Academic literature on the topic 'Hacking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hacking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hacking"

1

Mohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (March 10, 2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.

Full text
Abstract:
Hacking or unauthorised access is criminalised in many jurisdictions, including Malaysia, Singapore, the United Kingdom, Hong Kong, and a few other countries. Hacking is the act of gaining access through the computer system or network without proper authority or exceeding the original authority given to him. Many commentators and researchers have reported on the conceptual and legal aspects of hacking. However, hacking's theoretical, conceptual, and legal aspects have remained under-researched. Therefore, this paper's primary objective is to outline the various theories, which could inform the criminalisation of hacking. The theories of routine activities, deterrence theory, social learning and self-control, general strain theory, and deviant subcultures are deliberated in this paper alongside illustrations within the context of hacking. This paper will shed light on the body of literature and contribute to a better understanding of hacking criminalisation from various theories discussed in this paper. Future research should be directed to provide empirical evidence of applying the theory to hacking criminalisation.
APA, Harvard, Vancouver, ISO, and other styles
2

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Full text
Abstract:
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.
APA, Harvard, Vancouver, ISO, and other styles
3

Kindi, Vasso. "Taking a Look at History." Journal of the Philosophy of History 8, no. 1 (March 24, 2014): 96–117. http://dx.doi.org/10.1163/18722636-12341267.

Full text
Abstract:
AbstractIan Hacking urged that philosophers take a look at history. He called his recommendation the “Lockean imperative”. In the present paper I examine how Hacking understands the relation between philosophy and history by concentrating on his 1990 essay “Two kinds of ‘New Historicism’ for philosophers”. In this particular paper Hacking uses the visual metaphor of ‘taking a look’ which can also be found in the work of two other philosophers, Kuhn and Foucault, who are called by Hacking his mentors. I argue that in the work of these three philosophers, as well as in the work of Wittgenstein who has influenced both Hacking and Kuhn, one can find interest and attention to particulars which can be furnished by history, an approach which cultivates a sensibility for difference. I begin by presenting Hacking’s understanding of the relation of history to philosophy and then discuss what the Lockean imperative is. I concentrate on Locke’s understanding of history which differs considerably from the contemporary and end by focusing on the similarities in the work of the aforementioned thinkers.
APA, Harvard, Vancouver, ISO, and other styles
4

Verständig, Dan, and Janne Stricker. "Hacking Inequality." MedienPädagogik: Zeitschrift für Theorie und Praxis der Medienbildung 52 (February 16, 2023): 319–39. http://dx.doi.org/10.21240/mpaed/52/2023.02.16.x.

Full text
Abstract:
Der planvolle Umgang mit digitalen Technologien kann als eine zentrale Herausforderung in medien- und schulpädagogischen Handlungsfeldern gesehen werden. Dabei ist weitestgehend offen, welche Bedeutung Partizipation und Teilhabe im Hinblick auf den digitalen Wandel haben und wie sie sich konkret umsetzen lassen. Der Beitrag will ausgehend vom Begriff des Hackings eine Perspektive auf digitale Ungleichheit und mediale Praktiken entwickeln, bei der kreative Ansätze im Umgang mit digitalen Technologien im Vordergrund stehen. Hacking meint dabei die unkonventionelle Lösung von Problemen. Die These lautet, dass eine nachhaltige Gestaltung von formalen Lern- und Bildungssettings in der digitalen Welt vor allem dadurch erfolgen kann, dass Schule im Horizont der Digitalität neu erdacht und damit sprichwörtlich gehackt wird.
APA, Harvard, Vancouver, ISO, and other styles
5

Utomo, Galih Aryo. "ETHICAL HACKING." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 8–15. http://dx.doi.org/10.14421/csecurity.2019.2.1.1418.

Full text
Abstract:
Ethical Hacking is done by companies in anticipation of system security loopholes. Ethical hacking is done by someone who has the ability like a hacker who is able to attack a system but has the motivation to help companies find security gaps that companies will use to evaluate their systems. This paper explains the importance of information and why it must be maintained and how an ethical hacker does his work.
APA, Harvard, Vancouver, ISO, and other styles
6

Knox, Hannah. "Hacking anthropology." Journal of the Royal Anthropological Institute 27, S1 (March 15, 2021): 108–26. http://dx.doi.org/10.1111/1467-9655.13483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cohen, Matt. "Hacking Colonialism." PMLA/Publications of the Modern Language Association of America 135, no. 3 (May 2020): 559–64. http://dx.doi.org/10.1632/pmla.2020.135.3.559.

Full text
Abstract:
Listen: Dread, panic, and horror are the great teasers, and tragic wisdom is our best chance in a dangerous world.—Gerald Vizenor, Postindian ConversationsUntil that day . . .Until all are one . . .Continue the struggle . . .—Optimus Prime, in The Transformers: The Movie“American people are being pushed into new social forms because of the complex nature of modern communications and transportation, and the competing forms are neotribalism and neofeudalism,” the Standing Rock Sioux thinker Vine Deloria, Jr., wrote in 1970 (14). That insight was inspired in part by the work of Marshall McLuhan, which also led Deloria to suggest something even more provocative:Indian people are just as subject to the deluge of information as are other people. In the last decade most reservations have come within the reach of televisions and computers. In many ways Indian people are just as directed by the electric nature of our universe as any other group. But the tribal viewpoint simply absorbs what is reported to it and immediately integrates it into the experience of the group. . . . The more that happens, the better the tribe seems to function and the stronger it appears to get. Of all the groups in the modern world Indians are best able to cope with the modern situation.
APA, Harvard, Vancouver, ISO, and other styles
8

Farsole, Ajinkya A., Amruta G. Kashikar, and Apurva Zunzunwala. "Ethical Hacking." International Journal of Computer Applications 1, no. 10 (February 25, 2010): 14–20. http://dx.doi.org/10.5120/229-380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pratt, Mike. "Raptor Hacking." Wildlife Rehabilitation Bulletin 29, no. 1 (June 30, 2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.

Full text
Abstract:
In the raptor rehabilitation field, hacking is a special procedure for raising juvenile raptors that simulates natural fledging and allows young raptors—those that cannot yet fly and either are still restricted to or just leaving the nest—a gradual acclimation to independence. Hacking also is known as a ‘soft release.’ This paper focuses on hacking raptors and discusses advantages, disadvantages, hacking age, procedures, hack box design and construction, site selection, fledging age of raptor species, and hack release.
APA, Harvard, Vancouver, ISO, and other styles
10

Dustin Rubinstein, C., and Mariana F. Wolfner. "Reproductive hacking." Fly 8, no. 2 (March 27, 2014): 80–85. http://dx.doi.org/10.4161/fly.28396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hacking"

1

Peacock, Donna. "From underground hacking to ethical hacking." Thesis, Northumbria University, 2013. http://nrl.northumbria.ac.uk/32285/.

Full text
Abstract:
This Thesis explores the nature and practice of ‘Ethical Hacking’. Ethical Hackers are individuals who use hacking skills, knowledge and techniques within legitimate authorised practice; they are employed to Hack. A Critical Realist methodological approach is employed in order to gain a qualitative understanding of a real phenomenon through a range of key informants who provide personal narratives within semi-structured interviews, commenting upon their own realities, and their perceptions of the field in which they work. A Bounded Rational Model of decision making reveals that decisions relating to involvement in criminality and individual Hacking events are made through a process of reasoning, of approximating the net gains and losses of a particular course of action, and that these decisions are ‘bounded’ by social norms, ethical approaches and the personal motivations and social circumstances within which the decisions and behaviour are framed.
APA, Harvard, Vancouver, ISO, and other styles
2

Oswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Villegas, Manuela. "Business Hacking." Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/657608.

Full text
Abstract:
El business hacking como marco en la transformación empresarial tangible, medible y sontenible. La digitalización y las altas expectativas de los consumidores están cambiando radicalmente la forma en que interactuamos, y las organizaciones que saben cómo gestionarlo tendrán éxito. El marco de business hacking tiene como objetivo hacer que la transformación sea tangible y medible, haciendo que el cambio sea sostenible y encontrando nuevas formas de optimizar la cultura y el impacto empresarial. pasando por todo un modelo accionable de adquisiciòn y retenciòn basado en medios digitales
APA, Harvard, Vancouver, ISO, and other styles
4

Kelly, Liam Patrick. "Hacking Systems, Hacking Values: Interactive Theories For An Interactive World." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/36477.

