Academic literature on the topic 'Hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hackers"

1

Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (May 2, 2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.

Full text
Abstract:
Supplementing the literature on information sharing between firms, the paper seeks to understand information sharing between hackers and how firms defend against increasingly sophisticated hackers. Each hacker seeks financial gain, mutually beneficial information exchange, and reputation gain. The two hackers’ attack and the firm’s defense are inverse U shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The first hacker’s information sharing increases as both hackers focus increasingly on reputation gain. The two hackers largely increase their information sharing, with two exceptions. The second hacker’s attack is deterred by the first hacker’s reputation gain. The firm’s defense against the second hacker increases in the second hacker’s unit cost, decreases in the second hacker’s information sharing effectiveness and utilization of joint sharing, and also decreases in both hackers’ reputation gain. Policy and managerial implications are provided.
APA, Harvard, Vancouver, ISO, and other styles
2

Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.

Full text
Abstract:
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established, and the hacker also escalated his rights on the server. Therefore, the honeypot server setup has been designed to reveal the correlation of a hacker’s actions with that of the hacker’s experience, personality, expertise, and psychology. To the best of our knowledge, such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in the literature. However, no study evaluates the actual data of these hackers and these tests. This study also provides a honeypot design to understand the personality and expertise of the hacker and displays the correlation of these data with the tests. Our Honeypsy system is composed of a Big-5 personality test, a cyber expertise test, and a capture-the-flag (CTF) event to collect logs with honeypot applied in this sequence. These three steps generate data on the expertise and psychology of known cyber hackers. The logs of the known hacker activities on honeypots are obtained through the CTF event that they have participated in. The design and deployment of a honeypot, as well as the CTF event, were specifically prepared for this research. Our aim is to predict an unknown hacker's expertise and personality by analyzing these data. By examining/analyzing the data of the known hackers, it is now possible to make predictions about the expertise and personality of the unknown hackers. The same logic applies when one tries to predict the next move of the unknown hackers attacking the server. We have aimed to underline the details of the personalities and expertise of hackers and thus help the defense experts of victimized institutions to develop their cyber defense strategies in accordance with the modus operandi of the hackers.
APA, Harvard, Vancouver, ISO, and other styles
3

Bátfai, Norbert, Renátó Besenczi, József Szabó, Péter Jeszenszky, András Buda, László Jármi, Rita Barbara Lovas, Marcell Kristóf Pál, Gergő Bogacsovics, and Enikő Tóthné Kovács. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (April 6, 2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.

Full text
Abstract:
Klasszikus értelmezésben a hacker a kifinomult problémákat kifinomultan kezelni képes szakértő. Tipikusan programozó, de ugyanúgy mutathat hacker attitűdöket, lehet hacker egy művész, egy feltaláló, egy tudós vagy egy sportoló is. Ebben a cikkben azt mutatjuk be, hogyan lehet hacker egy e-sportoló játékos. A hacker természetéből fakadóan autodidakta, de a tanulási folyamat formális eszközökkel segíthető, katalizálható. A mi ilyen formális keretünk a Debreceni Egyetem Atlétikai Clubjának (DEAC) nemrégiben megalakított e-sport szakosztálya, a cikkben bemutatott DEAC-Hackers. --- DEAC-Hackers - Playing Hackers and Hacking Gamers In the classic sense of the word, a hacker is an expert who can solve sophisticated problems in a sophisticated way. In most cases, a hacker is a programmer, but hacker attitudes can be demonstrated by an artist, an inventor, a scientist or even an athlete. In this paper, we show how an esport player can be a hacker. A hacker is self-educated in nature, but his learning process can be aided with formal tools. One of our formal tools is the recently founded DEAC-Hackers, the esport department of the University of Debrecen Athletic Club, which is also introduced in this article. Keywords: esport, gamer, hacker, esport department
APA, Harvard, Vancouver, ISO, and other styles
4

Hausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (March 2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.

Full text
Abstract:
One firm defends proactively or retroactively against a first hacker, and thereafter against a second hacker, in four four-period games. The hackers share information for financial gain, mutual advantage, and reputation. The first hacker’s attack and information sharing are strategic substitutes. When the firm is proactive in period 1, the first hacker’s information sharing decreases as the second hacker’s attack cost increases. The deterring effort in eight corner solutions is proportional to the deterred player’s valuation and inverse proportional to the deterred player’s unit effort cost. When the first hacker exerts higher effort and shares more information, lower defense by the firm is sufficient to deter the second hacker. When the firm is deterred by the first hacker, the first hacker attacks less and shares more information than in the interior solution. For the first hacker and the firm, both players commonly prefer the disadvantaged player to move first. The exception is that the firm prefers to deter the first disadvantaged hacker when the two hackers benefit substantially from information sharing, reputation gain, or the second player is advantaged. The results contrast with the literature where the advantaged player commonly prefers to move first, with conflicting sequence preferences.
APA, Harvard, Vancouver, ISO, and other styles
5

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Full text
Abstract:
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.
APA, Harvard, Vancouver, ISO, and other styles
6

Guo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (April 28, 2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.

Full text
Abstract:
<p>Hacker culture is generally regarded as a subculture, and the public has a high degree of misunderstanding towards hackers. The media reports sometimes depict hackers overly negatively, possibly because hackers could gain a dominant position in the age of information and, therefore, threaten the existing balance of social power distribution. Moreover, those reports, whether intentionally or not, misunderstand the meaning of “hackers”: “Hackers” are people who want to identify and solve problems directly and effectively, but “crackers” are those who cause problems for society.</p>However, it is not merely a problem of media’s misnomer. This research shows that apart from the media distortion of hacker identity, even the hackers with positive intentions still have real potential to become crackers. Therefore, the aim of this paper is to understand why the transition from “hackers” to “crackers” takes place by identifying crucial factors that influence hackers’ behaviors. Specifically, the inherent conflicts between cyberspace and the real world can turn hackers into crackers. Through the research, two major conflicts are identified: the conflict between freedom and responsibility and the conflict between individuality and authority. To support the arguments, the history of hacker culture and specific cases of hacking events are studied and discussed. The research also brings a crucial issue: how do we co-exist with information technology in a society that is increasingly computerized and digitalized? To face this problem, we need to comprehensively understand situations faced by human civilization in the information era. Hacker culture is, therefore, a practical perspective of studying social transformations in the development of technology.
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (October 2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.

Full text
Abstract:
Security systems are often the target of cyber-criminals and professional hackers, but often they fail in hiding all traces of the attack, thereby leaving critical evidence that could lead to identifying and arresting the criminal. However, hacking skills vary from one hacker to another depending on the hacker's personal traits, behavior, and intellectual tendencies. The aim of this study is to develop a proposed descriptive model of the behavioral patterns and motives of hackers based on programmable psychological theories, modeled using object-oriented programming models. The study proposes a descriptive model of an inverse algorithm that simulates Holland's Theory of Behavioral Patterns. Findings show that this descriptive model is applicable to be produced as a code map for the human resources of an investigative nature.
APA, Harvard, Vancouver, ISO, and other styles
8

Scariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (September 1, 2022): E716. http://dx.doi.org/10.24215/16696581e716.

Full text
Abstract:
El siguiente artículo está basado en el capítulo tres de mi tesina de grado La cultura hacker como filosofía de vida en la era del capitalismo cibernético. Una aproximación al caso en Mendoza. Aquí analizamos el potencial revolucionario de les hackers frente al actual sistema económico, político e informático que gobierna el mundo: el capitalismo cibernético (Tiqqun, 2016). Centrándonos en el aspecto político y filosófico de la cultura hacker. En efecto, buscamos responder a las siguientes preguntas: ¿Pueden los/as hackers constituirse en una clase política? ¿Por qué pensar a los/as hackers en términos revolucionarios? ¿Presentan efectivamente una actitud revolucionaria frente al capitalismo cibernético? ¿Cuáles son sus posibilidades para establecer una revolución? ¿Es correcto hablar de filosofía hacker?
APA, Harvard, Vancouver, ISO, and other styles
9

Bratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (October 2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Full text
Abstract:
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools from thousands of tools used by ethical and unethical hackers.We shall systematically review three major types of hackers that we can identify. It is not easy to draw a line between them. Three main hackers and minor hackers have been discussed in this paper. The three main hackers are black hat, grey hat and white hat hackers.We have adopted a systematic review of literature to discuss and analyse some of the common tools the black hat hackers have developed to hack into selected systems and commercial software and why they do it?
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hackers"

1

Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Obruch, Arseniy. "The hackers attacks and modern viruses." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barudy, G. Claudia, and A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno." Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.

Full text
Abstract:
Seminario Para Optar al Grado Académico de Licenciado en Comunicación Social
El autor no autoriza el acceso a texto completo de su documento
Nuestra época se ha visto marcada por un ascendente proceso de globalización en el área de las comunicaciones. La rápida ampliación de las posibilidades de acceso a la comunicación vía Internet se ha constituido en el principal agente de este proceso. Por esto, consideramos que es muy importante poner atención a las relaciones comunicacionales que esta red genera. El hacker se instala en este contexto, nace y se desarrolla dentro de Internet, dedicado a investigar sistemas, obtener, intervenir o borrar información circulante a través de esta red.
APA, Harvard, Vancouver, ISO, and other styles
5

Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.

Full text
Abstract:
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove targets with 27% of the total codings. From the results three themes were found: (1) most recommendations are such that implementing the strategies would serve to protect against opportunistic, low-skilled attacks; (2) most recommendations could be considered routine precautions, that when bundled, would secure most people against cyber-theft; and finally, (3) the Situational Crime Prevention framework was not fully realized because much of cyber-theft does not involve direct victim-perpetrator interactions. From these three themes policy recommendation and limitations are presented as well as avenues for future research.
APA, Harvard, Vancouver, ISO, and other styles
6

Lockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.

Full text
Abstract:
This dissertation uses a case study of 2600: The Hacker Quarterly to consider how the practices of a hacker public might be theorized as a rhetorical activity. The project is contextualized within a history of hacking (building from a narrative that centers on Levy's 1984 book Hackers) and within the arc of recent copyright legislation, specifically the Digital Millennium Copyright Act (DMCA) and the 2011-12 Stop Online Piracy Act (SOPA) debates. Within this framework, the dissertation examines how specific patterns and cases within 2600 might further our understanding of the rhetorical canons of memory and delivery and of dissent in digital spaces. Specifically, the project presents three practices of memory at work in 2600: Aggregating, Fingerprinting, and Narrating. Drawing on the work of Collin Gifford Brooke and Mary Carruthers, among others, the dissertation examines how texts printed in 2600 present memory not as an inert technology but rather as a practice and a pedagogy—a response to the increasing commercialization of technology. The dissertation then uses Jim Porter's techne of digital delivery to analyze three specific moments in 2600's history (the 1985 U.S. Government raid on New Jersey hackers, the E911 lawsuit, and the DeCSS narrative), illustrating how our spaces of textual production have become increasingly regulated and commercialized and considering how that regulation/commercialization affects our understanding of ownership, circulation, and the public sphere. Building on Michel de Cereteau's concept of strategies and tactics and Michael Warner's theory of (counter)publics, the dissertation ultimately argues that a history of hacker publics offers one way to reconceptualize and reintegrate theories and technologies of digital circulation into our scholarly work and curricular goals.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
7

Howlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.

Full text
Abstract:
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from government and private sources, government white papers, legal codes, blogs and microblogs, a wide array of materials from the darker corners of the online world, and many other materials. The work will begin to sketch for the reader some of the general and specific aspects of the shadowy world of cybercrime and hacker culture in China in recent years. One of the most prevalent beliefs is that the Chinese government is in fact the one responsible, whether directly or by sponsor, for cyber-attacks on foreign systems. My careful analysis has revealed is not always the case, or at least more complex than simply labeling the group as a state actor. At the root of these attacks is a social movement of "hacktivists," a patriotic sub-culture of Chinese hackers. It is incorrect to allege that all attacks are performed by state-sponsored individuals or groups, because there are many individuals and groups that are motivated by other factors.
APA, Harvard, Vancouver, ISO, and other styles
8

DELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.

Full text
Abstract:
Crack the code, share your data, have fun, save the world, be independent, become famous and make a lot of money. The remix between the Mertonian ethic of 20th century science and the hacker ethic is producing an emergent open science culture that is redefining the relation between researchers, scientific institutions and intellectual property is redefined. The case studies, analysed through extensive media analysis, interviews and participatory observation, include the open access turn of the American biologist Craig Venter, the rebellion of the Italian virologist Ilaria Capua against WHO data sharing policies and the emergence of citizen biology projects that explicitly refer to the hacking history. In these cases the problem of access to and sharing of the data emerge as a crucial public issue, and open science tools such as open databases, open access journals and open platforms for data sharing are used. Finally, they operate in different and often opposing institutional settings. These biologists can be a rich model for current transformations in both life sciences and informational capitalism. They use open access tools but also rebel against bureaucracy and claim independence from both academic and corporate institutions. Autonomy, independence and radical openness coexist with other elements such as a radical refusal of interference coming from both academic and corporate incumbents. They insist on bare information as good per se, as long as it is shared and accessible. They rebel against the mechanisms of scholarly publishing and peer review. In some cases they express an explicit drive towards profit and entrepreneurship. Their public images are part of a transformation that involves the proprietary structure of scientific information - who owns and disposes of biological data and knowledge? - and challenges the institutional environment in which biological research takes place. Open science means both open to more participation and cooperation and open to a more diverse set of modes of capitalist appropriation.
APA, Harvard, Vancouver, ISO, and other styles
9

Taylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing." Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.

Full text
Abstract:
The study is an examination of hacking, placing the act in the context of theories of technological change. Hacking is found to provide illustrative evidence within computing of theories which emphasise the societal shaping of technology over the notion of technological determination. The evolution of hacking is traced, showing how it reflects changing trends in the nature of information, the most vivid of which is the conceptualisation of information known as 'cyberspace'. Instead of simply cataloguing the impact of technical changes within computing and the effects they have had upon information, the study shows how technical change takes place in a process of negotiation and conflict between groups. The two main groups analysed are those of the Computer Underground (CU) and the Computer Security Industry (CSI). The experiences and views of both groups are recounted in what constitute internalist and externalist accounts, respectively, of hacking and its significance. The internalist account is the evidence provided by hackers themselves. It addresses such issues as what motivates the act of hacking; whether there is an identifiable hacking culture; and why it is almost an exclusively male activity. The externalist account contains the perceptions of hacking held by those outside the activity. The state of computing's security measures and its vulnerability to hacking is described, and evidence is provided of the extent to which hacking gives rise to technical knowledge that could be of potential use in the fixing of security weaknesses. The division within the CSI between those broadly cooperative with hackers and those largely hostile to them is described and the reasons why hacking knowledge is not generally utilised are explored. Hackers are prevented from gaining legitimacy within computing in a process referred to as 'closure', whereby they are stigmatised.
APA, Harvard, Vancouver, ISO, and other styles
10

Viroli, Edoardo <1991&gt. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.

Full text
Abstract:
L'informatica e la tecnologia ad essa correlata (dai computer ad Internet) ha cominciato a svilupparsi a partire dal periodo immediatamente successivo alla Seconda guerra mondiale, rivelandosi sia uno strumento utilizzabile a fin di bene sia una potente arma qualora fosse impiegata con intenti dannosi tanto per i singoli individui quanto per la sicurezza degli Stati. L'avvento di Internet e una sempre più facile accessibilità a computer e strumenti multimediali, infatti, ha permesso la nascita prima e l'evoluzione poi di una nuova serie di crimini e criminali in grado di trarre sempre maggior beneficio dal fenomeno conosciuto come “cibernetizzazione” globale. Bisogna altresì tenere in considerazione, come da obiettivo di questa tesi, che non soltanto i crimini nell'accezione più comune del termine hanno subito una variazione, ma anche le metodologie in cui le guerre e, in particolare, gli atti di terrorismo vengono condotte e perpetrate. Obiettivo di questa tesi sarà, quindi, esaminare gli aspetti storici legati all'evoluzione tecnologica (con particolare riguardo ad Internet, il cyberspazio e tutto ciò ad essi correllato), la nascita e l'evoluzione degli attori principali di questa nuova forma di guerra e/o terrorismo (gli hacker) e gli effetti che le loro azioni hanno sulle relazioni internazionali tra gli Stati.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Hackers"

1

Jack, Dann, and Dozois Gardner R, eds. Hackers. New York: Ace Books, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Films for the Humanities (Firm) and Canadian Broadcasting Corporation, eds. Hackers. Princeton, N.J: Films for the Humanities and Sciences, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bischoff, David. Hackers. New York: HarperCollins Pub., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Verton, Dan. The hacker diaries: Confessions of teenage hackers. New York: McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kennedy, Kathleen E. Medieval Hackers. Brooklyn, NY: punctum books, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goldstein, Emmanuel. Dear Hacker: Letters to the editor of 2600. Indianapolis, IN: Wiley Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Garavaglia, Dante. Milonga de hackers. Buenos Aires: Editorial La Colmena, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bischoff, David. Hackers: A novel. New York, N.Y: HarperPaperbacks, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lanton, Sandy. The happy hackers. Oxford: Heinemann Educ., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Paulsen, Gary. The time hackers. New York: Wendy Lamb Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Hackers"

1

Calcutt, Andrew. "Hackers/slackers." In White Noise, 56–61. London: Palgrave Macmillan UK, 1999. http://dx.doi.org/10.1057/9780230373686_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Butler, Michael, and Jacob G. Oakley. "Developing Hackers." In The Business of Hacking, 95–128. Berkeley, CA: Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0174-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Darling, Julie, and D. J. Cools. "[[Untitled]]." In Little Hackers, 2–33. New York: Routledge, 2024. http://dx.doi.org/10.4324/9781003501527-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Di Salvo, Philip. "Hackers and Whistleblowers." In The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs, 1–4. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-13895-0_80-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Oakley, Jacob G. "Why Human Hackers?" In Professional Red Teaming, 15–28. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4309-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Di Salvo, Philip. "Hackers and Whistleblowers." In The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs, 613–16. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-44556-0_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

D’Andrea, Vincenzo, Stefano De Paoli, and Maurizio Teli. "Open to Grok. How do Hackers’ Practices Produce Hackers?" In IFIP – The International Federation for Information Processing, 121–29. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09684-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 105–30. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Texts in Computer Science, 105–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 107–32. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hackers"

1

Vasconcelos, João Victor Alves. "Teste de Invasão: O segredo por trás de como funciona uma invasão hacker, a metodologia de invasão utilizada por hackers." In Conferência Connect Tech. Sociedade Brasileira de Computação, 2024. http://dx.doi.org/10.5753/connect.2024.238546.

Full text
Abstract:
Ataques cibernéticos ao passar dos anos tem se tornado muito mais comum, estima-se que ao dia 30 mil sites são vítimas de ataques cibernéticos por dia e a cada 39 segundos ocorre algum ataque na internet. Embora sabendo desses fatos ainda há uma enorme desinformação e mistério de como ocorrem estes ataques e também de que tipo de pessoas estão por trás destes ataques e seus motivos para eles, fazendo com que muitos mitos e preconceitos sejam criados ao redor da figura do hacker, fazendo muitos acreditarem que todos os hackers são criminosos ou que são capazes de feitos considerados fantasiosos. Através desta pesquisa, busca-se conscientizar o público geral da figura do hacker, mencionando técnicas, ferramentas e conhecimento teórico de como essas invasões são feitas, além de demonstrar a metodologia para invasão utilizada por todos os hackers, tanto cibercriminosos como hackers éticos. Este artigo tem como objeto educar o público leigo sobre o assunto, a fim de gerar uma maior compreensão sobre as etapas de uma invasão hacker.
APA, Harvard, Vancouver, ISO, and other styles
2

Yafi, Eiad, Katya Yefimova, and Karen E. Fisher. "Young Hackers." In CHI '18: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3170427.3174363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fang, Zhen, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing, Weifeng Li, and Hsinchun Chen. "Exploring key hackers and cybersecurity threats in Chinese hacker communities." In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). IEEE, 2016. http://dx.doi.org/10.1109/isi.2016.7745436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nyman, Linus. "Hackers on Forking." In OpenSym '14: The International Symposium on Open Collaboration. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2641580.2641590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Echenique, Federico, and Kevin He. "Screening p-Hackers." In EC '22: The 23rd ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3490486.3538358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Ramahi, Mohammad, Izzat Alsmadi, and Joshua Davenport. "Exploring hackers assets." In HotSoS '20: Hot Topics in the Science of Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3384217.3385619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Blocki, Jeremiah, Manuel Blum, and Anupam Datta. "GOTCHA password hackers!" In CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2517312.2517319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bellin, David. "Young Hackers (abstract)." In the 1986 ACM fourteenth annual conference. New York, New York, USA: ACM Press, 1986. http://dx.doi.org/10.1145/324634.325385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Behere, Sagar, and Martin Törngren. "Educating Embedded Systems Hackers." In the WESE'14: Workshop. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2829957.2829958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rechavi, Amit, Tamar Berenblum, David Maimon, and Ido Sivan Sevilla. "Hackers Topology Matter Geography." In ASONAM '15: Advances in Social Networks Analysis and Mining 2015. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808797.2808873.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hackers"

1

Vilbig, Kevin. Hack All The History! Hackers 1959 - 1991. Portland State University Library, June 2013. http://dx.doi.org/10.15760/honors.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eisen, Stefan, and Jr. Network Warfare. It's Not Just for Hackers Anymore. Fort Belvoir, VA: Defense Technical Information Center, June 1995. http://dx.doi.org/10.21236/ada297897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lohn, Andrew. Hacking AI: A Primer for Policymakers on Machine Learning Cybersecurity. Center for Security and Emerging Technology, December 2020. http://dx.doi.org/10.51593/2020ca006.

Full text
Abstract:
Machine learning systems’ vulnerabilities are pervasive. Hackers and adversaries can easily exploit them. As such, managing the risks is too large a task for the technology community to handle alone. In this primer, Andrew Lohn writes that policymakers must understand the threats well enough to assess the dangers that the United States, its military and intelligence services, and its civilians face when they use machine learning.
APA, Harvard, Vancouver, ISO, and other styles
4

Cary, Dakota. Academics, AI, and APTs. Center for Security and Emerging Technology, March 2021. http://dx.doi.org/10.51593/2020ca010.

Full text
Abstract:
Six Chinese universities have relationships with Advanced Persistent Threat (APT) hacking teams. Their activities range from recruitment to running cyber operations. These partnerships, themselves a case study in military-civil fusion, allow state-sponsored hackers to quickly move research from the lab to the field. This report examines these universities’ relationships with known APTs and analyzes the schools’ AI/ML research that may translate to future operational capabilities.
APA, Harvard, Vancouver, ISO, and other styles
5

Yilmaz, Ihsan, and Kenes Bulent. Digital Authoritarianism in Turkish Cyberspace: A Study of Deception and Disinformation by the AKP Regime’s AKtrolls and AKbots. Populism & Politics (P&P), November 2023. http://dx.doi.org/10.55271/pp0026.

Full text
Abstract:
This article explores the evolving landscape of digital authoritarianism in Turkish cyberspace, focusing on the deceptive strategies employed by the AKP regime through AKtrolls, AKbots and hackers. Initially employing censorship and content filtering, the government has progressively embraced sophisticated methods, including the weaponization of legislation and regulatory bodies to curtail online freedoms. In the third generation of information controls, a sovereign national cyber-zone marked by extensive surveillance practices has emerged. Targeted persecution of critical netizens, coupled with (dis)information campaigns, shapes the digital narrative. Central to this is the extensive use of internet bots, orchestrated campaigns, and AKtrolls for political manipulation, amplifying government propaganda and suppressing dissenting voices. As Turkey navigates a complex online landscape, the study contributes insights into the multifaceted tactics of Erdogan regime’s digital authoritarianism.
APA, Harvard, Vancouver, ISO, and other styles
6

Dukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021019.

Full text
Abstract:
Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features, and infrastructure services. Yet, the use of data comes with inherent challenges: accessibility, ownership, security, and privacy. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles examines some of the pressing questions on the minds of both industry and consumers. Who owns the data and how can it be used? What are the regulatory regimes that impact vehicular data use? Is the US close to harmonizing with other nations in the automotive data privacy? And will the risks of hackers lead to the “zombie car apocalypse” or to another avenue for ransomware? This report explores a number of these legal challenges and the unsettled aspects that arise in the world of automotive data
APA, Harvard, Vancouver, ISO, and other styles
7

Frith, R. A. Geology, Hackett River, District of Mackenzie, Northwest Territories. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/122787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Frith, R. A. Precambrian geology of the Hackett River area, District of Mackenzie, N.W.T. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/122463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Green, Crystal, Mariah Voutilainen, and Lauren Ziegler. Journeys in Family School Engagement. HundrED, December 2023. http://dx.doi.org/10.58261/zhac4043.

Full text
Abstract:
In early 2021, Parents as Allies (PAA) began a journey of collaborating with school teams in a design sprint process to develop creative and innovative solutions, or “hacks” that would address the specific needs of their communities. Their initial, two-month design sprint in 2021 centred around the question: “How might we build stronger engagement between families and schools for the benefit of all students?” Almost one year later, in April 2022, PAA began a second iteration. Parents as Allies 2.0 narrowed its focus to 22 Western Pennsylvania school districts. Joined by design sprint guides, the participating school districts’ Design Teams started with empathy interviews as the main source of inspiration to co-develop the hacks aimed at increasing and strengthening family-school engagement. Following human-centred design structure, the 22 districts participating in the initiative documented their learning journeys, from their practice mini-hacks, to fall and spring hacks and onto the new future of Family School Engagement (FSE) outlined in their sustainability plans.
APA, Harvard, Vancouver, ISO, and other styles
10

Meghan Bennett, Meghan Bennett. Hacked clocks tell us how an important pollinator keeps time in changing world. Experiment, October 2016. http://dx.doi.org/10.18258/8047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography