Dissertations / Theses on the topic 'Hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.
Full textWilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Full textObruch, Arseniy. "The hackers attacks and modern viruses." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.
Full textBarudy, G. Claudia, and A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno." Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.
Full textChavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.
Full textLockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.
Full textHowlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.
Full textDELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.
Full textTaylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing." Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.
Full textViroli, Edoardo <1991>. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.
Full textHumbert, Jean-Philippe. "Les mondes de la cyberdélinquance et images sociales du pirate informatique." Thesis, Metz, 2007. http://www.theses.fr/2007METZ003L/document.
Full textFamiglietti, Andrew A. "Hackers, Cyborgs, and Wikipedians: The Political Economy and Cultural History of Wikipedia." Bowling Green State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1300717552.
Full textOswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.
Full textDalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.
Full textVignoli, Alessandro. "Identità, prestigio ed etica: analisi antropologica delle motivazioni e delle soddisfazioni degli Hackers." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1218/.
Full textArtore, Diane. "Honeynet design and implementation." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.
Full textImhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.
Full textMolony, Scott. "Finding Divinity in Fortran." Thesis, Boston College, 2011. http://hdl.handle.net/2345/1980.
Full textRota, Andrea. "Hacking the Web 2.0 : user agency and the role of hackers as computational mediators." Thesis, London School of Economics and Political Science (University of London), 2016. http://etheses.lse.ac.uk/3313/.
Full textLira, Isadora Teixeira de. "Hacktivismo e organizações midiáticas: hackeamento de narrativas em wikileaks e mídia ninja." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9789.
Full textHowell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.
Full textGuimarães, Nathalia Muylaert Locks. "A tese como obra de arte na era de sua reprodutibilidade tecnica /." Araraquara, 2016. http://hdl.handle.net/11449/146686.
Full textEmerson, William J. III. "Mechanics and The Essence of Technology." Bowling Green State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.
Full textFontoura, Marcelo Crispim da. "Hackers e participação: uma análise de aplicativos de dados públicos do Brasil e seus criadores." Pontifícia Universidade Católica do Rio Grande do Sul, 2014. http://hdl.handle.net/10923/5691.
Full textSummers, Timothy Corneal. "HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELSAND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427809862.
Full textAlmeida, Fernanda Albuquerque de. "Machinima: entre a narrativa e a experimentação." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/.
Full textBilan, Carolina, and Carl Hedberg. "Säkerhetshot och lösningar för privatpersoner med bredband." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.
Full textZufferey, Eric. "Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover." Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A001/document.
Full textTreguer, Félix. "Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle)." Thesis, Paris, EHESS, 2017. http://www.theses.fr/2017EHES0117/document.
Full textVillavicencio, Terreros Felipe A. "Cybercrimes." IUS ET VERITAS, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/123541.
Full textFontoura, Marcelo Crispim da. "Hackers e participa??o : uma an?lise de aplicativos de dados p?blicos do Brasil e seus criadores." Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2014. http://tede2.pucrs.br/tede2/handle/tede/4561.
Full textBachmann, Michael. "WHAT MAKES THEM CLICK? APPLYING THE RATIONAL CHOICE PERSPECTIVE TO THE HACKING UNDERGROUND." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2277.
Full textBach, Sirlei Lourdes. "Contribuição do hacker para o desenvolvimento tecnológico da informática." Florianópolis, SC, 2001. http://repositorio.ufsc.br/xmlui/handle/123456789/82176.
Full textLevine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.
Full textKelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.
Full textMenezes, Karina Moreira. "Pirâmide da pedagogia hacker =[vivências do (in) possível]." Faculdade de Educação, 2018. http://repositorio.ufba.br/ri/handle/ri/27168.
Full textAlbuquerque, Mônica Ramalho de. "Existe vida além do código binário? Os hackers e o redimensionamento de princípios modernos em práticas pós-modernas na sociedade informacional." Universidade Federal da Paraíba, 2009. http://tede.biblioteca.ufpb.br:8080/handle/tede/7266.
Full textGupta, Nirbhay. "Determining the effectiveness of deceptive honeynets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1303.
Full textPaulo, Luis Gonzaga de. "Um modelo complementar para aprimorar a segurança da informação no SDLC para dispositivos móveis: SDD - security driven development." Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1895.
Full textOgbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.
Full textDiGiusto, Dennis Michael. "A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /." ResearchArchive@Victoria e-Thesis, 2008. http://hdl.handle.net/10063/1148.
Full textBuys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.
Full textWithers, Kim. "A Psychosocial Behavioral Attribution Model: Examining the Relationship Between the “Dark Triad” and Cyber-Criminal Behaviors Impacting Social Networking Sites." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1072.
Full textKrutisch, Dorothee. "Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /." Frankfurt am Main [u.a.] : Lang, 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/376082763.pdf.
Full textGozukeles, Ibrahim Izlem. "Free And Open Source Software In Turkey." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607173/index.pdf.
Full textДумчиков, Михайло Олександрович, Михаил Александрович Думчиков, Mykhailo Oleksandrovych Dumchykov, Олена Сергіївна Бондаренко, Елена Сергеевна Бондаренко та Olena Serhiivna Bondarenko. "Сучасні аспекти кібербезпеки в контексті глобальних загроз". Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78666.
Full textWidyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication." Electronic Thesis or Diss., Paris 8, 2014. http://www.theses.fr/2014PA080003.
Full textWidyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication." Thesis, Paris 8, 2014. http://www.theses.fr/2014PA080003.
Full textBurtet, Cecilia Gerhardt. "Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/109016.
Full textSanches, Wilken David. "O movimento de software livre e a produção colaborativa do conhecimento." Pontifícia Universidade Católica de São Paulo, 2007. http://tede2.pucsp.br/handle/handle/2676.
Full text