Full text
Abstract:

Langdon Winner's article "Do Artifacts Have Politics?" (1986) has become a classic piece within Science and Technology Studies. While Winner was certainly not the first to consider the inherently political qualities of technology, his article has assumed the role of a touchstone for both supporters and critics of the idea that artifacts embody political and social relationships. In the chapters that follow, I shall try to answer Winner and his critics, by studying a particular technology that I believe to be capable of shedding some much-needed light on the issue. My aim is provide a restatement of Winner's question in the pages that follow, with the hope of getting past such problematic terms as "embodiment" and "encapsulation." My hope is to make the issue itself clearer, so that we can get to the heart of how technology, values, and human beings systematically interact.

I shall utilize in my discussion computer network scanning software. I shall first discuss the background to the question "Do Artifacts Have Politics?" and then describe some of the ethical and political forces alive in the computer security world. Next I shall closely examine two particular pieces of network scanning software and describe their interactions in terms of political and ethical motivations. Finally, I shall use this case study as a basis for a broader discussion of how values may be better conceived in terms of complex interactive systems of human beings and technologies.


Master of Science
APA, Harvard, Vancouver, ISO, and other styles
5

Zapico, Lamela Jorge Luis. "Hacking for Sustainability." Doctoral thesis, KTH, Medieteknik och interaktionsdesign, MID, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137215.

Full text
Abstract:
ICT for Sustainability is a growing research area looking at the potential of information and communication technologies for contributing to sustainability. The existing work in this area can be grouped in four main categories: The optimization of existing systems using ICT, the dematerialization of cultural assets and presence, the use of technology for behavioral change, and the support of sustainability practice and research. Within this research area, this thesis focuses on exploring how new technologies and approaches of working with data, such as APIs, mashups, crowdsourcing, open data, and dynamic visualizations, can be applied to sustainability and sustainability practice. This thesis follows a research through design method, where applications, prototypes, and events were created and released following an iterative design process. Five different design artifacts or “hacks” are presented and analyzed together as a portfolio. This collection of artifacts is a practical exploration of the research questions and it embodies the results. Based on the created artifacts, this text argues that the new technologies and paradigms coming from ICT can transform how sustainability work is performed, by changing the way that sustainability data is created, shared and visualized. This new “data-driven” approach is characterized by a bottom-up way of data gathering, automatic data collection and crowdsourcing, a real time orientation, a focus on transparency and openness, dynamic and interactive visualizations, and new approaches to innovation. These characteristics create new opportunities for making sustainability practice more effective and broaden its impact, but they also create new problems and increase existing risks. Finally it is argued that while information and communication technologies are usually treated as tools, these innovations in ICT for Sustainability are not only technological, but also cultural. The hacker ethic values connected with computer technologies, such as an open way of sharing knowledge, the focus on creativity as a driving force, and a hands-on approach, are key for understanding this research area and an important part of the contribution from ICT to sustainability.

QC 20131213

APA, Harvard, Vancouver, ISO, and other styles
6

Flores, Solís Fernando Rolyn. "Ethical hacking - RC19 201801." Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/623917.

Full text
Abstract:
El presente es un curso de especialidad de la carrera Ingeniería de Redes y Comunicaciones EPE, de carácter teórico, dirigido a los estudiantes del nivel 12 de la carrera, que busca desarrollar la competencia general de pensamiento critico nivel 3 y la competencia específica B - Capacidad para diseñar y realizar experimentos y analizar e interpretar los datos en Ingeniería de Redes y Comunicaciones - nivel 3. Este curso permitirá al alumno conocer los principales vectores de ataque que se despliegan sobre los sistemas a nivel mundial, permitiéndole reconocer las vulnerabilidades, como se explotan las debilidades en los sistemas y ayudarle a proteger los activos de las amenazas.
APA, Harvard, Vancouver, ISO, and other styles
7

Gabrielsson, Jonas. "Hacking your drone data." Thesis, Malmö universitet, Malmö högskola, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-41403.

Full text
Abstract:
The last couple of years has seen a rapid growth in smart devices. The smart devices are exponentially gaining more popularity both as a complement to our daily lives in the form of IoT products aiding in our everyday tasks and as a way we communicate and work. An estimation of 75.44 billion devices will be connected to the internet by 2025. With the rapid development and normalization of IoT devices, questions regarding privacy has never been more important. This thesis focuses on privacy in relation to one of the most emerging technologies, drones.  Drones have been discussed frequently in both governmental and commercial sectors for its inevitable normalization in the airspace. Previously privacy and drones has been researched and discussed from the point of view of which drones are used to infringe on people’s privacy. This thesis explores privacy from another point of view, the view of the drone owner. By exploring privacy from the drone users’ point of view, this thesis shows the importance of better privacy measurements by proposing a conceptual model to existing popular privacy definitions. To investigate privacy in this context, a case has been conducted which proved and validated what kind of data is at risk of being hijacked. The thesis provides a conceptual model that aims to help commercial drone owners to analyze how privacy infringements can occur, why they could occur and how to account for them in the future. Furthermore, the thesis highlights the vulnerability that WIFI dependent devices poses with DDoS attacks. The findings of this thesis show that an infringement of privacy regarding commercial drones requires more clear privacy regulations and definitions, as well as highlighting privacy vulnerabilities in commercial drones.
APA, Harvard, Vancouver, ISO, and other styles
8

Höglund, Gran Tommie, and Erik Mickols. "Hacking a Commercial Drone." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573.

Full text
Abstract:
Obemannade luftfarkoster, även kallade drönare, är del av IoT-revolutionen och har uppmärksammats de senaste åren på grund av integritetsfrågor såväl som flygplats- och militär säkerhet. Då de kan flyga samt har implementerat en ökande mängd teknologi, särskilt kamera och annan övervakning, är de attraktiva måltavlor för hackers och penetrationstestare. Ett antal attacker har genomförts i närtid. I detta examensarbete utforskas och attackeras drönaren Parrot ANAFI genom att använda hotmodellering ur ett black box-perspektiv. Hotmodelleringen inkluderar hotidentifiering med STRIDE samt riskvärdering med DREAD. Inga stora svagheter i systemet hittades. Rapporten visar att tillverkaren har en stor säkerhetsmedvetenhet. Exempel på denna medvetenhet är att tidigare rapporterade svagheter har åtgärdats och programkoden har förvrängts. Metoderna och de funna resultaten kan användas för att vidare utforska svagheter i drönare och liknande IoT-enheter.
Unmanned aerial vehicles, commonly known as drones, are part of the IoT revolution and have gotten some attention in recent years due to privacy violation issues as well as airport and military security. Since they can fly and have an increasing amount of technology implemented, especially camera and other surveillance, they are attractive targets for hackers and penetration testers. A number of attacks have been carried out over the years. In this thesis the Parrot ANAFI drone is explored and attacked using threat modeling from a black box perspective. The threat modeling includes identifying threats with STRIDE and assessing risks with DREAD. Major vulnerabilities in the system were not found. This report shows that the manufacturer has a high security awareness. Examples of this awareness are that previously reported vulnerabilities have been mitigated and firmware code has been obfuscated. The methods used and results found could be used to further explore vulnerabilities in drones and similar IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
9

Carlsson, Simon, and Max Näf. "Internet of Things Hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239366.

Full text
Abstract:
As the Internet of Things is gaining more traction in the market, people are becoming more comfortable with having their daily equipment connected to the internet, fewer are taking the security aspect seriously. By attempting an attack on the Telia Sense, an IoT device connected to a car, it is shown how an attacker could try to compromise this type of system and how developers and engineers in the field can test their devices. Information from the device was obtained, including debug information and program code. Telia Sense was found to be a well secured device with a lot of thought and consideration given towards cyber security, therefore a successful attack was not able to be performed. However, the methods and procedures described in this paper are still valid and does aid in securing a device.
APA, Harvard, Vancouver, ISO, and other styles
10

Lindeberg, Axel. "Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302999.

Full text
Abstract:
The number of IoT systems in our homes has exploded in recent years. By 2025 it is expected that the number of IoT devices will reach 38 billion. Home alarm systems are an IoT product that has increased dramatically in number and complexity in recent years. Besides triggering an alarm when an intruder tries to break in, a modern system can now control your light bulbs, lock and unlock your front door remotely, and interact with your smart speaker. They are undeniably effective in deterring physical intrusion. However, given the recent rise in complexity how well do they hold up against cyber attacks? In this thesis, a smart home alarm system from SecuritasHome is examined. A comprehensive security analysis was performed using penetration testing techniques and threat modeling. The work focused mainly on radio frequency (RF) hacking against the systems RF communication. Among other things, a critical vulnerability was found in the proprietary RF protocol, allowing an attacker to disarm an armed system and thus completely bypass the system’s functionality. The security of the system was deemed to be lacking.
Antalet IoT system i våra hem har exploderat de senaste åren. Vid år 2025 förväntas antalet IoT enheter nå 38 miljarder. Hemlarmsystem är en typ av IoT-produkt som ökat dramatiskt i komplexitet på senare tid. Förutom att framkalla ett larm vid ett intrång kan ett modernt hemlamsystem numera kontrollera dina glödlampor, låsa och låsa upp din ytterdörr, samt kontrollera dina övervakningskameror. De är utan tvekan effektiva på att förhindra fysiska intrång, men hur väl står de emot cyberattacker? I denna uppsats undersöks ett hemlarmsystem från SecuritasHome. En utförlig säkerhetsanalys gjordes av systemet med penetrationstestnings-metodiker och hotmodellering. Arbetet fokuserade mestadels på radiovågshackning (RF) mot systemets RF-kommunikation. Bland annat hittades en kritiskt sårbarhet i systemets RF-protokoll som gör det möjligt för en angripare att avlarma ett larmat system, och därmed kringå hela systemets funktionalitet. Säkerheten av systemet bedömdes vara bristfällig.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Hacking"

1

Covaleski, John. Hacking. San Diego, CA: ReferencePoint Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Manan. Facebook Hacking (Hacking & Security): An ethicak guide to facebook hacking & security. Worldwide: Manan Shah, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hammersley, Ben. Hacking GMail. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kingsley-Hughes, Kathie. Hacking GPS. New York: John Wiley & Sons, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ziegler, Manuel. Web Hacking. München: Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gomez-Urbina, Alexandre. Hacking interdit. 4th ed. Paris: Micro Application, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alberts, Gerard, and Ruth Oldenziel, eds. Hacking Europe. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-5493-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Düllo, Thomas, and Franz Liebl, eds. Cultural Hacking. Vienna: Springer Vienna, 2005. http://dx.doi.org/10.1007/3-211-37777-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Putrino, David. Hacking Health. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71619-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bachmann, Glenn. Hacking BlackBerry. Indianapolis, IN: Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Hacking"

1

Gregory, Mark A., and David Glance. "Hacking." In Security and the Networked Society, 3–49. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-02390-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liedtke, Thomas. "Hacking." In Informationssicherheit, 147–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-63917-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Stephen. "Hacking Code." In Programming with 64-Bit ARM Assembly Language, 347–66. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5881-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rahalkar, Sagar Ajay. "Wireless Hacking." In Certified Ethical Hacker (CEH) Foundation Guide, 143–51. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rahalkar, Sagar Ajay. "Hacking Basics." In Certified Ethical Hacker (CEH) Foundation Guide, 119–29. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sinha, Sanjib. "Hacking Environment." In Beginning Ethical Hacking with Python, 5–8. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Haber, Morey J., and Brad Hibbert. "Password Hacking." In Privileged Attack Vectors, 39–48. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stotz, Nils. "Growth Hacking." In Experimentelle Produktentwicklung, 121–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-65467-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hinkis, Tali, Kyle Lapidus, and Jon Satrom. "Video Hacking." In Handmade Electronic Music, 236–45. Third edition. | New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429264818-26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Briz, Nick. "Data Hacking." In Handmade Electronic Music, 377–89. Third edition. | New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429264818-40.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hacking"

1

Bittau, Andrea, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh. "Hacking Blind." In 2014 IEEE Symposium on Security and Privacy (SP). IEEE, 2014. http://dx.doi.org/10.1109/sp.2014.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cranor, David, and Philippa Mothersill. "Prototype hacking." In Procedings of the Second Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2079216.2079271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hou, Youyang, and Cliff Lampe. "Sustainable Hacking." In C&T '17: Communities and Technologies 2017. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3083671.3083706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Calderon, Roberto, Sidney Fels, Junia Anacleto, Nemanja Memarovic, and W. Travis Thompson. "Hacking HCI3P." In the 2014 companion publication. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2598784.2598797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stockman, Mark. "Insider hacking." In the 3rd annual conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2656434.2656436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Taylor, Nick, and Loraine Clarke. "Everybody's Hacking." In CHI '18: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3173574.3173746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schneider, Fred B. "Beyond hacking." In the 32nd ACM/IEEE International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1806799.1806802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Black, Emily, Talia Gillis, and Zara Yasmine Hall. "D-hacking." In FAccT '24: The 2024 ACM Conference on Fairness, Accountability, and Transparency. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3630106.3658928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baker, Camille N., and Kate Sicchio. "Hacking the Body." In Electronic Visualisation and the Arts (EVA 2013). BCS Learning & Development, 2013. http://dx.doi.org/10.14236/ewic/eva2013.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guerreiro, João, Hernisa Kacorri, Jeffrey P. Bigham, Edward Cutrell, Daisuke Sato, Dragan Ahmetovic, and Chieko Asakawa. "Hacking Blind Navigation." In CHI '19: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3290607.3299015.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hacking"

1

David, Patty, and Colette Thayer. Hacking Life Shifts. Washington, DC: AARP Research, July 2020. http://dx.doi.org/10.26419/res.00391.000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

David, Patty, and Colette Thayer. Hacking Life Shifts: Methodology. Washington, DC: AARP Research, July 2020. http://dx.doi.org/10.26419/res.00391.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Beltrán, Héctor. Hacking, Computing Expertise, and Difference. Just Tech, Social Science Research Council, March 2022. http://dx.doi.org/10.35650/jt.3029.d.2022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brodeur, Abel, Scott Carrell, David Figlio, and Lester Lusher. Unpacking P-Hacking and Publication Bias. Cambridge, MA: National Bureau of Economic Research, August 2023. http://dx.doi.org/10.3386/w31548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hooker, Reece, ed. Australian law enables state-authorised hacking and surveillance. Monash University, December 2021. http://dx.doi.org/10.54377/2654-ec85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cary, Dakota. Robot Hacking Games: China’s Competitions to Automate the Software Vulnerability Lifecycle. Center for Security and Emerging Technology, September 2021. http://dx.doi.org/10.51593/2021ca005.

Full text
Abstract:
Software vulnerability discovery, patching, and exploitation—collectively known as the vulnerability lifecycle—is time consuming and labor intensive. Automating the process could significantly improve software security and offensive hacking. The Defense Advanced Research Projects Agency’s Cyber Grand Challenge supported teams of researchers from 2014 to 2016 that worked to create these tools. China took notice. In 2017, China hosted its first Robot Hacking Game, seeking to automate the software vulnerability lifecycle. Since then, China has hosted seven such competitions and the People’s Liberation Army has increased its role in hosting the games.
APA, Harvard, Vancouver, ISO, and other styles
7

Bryant, Alison, Patty David, and Colette Thayer. Hacking Longevity: Understanding the Implications of Living to 100. AARP Research, April 2018. http://dx.doi.org/10.26419/res.00224.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bryant, Alison, Patty David, and Colette Thayer. Hacking Longevity: Understanding the Implications of Living to 100: Infographic. AARP Research, April 2018. http://dx.doi.org/10.26419/res.00224.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lohn, Andrew. Hacking AI: A Primer for Policymakers on Machine Learning Cybersecurity. Center for Security and Emerging Technology, December 2020. http://dx.doi.org/10.51593/2020ca006.

Full text
Abstract:
Machine learning systems’ vulnerabilities are pervasive. Hackers and adversaries can easily exploit them. As such, managing the risks is too large a task for the technology community to handle alone. In this primer, Andrew Lohn writes that policymakers must understand the threats well enough to assess the dangers that the United States, its military and intelligence services, and its civilians face when they use machine learning.
APA, Harvard, Vancouver, ISO, and other styles
10

Schäfer, Christine, David Bosshart, and Christopher Muller. European Food Trend Report – Hacking Food: Die Neuerfindung des Essens. Gdi-verlag, Gottlieb Duttweiler Institute, September 2019. http://dx.doi.org/10.59986/utrc3832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography