Pełny tekst źródła
Streszczenie:
WikiLeaks’ rise to prominence in 2010, with its release of classified U.S. government and military documents, polarised opinion worldwide; some viewed it as a cyber-terrorist group, others saw it as journalism’s saviour. WikiLeaks and Communicative Counterpower investigates why the organisation has been such a contentious cultural and political phenomenon, via a study of its capacity to exercise networked communicative counterpower. The thesis analyses WikiLeaks’ exercise of ideational, cultural and mediated political counterpower, providing a unique mixed methods, critical media studies account of its significance. Drawing largely on hermeneutic approaches the thesis presents a cultural history of WikiLeaks philosophical underpinnings, a cultural production analysis of its claim to journalism, and a news framing analysis of its mediated political counterpower. It argues that WikiLeaks is founded on a hybrid theory of political change, which unites computing technology with the possibility for achieving personal freedom, social agency and more open government. It then demonstrates how WikiLeaks’ operation as a globally networked, radical media organisation challenges the operation of institutional media power and the norms and practices of liberal-pluralist journalism, even as it has appropriated those norms to legitimate its work. Finally the thesis illustrates how WikiLeaks’ perceived challenges to media and political power manifested in critical coverage by elite mainstream media, which framed its activities as transgressive and dismissed its impact, delegitimising it as a political and cultural actor. WikiLeaks is bound into existing circuits of power, which shape and constrain its ability to function as a locus for change. At the same time however the multi-method research design of this work reveals that WikiLeaks evidences signs of counterpower effect in its promotion of information and communication transparency. It provides a particular form of networked social agency to whistleblowers and hence enhances the communicative freedom of individuals to motivate them to pursue change to institutionalised political power relations.
Style APA, Harvard, Vancouver, ISO itp.
7

Dostál, Otto. "Právní aspekty boje proti počítačové trestné činnosti". Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-433079.

Pełny tekst źródła
Streszczenie:
The thesis deals with the topic of computer crime. Foremost, it demonstrates on an example of the operation of a medical image information processing system some selected aspects of this issue. It shows that it is always necessary to monitor the current state of the technical knowledge at the time, but also the need of addressing the issue within the corresponding legal limits. The thesis presents criminal law reality as a complex system. The links between different parts of the system are examined, and possible shortcomings are considered. The legal instruments and legal limits of the procedures that can be used against cybercrime are evaluated. The thesis focuses especially on the issue of obtaining evidence under the Czech Criminal Procedure Code. It presents a proposal on how to understand individual procedural legal institutes and for what purposes and how to use them. Consequently it suggests legal procedures for specific selected practical situations.
Style APA, Harvard, Vancouver, ISO itp.
8

Silva, Luísa Carina Cabodeira Viana da. "Growth hacking e consumidores oportunistas: O impacto de rewards em programas de marketing referral". Master's thesis, 2020. http://hdl.handle.net/10362/94984.

Pełny tekst źródła
Streszczenie:
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Marketing Intelligence
Os programas de marketing referral têm vindo a tornar-se numa ferramenta popular entre as empresas. Os seus benefícios são um tema polémico na literatura, uma vez que são programas propensos a atraírem utilizadores com um comportamento de compra oportunista. Como resultado disso, a entrega de recompensas despoleta uma corrida ao reward por parte de utilizadores com perfil oportunista. No presente estudo, propomos um modelo matemático baseado em agentes e suportado por 20.000 simulações, capaz de estudar o impacto desta população na disseminação do programa e na sua lucratividade. Mostrámos que os agentes interessados numa recolha oportunista do reward são responsáveis pelo sucesso do programa e pela sua disseminação. Este efeito ganha dimensão quando a disparidade monetária entre o custo do serviço e o valor do reward é maior. Por fim, concluímos que o aumento do número de convites, que os oportunistas realizam, despoleta uma intensificação dos resultados supra indicados.
Referral marketing programs have become a popular tool among businesses. Its benefits are a controversial topic in the literature, as they are programs likely to attract users with opportunistic buying behavior. As a result, reward distribution triggers a rush for rewards by users who have this opportunistic behavior. In the present study, we propose a mathematical model based on agents and supported by 20.000 simulations, capable of studying the impact of this population on the dissemination of the program and its profitability. We have shown that agents interested in an opportunistic reward collection are responsible for the success of the program and its dissemination. This effect gains dimension when the monetary disparity between the cost of the service and the reward value is greater. Finally, we conclude that the increase in the number of invitations that opportunists make triggers the intensification of the above results.
Style APA, Harvard, Vancouver, ISO itp.
9

Soares, João Pedro dos Santos. "Implementation of a distributed intrusion detection and reaction system". Master's thesis, 2016. http://hdl.handle.net/10316/99196.

