Dissertations / Theses on the topic 'Hacking network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 17 dissertations / theses for your research on the topic 'Hacking network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Schuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.
Full textAkkaya, Deniz, and Fabien Thalgott. "Honeypots in network security." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Full textMaloušek, Zdeněk. "Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217444.
Full textOlovson, Natali. "Hacking for the State? : The Use of Private Persons in Cyber Attacks and State Responsibility." Thesis, Försvarshögskolan, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10218.
Full textHaywood, Douglas. "The ethic of the code : values, networks and narrative among the civic hacking community." Thesis, Goldsmiths College (University of London), 2018. http://research.gold.ac.uk/23348/.
Full textMaggs, Catherine. "WikiLeaks and Communicative Counterpower." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/13511.
Full textDostál, Otto. "Právní aspekty boje proti počítačové trestné činnosti." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-433079.
Full textSilva, Luísa Carina Cabodeira Viana da. "Growth hacking e consumidores oportunistas: O impacto de rewards em programas de marketing referral." Master's thesis, 2020. http://hdl.handle.net/10362/94984.
Full textSoares, João Pedro dos Santos. "Implementation of a distributed intrusion detection and reaction system." Master's thesis, 2016. http://hdl.handle.net/10316/99196.
Full text"A Hacker-Centric Perspective to Empower Cyber Defense." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57382.
Full textGregor, Filip. "Ukradeno 77 milionů účtů služby PlayStation Network, týká se nás to?: analýza internetových diskuzí pod články týkajícími se tématu." Master's thesis, 2013. http://www.nusl.cz/ntk/nusl-321518.
Full textBhati, Bhawani Shanker. "Design of Privacy Protection Schemes for Mobile Adhoc Networks using Rough Set Theory." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5264.
Full textJansen, van Rensburg Shandre Kim. "The human in information security : an analysis of social engineering attacks in the greater Tshwane area of Gauteng, South Africa." Thesis, 2017. http://hdl.handle.net/10500/22646.
Full textMaat, Sandra Mariana. "Cyber crime: a comparative law analysis." Diss., 2004. http://hdl.handle.net/10500/2056.
Full textVan, Rensburg Kim Shandre Jansen. "The human element in information security : an analysis of social engineering attacks in the greater Tshwane area of Gauteng, South Africa." Thesis, 2017. http://hdl.handle.net/10500/22681.
Full textNjotini, Mzukisi Niven. "E-crimes and e-authentication - a legal perspective." Thesis, 2016. http://hdl.handle.net/10500/21720.
Full textPerlman, Leon Joseph. "Legal and regulatory aspects of mobile financial services." Thesis, 2012. http://hdl.handle.net/10500/13362.
Full text