Academic literature on the topic 'Ethical Hacking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ethical Hacking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Ethical Hacking"
Farsole, Ajinkya A., Amruta G. Kashikar, and Apurva Zunzunwala. "Ethical Hacking." International Journal of Computer Applications 1, no. 10 (2010): 14–20. http://dx.doi.org/10.5120/229-380.
Full textPalmer, C. C. "Ethical hacking." IBM Systems Journal 40, no. 3 (2001): 769–80. http://dx.doi.org/10.1147/sj.403.0769.
Full textUtomo, Galih Aryo. "ETHICAL HACKING." Cyber Security dan Forensik Digital 2, no. 1 (2019): 8–15. http://dx.doi.org/10.14421/csecurity.2019.2.1.1418.
Full textCooper, Martin. "Adventures in Ethical Hacking." ITNOW 58, no. 3 (2016): 36–37. http://dx.doi.org/10.1093/itnow/bww074.
Full textLee, Wanbil W. "Ethical Computing for Data Protection." International Journal of Technoethics 11, no. 1 (2020): 43–58. http://dx.doi.org/10.4018/ijt.2020010104.
Full textBellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.
Full textAbu-Shaqra, Baha, and Rocci Luppicini. "Technoethical Inquiry into Ethical Hacking at a Canadian University." International Journal of Technoethics 7, no. 1 (2016): 62–76. http://dx.doi.org/10.4018/ijt.2016010105.
Full textReddy, P. Harika. "Cyber Security and Ethical Hacking." International Journal for Research in Applied Science and Engineering Technology 6, no. 6 (2018): 1770–74. http://dx.doi.org/10.22214/ijraset.2018.6261.
Full textYadav, Sarita, Anuj Mahajan, Monika Prasad, and Avinash Kumar. "ADVANCED KEYLOGGER FOR ETHICAL HACKING." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (2020): 634–38. http://dx.doi.org/10.33564/ijeast.2020.v05i01.112.
Full textGenosko, Gary. "Review of Maurushat’s Ethical Hacking." Surveillance & Society 17, no. 3/4 (2019): 574–76. http://dx.doi.org/10.24908/ss.v17i3/4.13495.
Full textDissertations / Theses on the topic "Ethical Hacking"
Peacock, Donna. "From underground hacking to ethical hacking." Thesis, Northumbria University, 2013. http://nrl.northumbria.ac.uk/32285/.
Full textFlores, Solís Fernando Rolyn. "Ethical hacking - RC19 201801." Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/623917.
Full textAchkoudir, Rami, and Zainab Alsaadi. "Ethical Hacking of a Smart Plug." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291355.
Full textTorgilsman, Christoffer, and Eric Bröndum. "Ethical Hacking of a Robot Vacuum Cleaner." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918.
Full textConde, Ortiz Daniel. "Ethical Hacking Of An Industrial Control System." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285573.
Full textLindeberg, Axel. "Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302999.
Full textChristensen, Ludvig, and Daniel Dannberg. "Ethical hacking of IoT devices: OBD-II dongles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571.
Full textBerner, Madeleine. "Where’s My Car? Ethical Hacking of a Smart Garage." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280298.
Full textRadholm, Fredrik, and Niklas Abefelt. "Ethical Hacking of an IoT-device:Threat Assessment andPenetration Testing." Thesis, KTH, Datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-282916.
Full textFlorez, Cardenas Mateo, and Gabriel Acar. "Ethical Hacking of a Smart Fridge : Evaluating the cybersecurity of an IoT device through gray box hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302373.
Full textBooks on the topic "Ethical Hacking"
Gupta, Sunil. Ethical Hacking – Orchestrating Attacks. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4340-4.
Full textSinha, Sanjib. Beginning Ethical Hacking with Python. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2541-7.
Full textGupta, Sunil. Ethical Hacking – Networks and Websites. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4341-1.
Full textGupta, Sunil. Ethical Hacking – Learning the Basics. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4348-0.
Full textSinha, Sanjib. Beginning Ethical Hacking with Kali Linux. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3891-2.
Full textKent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. 2nd ed. Course Technology, Cengage Learning, 2011.
Find full textFadia, Ankit. The ethical hacking guide to corporate security. Macmillan India Ltd., 2004.
Find full textBook chapters on the topic "Ethical Hacking"
Patterson, Wayne, and Cynthia E. Winston-Proctor. "Ethical Hacking." In Behavioral Cybersecurity. CRC Press, 2019. http://dx.doi.org/10.1201/9780429461484-14.
Full textJaquet-Chiffelle, David-Olivier, and Michele Loi. "Ethical Hacking: Is It Ethical?" In Encyclopedia of Business and Professional Ethics. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-23514-1_238-1.
Full textSinha, Sanjib. "Hacking Environment." In Beginning Ethical Hacking with Python. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_2.
Full textRahalkar, Sagar Ajay. "Wireless Hacking." In Certified Ethical Hacker (CEH) Foundation Guide. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_11.
Full textRahalkar, Sagar Ajay. "Hacking Basics." In Certified Ethical Hacker (CEH) Foundation Guide. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_9.
Full textSheikh, Ahmed. "System Hacking." In Certified Ethical Hacker (CEH) Preparation Guide. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7258-9_4.
Full textSheikh, Ahmed. "Hacking Webservers." In Certified Ethical Hacker (CEH) Preparation Guide. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7258-9_9.
Full textJaquet-Chiffelle, David-Olivier, and Michele Loi. "Ethical and Unethical Hacking." In The International Library of Ethics, Law and Technology. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29053-5_9.
Full textSheikh, Ahmed. "Introduction to Ethical Hacking." In Certified Ethical Hacker (CEH) Preparation Guide. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7258-9_1.
Full textRahalkar, Sagar Ajay. "Web Application Hacking." In Certified Ethical Hacker (CEH) Foundation Guide. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_10.
Full textConference papers on the topic "Ethical Hacking"
Demetrio, Luca, Giovanni Lagorio, Marina Ribaudo, Enrico Russo, and Andrea Valenza. "ZenHackAdemy: Ethical Hacking @ DIBRIS." In 11th International Conference on Computer Supported Education. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007747104050413.
Full textProvost, Lauren E., Rebecca Labitt, Danielle Alexandre, and Asher Rodriguez. "Approaches to ethical hacking." In HotSoS '20: Hot Topics in the Science of Security. ACM, 2020. http://dx.doi.org/10.1145/3384217.3386400.
Full textSnyder, Robin. "Ethical hacking and password cracking." In the 3rd annual conference. ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231051.
Full textS K, Ashwini, and K. Thippeswamy. "A Brief Information of Ethical Hacking." In 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics. AIJR Publisher, 2018. http://dx.doi.org/10.21467/proceedings.1.75.
Full textAshraf, Maneeba, Ayima Zahra, Muhammad Asif, Maaz Bin Ahmad, and Sadia Zafar. "Ethical Hacking Methodologies: A Comparative Analysis." In 2021 Mohammad Ali Jinnah University International Conference on Computing (MAJICC). IEEE, 2021. http://dx.doi.org/10.1109/majicc53071.2021.9526243.
Full textSaleem, Syed A. "Ethical hacking as a risk management technique." In the 3rd annual conference. ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231089.
Full textPatil, Sonali, Ankur Jangra, Mandar Bhale, Akshay Raina, and Pratik Kulkarni. "Ethical hacking: The need for cyber security." In 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI). IEEE, 2017. http://dx.doi.org/10.1109/icpcsi.2017.8391982.
Full textLopez de Jimenez, Rina Elizabeth. "Pentesting on web applications using ethical - hacking." In 2016 IEEE 36th Central American and Panama Convention (CONCAPAN XXXVI). IEEE, 2016. http://dx.doi.org/10.1109/concapan.2016.7942364.
Full textDing, Aaron Yi, Gianluca Limon De Jesus, and Marijn Janssen. "Ethical hacking for boosting IoT vulnerability management." In the Eighth International Conference. ACM Press, 2019. http://dx.doi.org/10.1145/3357767.3357774.
Full textKhokhar, Umar Mujahid, and Binh Tran. "Fundamentals of Ethical Hacking and Penetration Testing." In SIGITE '19: The 20th Annual Conference on Information Technology Education. ACM, 2019. http://dx.doi.org/10.1145/3349266.3351391.
Full text