Pełny tekst źródła
Streszczenie:
Relatório Final Estágio do Mestrado Engenharia Informática apresentado à Faculdade de Ciências e Tecnologia da Universidade de Coimbra.
Security was not always an important aspect in terms of networking and hosts. Nowadays, it is absolutely mandatory. Security measures must make an e ort to evolve at the same rate, or even at a higher rate, than threats, which is proving to be the most di cult of tasks. In this report we will detail the process of the implementation of a real distributed intrusion detection and reaction system, that will be responsible for securing a core set of networks already in production, comprising of thousands of servers, users and their respective con dential information.
Style APA, Harvard, Vancouver, ISO itp.
10

"A Hacker-Centric Perspective to Empower Cyber Defense". Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57382.

Pełny tekst źródła
Streszczenie:
abstract: Malicious hackers utilize the World Wide Web to share knowledge. Previous work has demonstrated that information mined from online hacking communities can be used as precursors to cyber-attacks. In a threatening scenario, where security alert systems are facing high false positive rates, understanding the people behind cyber incidents can help reduce the risk of attacks. However, the rapidly evolving nature of those communities leads to limitations still largely unexplored, such as: who are the skilled and influential individuals forming those groups, how they self-organize along the lines of technical expertise, how ideas propagate within them, and which internal patterns can signal imminent cyber offensives? In this dissertation, I have studied four key parts of this complex problem set. Initially, I leverage content, social network, and seniority analysis to mine key-hackers on darkweb forums, identifying skilled and influential individuals who are likely to succeed in their cybercriminal goals. Next, as hackers often use Web platforms to advertise and recruit collaborators, I analyze how social influence contributes to user engagement online. On social media, two time constraints are proposed to extend standard influence measures, which increases their correlation with adoption probability and consequently improves hashtag adoption prediction. On darkweb forums, the prediction of where and when hackers will post a message in the near future is accomplished by analyzing their recurrent interactions with other hackers. After that, I demonstrate how vendors of malware and malicious exploits organically form hidden organizations on darkweb marketplaces, obtaining significant consistency across the vendors’ communities extracted using the similarity of their products in different networks. Finally, I predict imminent cyber-attacks correlating malicious hacking activity on darkweb forums with real-world cyber incidents, evidencing how social indicators are crucial for the performance of the proposed model. This research is a hybrid of social network analysis (SNA), machine learning (ML), evolutionary computation (EC), and temporal logic (TL), presenting expressive contributions to empower cyber defense.
Dissertation/Thesis
Doctoral Dissertation Computer Science 2020
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Hacking network"

1

Pospisil, John. Hacking MySpace. New York: John Wiley & Sons, Ltd., 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

McClure, Stuart. Hacking exposed: Network security secrets & solutions. Wyd. 5. Emeryville, Calif: McGraw-Hill/Osborne, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Stuart, McClure, i Kurtz George, red. Hacking exposed: Network security secrets & solutions. Wyd. 2. Berkeley, Calif: Osborne/McGraw-Hill, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kent, Backman, i Corley James E, red. Hands-on ethical hacking and network defense. Wyd. 2. Boston, MA: Course Technology, Cengage Learning, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Joel, Scambray, i Kurtz George, red. Hacking exposed: Network security secrets and solutions. Wyd. 3. New York: Osborne/McGraw-Hill, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Joel, Scambray, i Kurtz George, red. Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kent, Backman, i Corley James E, red. Hands-on ethical hacking and network defense. Boston, MA: Course Technology, 2013.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Stuart, McClure, red. Hacking exposed Windows 2000: Network security secrets & solutions. New York: Osborne/McGraw-Hill, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Cannings, Rich. Hacking ExposedTM Web 2.0. New York: McGraw-Hill, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Manu, Zacharia, red. Network intrusion alert: An ethical hacking guide to intrusion detection. Boston, MA: Thomson Course Technology PTR, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Hacking network"

1

Söderberg, Johan. "Users in the Dark: The Development of a User-Controlled Technology in the Czech Wireless Network Community". W Hacking Europe, 219–39. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5493-8_10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Sinha, Sanjib. "Know Your Network". W Beginning Ethical Hacking with Kali Linux, 61–69. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3891-2_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Sinha, Sanjib. "Building an Nmap Network Scanner". W Beginning Ethical Hacking with Python, 165–68. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sinha, Sanjib. "Virtual Private Network or VPN". W Beginning Ethical Hacking with Python, 185–89. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Sinha, Sanjib. "Setting Up a Penetration Testing and Network Security Lab". W Beginning Ethical Hacking with Kali Linux, 19–40. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3891-2_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Palit, Sudip Kumar, i Mohuya Chakraborty. "A Mobile User Authentication Technique in Global Mobility Network". W Proceedings of International Ethical Hacking Conference 2019, 171–90. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0361-0_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Roy, Indranil, Shekhar Sonthalia, Trideep Mandal, Animesh Kairi i Mohuya Chakraborty. "Study on Network Scanning Using Machine Learning-Based Methods". W Proceedings of International Ethical Hacking Conference 2019, 77–85. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0361-0_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Mohan, Aswathy, G. Aravind Swaminathan i Jeenath Shafana. "Systematic Approach for Network Security Using Ethical Hacking Technique". W Intelligent Communication Technologies and Virtual Mobile Networks, 47–59. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1844-5_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Strauß, Christine. "Fallstudie I: «Hacking» in einem Local Area Network-Ein quantitativer Ansatz". W Informatik und Unternehmensführung, 147–90. Wiesbaden: Vieweg+Teubner Verlag, 1991. http://dx.doi.org/10.1007/978-3-322-94696-6_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Page, Ruth. "Hoaxes, hacking and humour: analysing impersonated identity on social network sites". W The Language of Social Media, 46–64. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137029317_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Hacking network"

1

Alufaisan, Yasmeen, Yan Zhou, Murat Kantarcioglu i Bhavani Thuraisingham. "Hacking social network data mining". W 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017. http://dx.doi.org/10.1109/isi.2017.8004874.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Marchal, Samuel, Jerome Francois, Radu State i Thomas Engel. "PhishScore: Hacking phishers' minds". W 2014 10th International Conference on Network and Service Management (CNSM). IEEE, 2014. http://dx.doi.org/10.1109/cnsm.2014.7014140.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Chen, Tzer-shyong, Fuh-gwo Jeng i Yu-chia Liu. "Hacking Tricks Toward Security on Network Environments". W 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06). IEEE, 2006. http://dx.doi.org/10.1109/pdcat.2006.66.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Han, Mee Lan, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen i Huy Kang Kim. "WHAP: Web-hacking profiling using Case-Based Reasoning". W 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860503.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kang, Hyunjae, Byung Il Kwak, Young Hun Lee, Haneol Lee, Hwejae Lee i Huy Kang Kim. "Car Hacking and Defense Competition on In-Vehicle Network". W Third International Workshop on Automotive and Autonomous Vehicle Security. Reston, VA: Internet Society, 2021. http://dx.doi.org/10.14722/autosec.2021.23035.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

ArunPrakash, M., i T. R. Gokul. "Network security-overcome password hacking through graphical password authentication". W 2011 National Conference on Innovations in Emerging Technology (NCOIET). IEEE, 2011. http://dx.doi.org/10.1109/ncoiet.2011.5738831.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wang, Yien, i Jianhua Yang. "Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool". W 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2017. http://dx.doi.org/10.1109/waina.2017.39.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Zuo, Y., i B. Panda. "Network viruses: their working principles and marriages with hacking programs". W IEEE Systems, Man and Cybernetics Society Information Assurance Workshop. IEEE, 2003. http://dx.doi.org/10.1109/smcsia.2003.1232444.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Alsunbul, Saad, Phu Le, Jefferson Tan i Bala Srinivasan. "A network defense system for detecting and preventing potential hacking attempts". W 2016 International Conference on Information Networking (ICOIN). IEEE, 2016. http://dx.doi.org/10.1109/icoin.2016.7427157.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Musthyala, Harish, i P. Nagarjuna Reddy. "Hacking wireless network credentials by performing phishing attack using Python Scripting". W 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2021. http://dx.doi.org/10.1109/iciccs51141.2021.9432155.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii