Literatura científica selecionada sobre o tema "Hacking hack"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Hacking hack".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Hacking hack"
Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda e Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking". Communications - Scientific letters of the University of Zilina 20, n.º 2 (30 de junho de 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Texto completo da fontePratt, Mike. "Raptor Hacking". Wildlife Rehabilitation Bulletin 29, n.º 1 (30 de junho de 2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.
Texto completo da fonteAdzhakhunov, E. A., e O. V. Nikolaev. "UAV control hack system". Journal of «Almaz – Antey» Air and Space Defence Corporation, n.º 2 (23 de junho de 2021): 35–41. http://dx.doi.org/10.38013/2542-0542-2021-2-35-41.
Texto completo da fonteAiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips e Ruby R. Farr. "Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking". Forensic Sciences 4, n.º 1 (30 de janeiro de 2024): 24–41. http://dx.doi.org/10.3390/forensicsci4010003.
Texto completo da fontePisarić, Milana. "The use of policeware to hack electronic evidence in Germany and the Netherlands". Nauka, bezbednost, policija 28, n.º 1 (2023): 16–26. http://dx.doi.org/10.5937/nabepo28-43759.
Texto completo da fonteFidler, David P. "The U.S. Election Hacks, Cybersecurity, and International Law". AJIL Unbound 110 (2016): 337–42. http://dx.doi.org/10.1017/aju.2017.5.
Texto completo da fonteUl Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar e Mahnoor Arshad. "The Impacts of Ethical Hacking and its Security Mechanisms". Pakistan Journal of Engineering and Technology 5, n.º 4 (29 de dezembro de 2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.
Texto completo da fonteHussain, Syed Muzaffar. "AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS". Journal of Correctional Issues 5, n.º 1 (16 de agosto de 2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.
Texto completo da fonteBohnsack, René, e Meike Malena Liesner. "What the hack? A growth hacking taxonomy and practical applications for firms". Business Horizons 62, n.º 6 (novembro de 2019): 799–818. http://dx.doi.org/10.1016/j.bushor.2019.09.001.
Texto completo da fonteJordan, Tim. "A genealogy of hacking". Convergence: The International Journal of Research into New Media Technologies 23, n.º 5 (6 de abril de 2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.
Texto completo da fonteTeses / dissertações sobre o assunto "Hacking hack"
Cui, Zhiqiang. "Security Incidents in an Academic Setting: A Case Study". Digital Commons @ East Tennessee State University, 2002. https://dc.etsu.edu/etd/664.
Texto completo da fonteAxelsson, Andreas. "Bluetoothsäkerhet, neglegerad eller (o)kunskap". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131.
Texto completo da fonteFransén, Johan, e Adnan Sorlija. "Hacka dig själv och upptäck attacker". Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20852.
Texto completo da fonteThis thesis is based on the idea of hacking your own system before an outside hacker does it to find the system vulnerabilities. This is done with an automated hacking tool that performs penetration tests against the created website. The database technology that is used is the event database Event Store that stores every event that take place against the website. The task of Event Store in this case is to discover the different penetration tests and to store the events and to give indications to the administrator that the website was under attack. The study is primarily aimed at finding out whether Event Store is advisable to implement with a website where different penetration testing shall be made, and what the advantages and disadvantages are to using Event Store. Results show that Event Store can be used to identify anomalies against a website during attacks. Intrusions against the website can with great probability be proven with the help of the developed system with Event Store.
Naarden, Lydia. "User acquisition growth hacks for startups : A case study". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230970.
Texto completo da fonteThis study discusses several methods that startups can use to acquire new users for their product or service, from the perspective of a startup that forms the case study of this research and in comparison to other companies. As many startups are currently emerging, they seek cost-efficient ways for their company to grow. Companies such as Airbnb and Facebook used growth hacking when they started and lacked sufficient resources. Many blogs have been written about this phenomenon, but there is a lack of scientific research examining what needs to be done or considered. This research aims to contribute to filling that gap in relation to user acquisition. For six weeks, several strategies adopted by companies were tested at Locallife to determine which ones worked. The collected data were analysed and used for optimisations. Growth-hacking practices were performed on Facebook to identify which hacks lead to growth. The results show that the social media content calendar barely led to any conversions: after three weeks of execution and observation, the number of people that onboarded was unsatisfactory. However, local targeting content yielded satisfying results. Content with which the user can associate is more likely to attract the user's attention than general information about the product or service. Further, not only the tone of the campaign makes a difference for the audience; also the call to action influences people’s decision to onboard and the performance of the product or service. These findings are significant because they offer beginners and companies a perspective on which issues to consider when they decide to growth hack. Also, while many methods are discussed in blogs, only a few explain which adjustments were made before reaching a particular result, making it seem as if everything happened in one go. This research aims to explore the concept and show the efforts that need to be made for a startup to reach sustainable growth.
Barth, Klaus [Verfasser], B. [Gutachter] Kramp, T. [Gutachter] Hacki e W. [Gutachter] Seidner. "Funktionelle postoperative Befunde bei Patienten mit oropharyngealen Tumoren / Klaus Barth ; Gutachter: B. Kramp, T. Hacki, W. Seidner". Berlin : Humboldt-Universität zu Berlin, 2001. http://d-nb.info/1207626155/34.
Texto completo da fonteAlvarez, Juliana. "Vers le Design hacké : la nécessité d’une nouvelle posture épistémologique". Thèse, 2017. http://hdl.handle.net/1866/19275.
Texto completo da fonteToday’s hypermodern working environment is experiencing important social, environmental and technological changes pressing actors to acquire the know-how to solve complex problems. The new philosophy of "doing" and the rise of working collaboration strategies arising in our hypermodern society are not systematically reflected in design’s practice. Indeed, by trying to keep pace with a world in constant change, today's design discipline is struggling to keep up. The theories on collaborative innovation present some answers to develop this know-how by advocating a practice that deploys fluidity in projects or, in other words, an eco-auto-re-organisational strategy. However, in the absence of a practical and operational tool, collaborative innovation is still at the conceptual and utopian stage. This thesis aims to rethink project management in our hypermodern world. Starting from a specific example, the Hackathon, it explores new ways of thinking, doing and creating solutions based on an entirely innovative dynamics, grounded on an ethic and a practice specific to the new society of "doing" and inspired, in particular, by the hackers. The Hackathon is thus analyzed through an analytic grid called the Gyroscope of the project through which the actors, the actions and the organisation of the project are evaluated. The Gyroscope makes it possible to identify the project’s components in relation to each other and to understand the requirements needed to carry out each project according to the theoretical indicators of collaborative innovation. The analysis not only demonstrates that the Hackathon is indeed a concrete application of a new work ethic, but that its strength is in the early stages of the project’s conceptualization. The question that this analysis raises is: Is it possible to consider extending it to the whole development process, from ideation to implementation? This research presents an archaeological reading of the discipline of design which allows to identify the emblematic figures of the project through the historical periods that marked the design. The proposal of a new figure, the Hacking design, highlights the impact of hypermodernism's transformations on the practice of this discipline and the role of the practitioner, thus concluding that Design Thinking is now overtaken by an ethic of work that goes beyond a way of thinking, but involves a new epistemological posture. Many disciplines contiguous to Design, including Management, Entrepreneurship and Engineering, have therefore a strong interest in Design, which they perceive as a response to the success of collaborative innovation within organizations. The expectations towards the discipline of Design, from its theory to its practice are, therefore, very high.
Livros sobre o assunto "Hacking hack"
Kent, Nabors, ed. Dissecting the hack: The f0rb1dd3n network. Burlington, MA: Syngress, 2010.
Encontre o texto completo da fonteKnaster, Scott. Hacking MAC OS X Tiger: Serious hacks, mods and customizations. Indianapolis, Ind: Wiley, 2005.
Encontre o texto completo da fonteAL-smadi, Yacoub. Hacking: Android Hack. Independently Published, 2020.
Encontre o texto completo da fonteBuku Sakti Hacker. Efvy Zam, 2011.
Encontre o texto completo da fonteHacking: Ultimate Hacking for Beginners, How to Hack. CreateSpace Independent Publishing Platform, 2015.
Encontre o texto completo da fontePrakash, Abhijeet. Hack the World - Ethical Hacking. Lulu Press, Inc., 2015.
Encontre o texto completo da fonteSolimene, Giacomo. I Hack You: Prontuario Del Hacking. Independently Published, 2018.
Encontre o texto completo da fonteWagner, Alex. Hacking: How to Hack Web Apps. Independently Published, 2020.
Encontre o texto completo da fonteHacking : Hacking for Beginners and Basic Security: How to Hack. Lulu Press, Inc., 2016.
Encontre o texto completo da fonteEncyclopedia of hacking: Headline makers, hack attacks and hacking solutions. Greenwood Publishing Group: ABC-CLIO, LLC, 2005.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Hacking hack"
Varsalone, Jesse, e Christopher Haller. "Web Application Hacking and Defense". In The Hack Is Back, 49–99. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-3.
Texto completo da fonteVarsalone, Jesse, e Christopher Haller. "Hacking and Securing Your Operating System". In The Hack Is Back, 1–20. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003033301-1.
Texto completo da fonteAnderie, Lutz. "Game Hacking: Von der Raubkopie zum Cybercrime Game Hack". In Quick Guide Game Hacking, Blockchain und Monetarisierung, 1–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60859-3_1.
Texto completo da fonteSontopski, Natalie. "Hack back! Die historische Abwertung von Queerness bei KI und Potenziale des ›hacking back‹". In KI-Kritik / AI Critique, 121–36. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839461891-007.
Texto completo da fonteGoodman, Marc. "Kapitel 12: Wenn man alles hacken kann". In Global Hack, 289–309. München: Carl Hanser Verlag GmbH & Co. KG, 2015. http://dx.doi.org/10.3139/9783446444645.012.
Texto completo da fonteBritton, Ren Loren, e Isabel Paehr. "What is it, I do(n't) not know? I (we) do not know (but will feel) the name". In Doing Research - Wissenschaftspraktiken zwischen Positionierung und Suchanfrage, 288–95. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839456323-035.
Texto completo da fonte"Hardware Hacking". In Hack Proofing Your Network, 609–54. Elsevier, 2002. http://dx.doi.org/10.1016/b978-192899470-1/50017-3.
Texto completo da fonte"How Hackers Hack". In Hacking the Hacker, 9–21. Indianapolis, Indiana: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119396260.ch2.
Texto completo da fonteRussell. "Hacking Methodology". In Hack Proofing Your Web Applications, 1–41. Elsevier, 2001. http://dx.doi.org/10.1016/b978-192899431-2/50005-6.
Texto completo da fonteGrand, Joe, Ryan Russell, Kevin D. Mitnick, Andrew “bunnie” Huang, Lee Barken, Marcus R. Brown, Job de Haas et al. "Hack Your Atari 2600 and 7800". In Hardware Hacking, 199–245. Elsevier, 2004. http://dx.doi.org/10.1016/b978-193226683-2/50013-2.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Hacking hack"
Vinjosh Reddy, S., K. Sai Ramani, K. Rijutha, Sk Mohammad Ali e CH Pradeep Reddy. "Wireless hacking - a WiFi hack by cracking WEP". In 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529269.
Texto completo da fonteBorgia, S. "HACK: a Holistic modeling Approach for Cubesat cyberattacKs". In Aerospace Science and Engineering. Materials Research Forum LLC, 2023. http://dx.doi.org/10.21741/9781644902677-41.
Texto completo da fonteYunitasari, Yessi, Latjuba S. T. T. Sofyana e Maria Ulfah Siregar. "Cyber Crime Identifying Using Machine Learning Techniques - Based Sentiment Analysis". In The 6th International Conference on Science and Engineering. Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-j46rcy.
Texto completo da fonte