Academic literature on the topic 'Hacking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hacking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hacking"
Mohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (March 10, 2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.
Full textCekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Full textKindi, Vasso. "Taking a Look at History." Journal of the Philosophy of History 8, no. 1 (March 24, 2014): 96–117. http://dx.doi.org/10.1163/18722636-12341267.
Full textVerständig, Dan, and Janne Stricker. "Hacking Inequality." MedienPädagogik: Zeitschrift für Theorie und Praxis der Medienbildung 52 (February 16, 2023): 319–39. http://dx.doi.org/10.21240/mpaed/52/2023.02.16.x.
Full textUtomo, Galih Aryo. "ETHICAL HACKING." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 8–15. http://dx.doi.org/10.14421/csecurity.2019.2.1.1418.
Full textKnox, Hannah. "Hacking anthropology." Journal of the Royal Anthropological Institute 27, S1 (March 15, 2021): 108–26. http://dx.doi.org/10.1111/1467-9655.13483.
Full textCohen, Matt. "Hacking Colonialism." PMLA/Publications of the Modern Language Association of America 135, no. 3 (May 2020): 559–64. http://dx.doi.org/10.1632/pmla.2020.135.3.559.
Full textFarsole, Ajinkya A., Amruta G. Kashikar, and Apurva Zunzunwala. "Ethical Hacking." International Journal of Computer Applications 1, no. 10 (February 25, 2010): 14–20. http://dx.doi.org/10.5120/229-380.
Full textPratt, Mike. "Raptor Hacking." Wildlife Rehabilitation Bulletin 29, no. 1 (June 30, 2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.
Full textDustin Rubinstein, C., and Mariana F. Wolfner. "Reproductive hacking." Fly 8, no. 2 (March 27, 2014): 80–85. http://dx.doi.org/10.4161/fly.28396.
Full textDissertations / Theses on the topic "Hacking"
Peacock, Donna. "From underground hacking to ethical hacking." Thesis, Northumbria University, 2013. http://nrl.northumbria.ac.uk/32285/.
Full textOswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.
Full textVillegas, Manuela. "Business Hacking." Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/657608.
Full textKelly, Liam Patrick. "Hacking Systems, Hacking Values: Interactive Theories For An Interactive World." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/36477.
Full textLangdon Winner's article "Do Artifacts Have Politics?" (1986) has become a classic piece within Science and Technology Studies. While Winner was certainly not the first to consider the inherently political qualities of technology, his article has assumed the role of a touchstone for both supporters and critics of the idea that artifacts embody political and social relationships. In the chapters that follow, I shall try to answer Winner and his critics, by studying a particular technology that I believe to be capable of shedding some much-needed light on the issue. My aim is provide a restatement of Winner's question in the pages that follow, with the hope of getting past such problematic terms as "embodiment" and "encapsulation." My hope is to make the issue itself clearer, so that we can get to the heart of how technology, values, and human beings systematically interact.
I shall utilize in my discussion computer network scanning software. I shall first discuss the background to the question "Do Artifacts Have Politics?" and then describe some of the ethical and political forces alive in the computer security world. Next I shall closely examine two particular pieces of network scanning software and describe their interactions in terms of political and ethical motivations. Finally, I shall use this case study as a basis for a broader discussion of how values may be better conceived in terms of complex interactive systems of human beings and technologies.
Master of Science
Zapico, Lamela Jorge Luis. "Hacking for Sustainability." Doctoral thesis, KTH, Medieteknik och interaktionsdesign, MID, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137215.
Full textQC 20131213
Flores, Solís Fernando Rolyn. "Ethical hacking - RC19 201801." Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/623917.
Full textGabrielsson, Jonas. "Hacking your drone data." Thesis, Malmö universitet, Malmö högskola, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-41403.
Full textHöglund, Gran Tommie, and Erik Mickols. "Hacking a Commercial Drone." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573.
Full textUnmanned aerial vehicles, commonly known as drones, are part of the IoT revolution and have gotten some attention in recent years due to privacy violation issues as well as airport and military security. Since they can fly and have an increasing amount of technology implemented, especially camera and other surveillance, they are attractive targets for hackers and penetration testers. A number of attacks have been carried out over the years. In this thesis the Parrot ANAFI drone is explored and attacked using threat modeling from a black box perspective. The threat modeling includes identifying threats with STRIDE and assessing risks with DREAD. Major vulnerabilities in the system were not found. This report shows that the manufacturer has a high security awareness. Examples of this awareness are that previously reported vulnerabilities have been mitigated and firmware code has been obfuscated. The methods used and results found could be used to further explore vulnerabilities in drones and similar IoT devices.
Carlsson, Simon, and Max Näf. "Internet of Things Hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239366.
Full textLindeberg, Axel. "Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302999.
Full textAntalet IoT system i våra hem har exploderat de senaste åren. Vid år 2025 förväntas antalet IoT enheter nå 38 miljarder. Hemlarmsystem är en typ av IoT-produkt som ökat dramatiskt i komplexitet på senare tid. Förutom att framkalla ett larm vid ett intrång kan ett modernt hemlamsystem numera kontrollera dina glödlampor, låsa och låsa upp din ytterdörr, samt kontrollera dina övervakningskameror. De är utan tvekan effektiva på att förhindra fysiska intrång, men hur väl står de emot cyberattacker? I denna uppsats undersöks ett hemlarmsystem från SecuritasHome. En utförlig säkerhetsanalys gjordes av systemet med penetrationstestnings-metodiker och hotmodellering. Arbetet fokuserade mestadels på radiovågshackning (RF) mot systemets RF-kommunikation. Bland annat hittades en kritiskt sårbarhet i systemets RF-protokoll som gör det möjligt för en angripare att avlarma ett larmat system, och därmed kringå hela systemets funktionalitet. Säkerheten av systemet bedömdes vara bristfällig.
Books on the topic "Hacking"
Shah, Manan. Facebook Hacking (Hacking & Security): An ethicak guide to facebook hacking & security. Worldwide: Manan Shah, 2016.
Find full textZiegler, Manuel. Web Hacking. München: Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441125.
Full textAlberts, Gerard, and Ruth Oldenziel, eds. Hacking Europe. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-5493-8.
Full textDüllo, Thomas, and Franz Liebl, eds. Cultural Hacking. Vienna: Springer Vienna, 2005. http://dx.doi.org/10.1007/3-211-37777-8.
Full textPutrino, David. Hacking Health. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71619-0.
Full textBook chapters on the topic "Hacking"
Gregory, Mark A., and David Glance. "Hacking." In Security and the Networked Society, 3–49. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-02390-8_2.
Full textLiedtke, Thomas. "Hacking." In Informationssicherheit, 147–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-63917-7_6.
Full textSmith, Stephen. "Hacking Code." In Programming with 64-Bit ARM Assembly Language, 347–66. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5881-1_16.
Full textRahalkar, Sagar Ajay. "Wireless Hacking." In Certified Ethical Hacker (CEH) Foundation Guide, 143–51. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_11.
Full textRahalkar, Sagar Ajay. "Hacking Basics." In Certified Ethical Hacker (CEH) Foundation Guide, 119–29. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_9.
Full textSinha, Sanjib. "Hacking Environment." In Beginning Ethical Hacking with Python, 5–8. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_2.
Full textHaber, Morey J., and Brad Hibbert. "Password Hacking." In Privileged Attack Vectors, 39–48. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_3.
Full textStotz, Nils. "Growth Hacking." In Experimentelle Produktentwicklung, 121–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-65467-5_11.
Full textHinkis, Tali, Kyle Lapidus, and Jon Satrom. "Video Hacking." In Handmade Electronic Music, 236–45. Third edition. | New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429264818-26.
Full textBriz, Nick. "Data Hacking." In Handmade Electronic Music, 377–89. Third edition. | New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429264818-40.
Full textConference papers on the topic "Hacking"
Bittau, Andrea, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh. "Hacking Blind." In 2014 IEEE Symposium on Security and Privacy (SP). IEEE, 2014. http://dx.doi.org/10.1109/sp.2014.22.
Full textCranor, David, and Philippa Mothersill. "Prototype hacking." In Procedings of the Second Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2079216.2079271.
Full textHou, Youyang, and Cliff Lampe. "Sustainable Hacking." In C&T '17: Communities and Technologies 2017. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3083671.3083706.
Full textCalderon, Roberto, Sidney Fels, Junia Anacleto, Nemanja Memarovic, and W. Travis Thompson. "Hacking HCI3P." In the 2014 companion publication. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2598784.2598797.
Full textStockman, Mark. "Insider hacking." In the 3rd annual conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2656434.2656436.
Full textTaylor, Nick, and Loraine Clarke. "Everybody's Hacking." In CHI '18: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3173574.3173746.
Full textSchneider, Fred B. "Beyond hacking." In the 32nd ACM/IEEE International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1806799.1806802.
Full textBlack, Emily, Talia Gillis, and Zara Yasmine Hall. "D-hacking." In FAccT '24: The 2024 ACM Conference on Fairness, Accountability, and Transparency. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3630106.3658928.
Full textBaker, Camille N., and Kate Sicchio. "Hacking the Body." In Electronic Visualisation and the Arts (EVA 2013). BCS Learning & Development, 2013. http://dx.doi.org/10.14236/ewic/eva2013.60.
Full textGuerreiro, João, Hernisa Kacorri, Jeffrey P. Bigham, Edward Cutrell, Daisuke Sato, Dragan Ahmetovic, and Chieko Asakawa. "Hacking Blind Navigation." In CHI '19: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3290607.3299015.
Full textReports on the topic "Hacking"
David, Patty, and Colette Thayer. Hacking Life Shifts. Washington, DC: AARP Research, July 2020. http://dx.doi.org/10.26419/res.00391.000.
Full textDavid, Patty, and Colette Thayer. Hacking Life Shifts: Methodology. Washington, DC: AARP Research, July 2020. http://dx.doi.org/10.26419/res.00391.006.
Full textBeltrán, Héctor. Hacking, Computing Expertise, and Difference. Just Tech, Social Science Research Council, March 2022. http://dx.doi.org/10.35650/jt.3029.d.2022.
Full textBrodeur, Abel, Scott Carrell, David Figlio, and Lester Lusher. Unpacking P-Hacking and Publication Bias. Cambridge, MA: National Bureau of Economic Research, August 2023. http://dx.doi.org/10.3386/w31548.
Full textHooker, Reece, ed. Australian law enables state-authorised hacking and surveillance. Monash University, December 2021. http://dx.doi.org/10.54377/2654-ec85.
Full textCary, Dakota. Robot Hacking Games: China’s Competitions to Automate the Software Vulnerability Lifecycle. Center for Security and Emerging Technology, September 2021. http://dx.doi.org/10.51593/2021ca005.
Full textBryant, Alison, Patty David, and Colette Thayer. Hacking Longevity: Understanding the Implications of Living to 100. AARP Research, April 2018. http://dx.doi.org/10.26419/res.00224.001.
Full textBryant, Alison, Patty David, and Colette Thayer. Hacking Longevity: Understanding the Implications of Living to 100: Infographic. AARP Research, April 2018. http://dx.doi.org/10.26419/res.00224.002.
Full textLohn, Andrew. Hacking AI: A Primer for Policymakers on Machine Learning Cybersecurity. Center for Security and Emerging Technology, December 2020. http://dx.doi.org/10.51593/2020ca006.
Full textSchäfer, Christine, David Bosshart, and Christopher Muller. European Food Trend Report – Hacking Food: Die Neuerfindung des Essens. Gdi-verlag, Gottlieb Duttweiler Institute, September 2019. http://dx.doi.org/10.59986/utrc3832.
Full text