Academic literature on the topic 'Ethical Hacking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ethical Hacking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Ethical Hacking"

1

Farsole, Ajinkya A., Amruta G. Kashikar, and Apurva Zunzunwala. "Ethical Hacking." International Journal of Computer Applications 1, no. 10 (February 25, 2010): 14–20. http://dx.doi.org/10.5120/229-380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Palmer, C. C. "Ethical hacking." IBM Systems Journal 40, no. 3 (2001): 769–80. http://dx.doi.org/10.1147/sj.403.0769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Utomo, Galih Aryo. "ETHICAL HACKING." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 8–15. http://dx.doi.org/10.14421/csecurity.2019.2.1.1418.

Full text
Abstract:
Ethical Hacking is done by companies in anticipation of system security loopholes. Ethical hacking is done by someone who has the ability like a hacker who is able to attack a system but has the motivation to help companies find security gaps that companies will use to evaluate their systems. This paper explains the importance of information and why it must be maintained and how an ethical hacker does his work.
APA, Harvard, Vancouver, ISO, and other styles
4

Cooper, Martin. "Adventures in Ethical Hacking." ITNOW 58, no. 3 (September 2016): 36–37. http://dx.doi.org/10.1093/itnow/bww074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Wanbil W. "Ethical Computing for Data Protection." International Journal of Technoethics 11, no. 1 (January 2020): 43–58. http://dx.doi.org/10.4018/ijt.2020010104.

Full text
Abstract:
Data protection is a chronic problem. Technology has had a social and ethical impact on our professional, social, and private lives. It is imperative for computing practitioners and researchers to link the ethical dilemmas and the technologies to the relevant ethical theories. This paper argues that the cause is rooted in our indifference to ethics—one doesn't take ethics as seriously into consideration as one should when formulating information security policies and protection standards—and proposes an ethics-based approach that can lessen the incidence of hacking or make hacking exasperate, aiming at mitigation rather than eradication. Central to this approach is ethical computing preconditioned on a sound understanding of the applicable theories of ethics and a shift of view of risk and ethics.
APA, Harvard, Vancouver, ISO, and other styles
6

Bellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (February 12, 2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.

Full text
Abstract:
AbstractIn recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do so. At its core this paper will argue that political hacking can be justified when it is done to protect the vital interests of oneself or others. Moreover, it will also argue that just because hackers are outside the state does not automatically discount them as ethical actors and that when the state fails to protect people – whether it is due to a lack of ability, political will or because the state is the source of the threat – hackers can fill the void. In order to achieve this, first it is necessary to highlight the space for hackers to operate; second, guide hacker activity by creating an ethical framework detailing what actions are justified towards what end; third, to offer mechanisms that can aid in reaching these ethically justified decisions; and as a result, inform further ethical debates on how to react to these political hackers. This means that the framework can be used to both justify and condemn hacking depending on the circumstances, allowing those on the outside to distil and evaluate a political hack, both past and present, while guiding hacker collectives by providing clearer ethical tools for determining the appropriate agendas and methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Abu-Shaqra, Baha, and Rocci Luppicini. "Technoethical Inquiry into Ethical Hacking at a Canadian University." International Journal of Technoethics 7, no. 1 (January 2016): 62–76. http://dx.doi.org/10.4018/ijt.2016010105.

Full text
Abstract:
Business and academic organizations are in a constant pursuit of efficient and ethical technologies and practices to safeguard their information assets from the growing threat of hackers. Ethical hacking is one important information security risk management strategy they use. Most published books on ethical hacking have focused on its technical applications in risk assessment practices. This paper addressed a scarcity within the organizational communication literature on ethical hacking. Taking a qualitative exploratory case study approach, the authors explored ethical hacking implementation within a Canadian university as the case study in focus, applying technoethical inquiry theory paired with Karl Weick's sensemaking model as a theoretical framework. In-depth interviews with key stakeholder groups and a document review were conducted. Findings pointed to the need to expand the communicative and sociocultural considerations involved in decision making about ethical hacking organizational practices, and to security awareness training to leverage sensemaking opportunities and reduce equivocality.
APA, Harvard, Vancouver, ISO, and other styles
8

Reddy, P. Harika. "Cyber Security and Ethical Hacking." International Journal for Research in Applied Science and Engineering Technology 6, no. 6 (June 30, 2018): 1770–74. http://dx.doi.org/10.22214/ijraset.2018.6261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yadav, Sarita, Anuj Mahajan, Monika Prasad, and Avinash Kumar. "ADVANCED KEYLOGGER FOR ETHICAL HACKING." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 634–38. http://dx.doi.org/10.33564/ijeast.2020.v05i01.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Genosko, Gary. "Review of Maurushat’s Ethical Hacking." Surveillance & Society 17, no. 3/4 (September 7, 2019): 574–76. http://dx.doi.org/10.24908/ss.v17i3/4.13495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Ethical Hacking"

1

Peacock, Donna. "From underground hacking to ethical hacking." Thesis, Northumbria University, 2013. http://nrl.northumbria.ac.uk/32285/.

Full text
Abstract:
This Thesis explores the nature and practice of ‘Ethical Hacking’. Ethical Hackers are individuals who use hacking skills, knowledge and techniques within legitimate authorised practice; they are employed to Hack. A Critical Realist methodological approach is employed in order to gain a qualitative understanding of a real phenomenon through a range of key informants who provide personal narratives within semi-structured interviews, commenting upon their own realities, and their perceptions of the field in which they work. A Bounded Rational Model of decision making reveals that decisions relating to involvement in criminality and individual Hacking events are made through a process of reasoning, of approximating the net gains and losses of a particular course of action, and that these decisions are ‘bounded’ by social norms, ethical approaches and the personal motivations and social circumstances within which the decisions and behaviour are framed.
APA, Harvard, Vancouver, ISO, and other styles
2

Flores, Solís Fernando Rolyn. "Ethical hacking - RC19 201801." Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/623917.

Full text
Abstract:
El presente es un curso de especialidad de la carrera Ingeniería de Redes y Comunicaciones EPE, de carácter teórico, dirigido a los estudiantes del nivel 12 de la carrera, que busca desarrollar la competencia general de pensamiento critico nivel 3 y la competencia específica B - Capacidad para diseñar y realizar experimentos y analizar e interpretar los datos en Ingeniería de Redes y Comunicaciones - nivel 3. Este curso permitirá al alumno conocer los principales vectores de ataque que se despliegan sobre los sistemas a nivel mundial, permitiéndole reconocer las vulnerabilidades, como se explotan las debilidades en los sistemas y ayudarle a proteger los activos de las amenazas.
APA, Harvard, Vancouver, ISO, and other styles
3

Achkoudir, Rami, and Zainab Alsaadi. "Ethical Hacking of a Smart Plug." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291355.

Full text
Abstract:
The number of Internet of Things (IoT) devices is growing rapidly which introduces plenty of new challenges concerning the security of these devices. This thesis aims to contribute to a more sustainable IoT environment by evaluating the security of a smart plug. The DREAD and STRIDE methods were used to assess the potential threats and the threats with the highest potential impact were penetration tested in order to test if there were any security preventions in place. The results from the penetration tests presented no major vulnerabilities which bring us to the conclusion that the Nedis Smart Plug has implemented enough security measures.
Antalet Internet of Things (IoT) -enheter växer snabbt vilket medför många nya utmaningar när det gäller säkerheten för dessa enheter. Denna avhandling syftar till att bidra till en mer hållbar IoT-miljö genom att utvärdera säkerheten för en smart plug. Metoderna DREAD och STRIDE användes för att bedöma de potentiella hoten och hoten med störst potentiell påverkan penetrerades för att testa om det fanns några säkerhetsförebyggande åtgärder. Resultaten från penetrationstesterna presenterade inga större sårbarheter som ledde oss till slutsatsen att Nedis Smart Plug har genomfört tillräckliga säkerhetsåtgärder.
APA, Harvard, Vancouver, ISO, and other styles
4

Torgilsman, Christoffer, and Eric Bröndum. "Ethical Hacking of a Robot Vacuum Cleaner." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918.

Full text
Abstract:
This study revolves around the safety of IoT devices, more specifically how safe the robot vacuum cleaner Ironpie m6 is. The method is based on threat modeling the device, using the DREAD and STRIDE models. The threats with the highest estimated severity were then penetration tested to see which security measures are implemented to protect against them. Using client side manipulation one vulnerability was found in Trifo’s mobile application ”Trifo home” which could be used to harm customers property.
Den här studien kretsar kring IoT enheters säkerhet, mer specifikt hur säker robotdammsugaren Ironpie m6 är. Metoden är baserad på att hotmodellera enheten med hjälp av DREAD och STRIDE modellerna. Dem allvarligaste hoten blev penetrationstestade för att se vilka säkerhetsåtgärder som har blivit implementerade for att skydda produkten från dem. En sårbarhet upptäcktes i Trifos mobilapplikation ”Trifo Home” som kunde exploiteras via manipulation av klient sidan. Denna sårbarhet kunde användas för att skada kunders ägodelar.
APA, Harvard, Vancouver, ISO, and other styles
5

Conde, Ortiz Daniel. "Ethical Hacking Of An Industrial Control System." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285573.

Full text
Abstract:
Almost no software is exempt of vulnerabilities. Penetration testing or ethicalhacking can be used to identify them. This thesis conducts a series of testsfollowing the penetration testing method on a large scale industrial controlsystem. The goal is to discover which kind of vulnerabilities exist in thesesystems, focusing on attacks from inside of their network. Several approacheswere taken in relation on how to attack the servers and services that form thenetwork, both from outside and inside the machines. Critical vulnerabilitieswere found in relation to using services unauthenticated and disruptingcommunication between servers, which should be mitigated correctly in orderto prevent further potential attacks.
De flesta av programvaror har sårbarheter. Penetrationstest eller etiskhacking kan användas för att identifiera dem. Denna avhandling utför testerenligt penetrationstestmetoden i ett industriellt kontrollsystem i stor skala.Målet är att upptäcka vilka sårbarheter som finns i dessa system, med fokuspå attacker från deras nätverk. Flera tillvägagångssätt användes för attattackera servrar och tjänster på nätverket, både från in- och utsidan avmaskinera. Kritiska sårbarheter hittades i samband med autentisering ochstörande kommunikation mellan servrar, som bör åtgärdas för att förhindraytterligare potentiella attacker.
APA, Harvard, Vancouver, ISO, and other styles
6

Lindeberg, Axel. "Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302999.

Full text
Abstract:
The number of IoT systems in our homes has exploded in recent years. By 2025 it is expected that the number of IoT devices will reach 38 billion. Home alarm systems are an IoT product that has increased dramatically in number and complexity in recent years. Besides triggering an alarm when an intruder tries to break in, a modern system can now control your light bulbs, lock and unlock your front door remotely, and interact with your smart speaker. They are undeniably effective in deterring physical intrusion. However, given the recent rise in complexity how well do they hold up against cyber attacks? In this thesis, a smart home alarm system from SecuritasHome is examined. A comprehensive security analysis was performed using penetration testing techniques and threat modeling. The work focused mainly on radio frequency (RF) hacking against the systems RF communication. Among other things, a critical vulnerability was found in the proprietary RF protocol, allowing an attacker to disarm an armed system and thus completely bypass the system’s functionality. The security of the system was deemed to be lacking.
Antalet IoT system i våra hem har exploderat de senaste åren. Vid år 2025 förväntas antalet IoT enheter nå 38 miljarder. Hemlarmsystem är en typ av IoT-produkt som ökat dramatiskt i komplexitet på senare tid. Förutom att framkalla ett larm vid ett intrång kan ett modernt hemlamsystem numera kontrollera dina glödlampor, låsa och låsa upp din ytterdörr, samt kontrollera dina övervakningskameror. De är utan tvekan effektiva på att förhindra fysiska intrång, men hur väl står de emot cyberattacker? I denna uppsats undersöks ett hemlarmsystem från SecuritasHome. En utförlig säkerhetsanalys gjordes av systemet med penetrationstestnings-metodiker och hotmodellering. Arbetet fokuserade mestadels på radiovågshackning (RF) mot systemets RF-kommunikation. Bland annat hittades en kritiskt sårbarhet i systemets RF-protokoll som gör det möjligt för en angripare att avlarma ett larmat system, och därmed kringå hela systemets funktionalitet. Säkerheten av systemet bedömdes vara bristfällig.
APA, Harvard, Vancouver, ISO, and other styles
7

Christensen, Ludvig, and Daniel Dannberg. "Ethical hacking of IoT devices: OBD-II dongles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571.

Full text
Abstract:
The subject area of this project is IT security related to cars, specifically the security of devices connected through a cars OBD-II connector. The aim of the project is to see the security level of the AutoPi OBD-II unit and to analyse where potential vulnerabilities are likely to occur when in use. The device was investigated using threat modeling consisting of analysing the architecture, using the STRIDE model to see the potential attacks that could be implemented and risk assessments of the attacks using the DREAD model. After modelling the system, attempts of implementing attacks, with the basis in the threat modelling, were carried out. No major vulnerabilities were found in the AutoPi device but a MITM attack on the user was shown to be possible for an attacker to succeed with. Even though no major vulnerability was found IoT devices connected to cars might bring security concerns that needs to be looked into by companies and researchers.
Ämnesområdet för detta projekt är ITsäkerhet relaterad till bilar, mer specifikt säkerheten gällande enheter som kopplas in i en bils OBD-II-kontakt. Syftet med uppsatsen är att bedöma säkerhetsnivån på en OBD-II-enhet av modell AutoPi och att analysera var potentiella sårbarheter kan finnas i systemet. Enheten kommer att undersökas med hjälp av hotmodellering som består av att analysera arkitekturen, använda STRIDE-modellen för att upptäcka potentiella attackmetoder samt bedöma riskerna för attackerna med hjälp av DREAD-modellen. Efter det steget görs attackförsök utifrån resultaten från hotmodelleringen. Inga större sårbarheter hittades i AutoPi-enheten men en MITM-attack på användaren visades vara möjlig för en angripare att lyckas med. Ä ven fast inga större sårbarheter hittades kan IoT-enheter kopplade till bilar medföra säkerhetsbrister som företag och forskare måste se över.
APA, Harvard, Vancouver, ISO, and other styles
8

Berner, Madeleine. "Where’s My Car? Ethical Hacking of a Smart Garage." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280298.

Full text
Abstract:
IoT products are breaking new ground into widespread industries and introducing potential attack vectors to unprepared environments. Even the new generation of garage openers, called smart garages, have entered into the world of IoT. They are connected to the Internet, and are delivered with the goal of providing more security by merging features from the home surveillance boom. But do they keep what they promise? This thesis has evaluated the security of one particular smart garage that is being sold worldwide – iSmartgate PRO. Penetration testing was conducted with focus on the web application. A total of eleven vulnerabilities were reported, including a one-click-root attack that combined three of them into providing an unauthenticated remote attacker with a root shell. It was concluded that the product lacked security measures in certain areas.
IoT-produkter bryter ny mark inom spridda branscher, och introducerar potentiella attackvektorer i oförberedda miljöer. Det är inte förvånande att till och med den nya generationen garageöppnare har tagit ett kliv in i världen av IoT. Vilket innebär att garageöppnarna är uppkopplade till Internet, kallas för smarta garage och levereras med målet att bidra till ökad säkerhet med sina nya funktioner tagna från trenden av hemmaövervakning. Men kan de hålla vad de lovar? Det här examensarbetet har utvärderat säkerheten av ett utvalt smart garage som säljs världen över – iSmartgate PRO. Penetrationstestning genomfördes med fokus på webbapplikationen. Totalt sett rapporterades elva sårbarheter, varav en inkluderade en one-click-root-attack som kombinerade tre sårbarheter till att ge en icke autentisierad fjärrangripare ett root-skal. Den dragna slutsatsen var att produkten hade utrymme för att förbättra säkerheten.
APA, Harvard, Vancouver, ISO, and other styles
9

Radholm, Fredrik, and Niklas Abefelt. "Ethical Hacking of an IoT-device:Threat Assessment andPenetration Testing." Thesis, KTH, Datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-282916.

Full text
Abstract:
Abstract Internet of things (IoT) devices are becoming more prevalent.Due to a rapidly growing market of these appliances, impropersecurity measures lead to an expanding range of attacks. There isa devoir of testing and securing these devices to contribute to amore sustainable society. This thesis has evaluated the securityof an IoT-refrigerator by using ethical hacking, where a threatmodel was produced to identify vulnerabilities. Penetration testswere performed based on the threat model. The results from thepenetration tests did not find any exploitable vulnerabilities. Theconclusion from evaluating the security of this Samsungrefrigerator can say the product is secure and contributes to aconnected, secure, and sustainable society. Keywords Internet of things (IoT), device, security, penetration testing,threat assessment, vulnerabilities
SammanfattningInternet of Things (IoT) enheter blir mer allmäntförekommande. På grund av en snabbt expanderande marknadav dessa apparater, har bristfälliga säkerhetsåtgärder resulterattill en mängd olika attacker. Det finns ett behov att testa dessaenheter for att bidra till ett mer säkert och hållbart samhälle.Denna avhandling har utvärderat säkerheten av ett IoT-kylskåpgenom att producera en hot modell för att identifierasårbarheter. Penetrationstester har utförts på enheten, baseradepå hot modellen. Resultatet av penetrationstesterna hittade ingautnyttjningsbara sårbarheter. Slutsatsen från utvärderingen avsäkerheten på Samsung-kylskåpet är att produkten är säker ochbidrar till ett uppkopplat, säkert, och hållbart samhälle.KeywordsInternet of things (IoT), enhet, säkerhet, penetrationstester,hotbedömning, sårbarheter
APA, Harvard, Vancouver, ISO, and other styles
10

Florez, Cardenas Mateo, and Gabriel Acar. "Ethical Hacking of a Smart Fridge : Evaluating the cybersecurity of an IoT device through gray box hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302373.

Full text
Abstract:
With the increasing popularity of Internet of Things (IoT) devices, a complete smart home is becoming more of a reality. Thus the security of said devices is becoming increasingly more important. Unsecured IoT devices could lead to potential consequences of societal proportion. Therefore there is an entire industry dedicated to mitigating such security threats and contributing to a sustainable society. The security of a Samsung Smart Refrigerator was evaluated in this thesis. The methodology implemented followed a gray box approach and consisted of initially creating a threat model, indicating potential vulnerabilities, and then using the said model to design penetration tests to assess the findings. It was concluded that the fridge was secure in the scope of this thesis. However, grounds for further research were discovered.
Med den ökande populariteten för IoT-enheter (Internet of Things) blir ett komplett smart hem alltmer verklighet. Säkerheten för dessa enheter blir därför allt viktigare. Osäkrade IoT-enheter kan leda till potentiella konsekvenser av samhällelig omfattning. Därför finns det en hel industri som ägnar sig åt att mildra sådana säkerhetshot och bidra till ett hållbart samhälle. Säkerheten hos ett smart kylskåp från Samsung utvärderades i denna avhandling. Den metod som tillämpades följde en grå box-strategi och bestod av att först skapa en hot modell, ange potentiella sårbarheter och sedan använda nämnda modell för att utforma penetrationstester för att bedöma resultaten. Slutsatsen blev att kylskåpet var säkert inom ramen för denna avhandling. Det upptäcktes dock skäl för ytterligare forskning.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Ethical Hacking"

1

Gupta, Sunil. Ethical Hacking – Orchestrating Attacks. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4340-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sinha, Sanjib. Beginning Ethical Hacking with Python. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2541-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Sunil. Ethical Hacking – Networks and Websites. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4341-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Sunil. Ethical Hacking – Learning the Basics. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4348-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Unofficial guide to ethical hacking. Delhi: Macmillan, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Unofficial guide to ethical hacking. [S.l.]: Premier Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sinha, Sanjib. Beginning Ethical Hacking with Kali Linux. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3891-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gray hat hacking: The ethical hacker's handbook. 3rd ed. New York: McGraw-Hill, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. 2nd ed. Boston, MA: Course Technology, Cengage Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fadia, Ankit. The ethical hacking guide to corporate security. New Delhi: Macmillan India Ltd., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Ethical Hacking"

1

Patterson, Wayne, and Cynthia E. Winston-Proctor. "Ethical Hacking." In Behavioral Cybersecurity, 111–14. Boca Raton : Taylor & Francis, CRC Press, 2019.: CRC Press, 2019. http://dx.doi.org/10.1201/9780429461484-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jaquet-Chiffelle, David-Olivier, and Michele Loi. "Ethical Hacking: Is It Ethical?" In Encyclopedia of Business and Professional Ethics, 1–6. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-23514-1_238-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sinha, Sanjib. "Hacking Environment." In Beginning Ethical Hacking with Python, 5–8. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rahalkar, Sagar Ajay. "Wireless Hacking." In Certified Ethical Hacker (CEH) Foundation Guide, 143–51. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rahalkar, Sagar Ajay. "Hacking Basics." In Certified Ethical Hacker (CEH) Foundation Guide, 119–29. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sheikh, Ahmed. "System Hacking." In Certified Ethical Hacker (CEH) Preparation Guide, 35–47. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7258-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sheikh, Ahmed. "Hacking Webservers." In Certified Ethical Hacker (CEH) Preparation Guide, 103–14. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7258-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jaquet-Chiffelle, David-Olivier, and Michele Loi. "Ethical and Unethical Hacking." In The International Library of Ethics, Law and Technology, 179–204. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29053-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sheikh, Ahmed. "Introduction to Ethical Hacking." In Certified Ethical Hacker (CEH) Preparation Guide, 1–9. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7258-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rahalkar, Sagar Ajay. "Web Application Hacking." In Certified Ethical Hacker (CEH) Foundation Guide, 131–41. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Ethical Hacking"

1

Demetrio, Luca, Giovanni Lagorio, Marina Ribaudo, Enrico Russo, and Andrea Valenza. "ZenHackAdemy: Ethical Hacking @ DIBRIS." In 11th International Conference on Computer Supported Education. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007747104050413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Provost, Lauren E., Rebecca Labitt, Danielle Alexandre, and Asher Rodriguez. "Approaches to ethical hacking." In HotSoS '20: Hot Topics in the Science of Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3384217.3386400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Snyder, Robin. "Ethical hacking and password cracking." In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

S K, Ashwini, and K. Thippeswamy. "A Brief Information of Ethical Hacking." In 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics. AIJR Publisher, 2018. http://dx.doi.org/10.21467/proceedings.1.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ashraf, Maneeba, Ayima Zahra, Muhammad Asif, Maaz Bin Ahmad, and Sadia Zafar. "Ethical Hacking Methodologies: A Comparative Analysis." In 2021 Mohammad Ali Jinnah University International Conference on Computing (MAJICC). IEEE, 2021. http://dx.doi.org/10.1109/majicc53071.2021.9526243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saleem, Syed A. "Ethical hacking as a risk management technique." In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Patil, Sonali, Ankur Jangra, Mandar Bhale, Akshay Raina, and Pratik Kulkarni. "Ethical hacking: The need for cyber security." In 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI). IEEE, 2017. http://dx.doi.org/10.1109/icpcsi.2017.8391982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lopez de Jimenez, Rina Elizabeth. "Pentesting on web applications using ethical - hacking." In 2016 IEEE 36th Central American and Panama Convention (CONCAPAN XXXVI). IEEE, 2016. http://dx.doi.org/10.1109/concapan.2016.7942364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ding, Aaron Yi, Gianluca Limon De Jesus, and Marijn Janssen. "Ethical hacking for boosting IoT vulnerability management." In the Eighth International Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3357767.3357774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khokhar, Umar Mujahid, and Binh Tran. "Fundamentals of Ethical Hacking and Penetration Testing." In SIGITE '19: The 20th Annual Conference on Information Technology Education. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3349266.3351391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography