To see the other types of publications on this topic, follow the link: Human hacking.

Books on the topic 'Human hacking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 books for your research on the topic 'Human hacking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Social engineering: The art of human hacking. Wiley, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hacking the human: Social engineering techniques and security countermeasures. Ashgate, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mann, Ian. Hacking the Human. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Social Engineering: The science of human hacking. 2nd ed. Wiley, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Social Engineering: The Science of Human Hacking. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dunbar-Hester, Christina. Hacking Diversity. Princeton University Press, 2019. http://dx.doi.org/10.23943/princeton/9780691192888.001.0001.

Full text
Abstract:
Hacking, as a mode of technical and cultural production, is commonly celebrated for its extraordinary freedoms of creation and circulation. Yet surprisingly few women participate in it: rates of involvement by technologically skilled women are drastically lower in hacking communities than in industry and academia. This book investigates the activists engaged in free and open-source software to understand why, despite their efforts, they fail to achieve the diversity that their ideals support. The book shows that within this well-meaning volunteer world, beyond the sway of human resource departments and equal opportunity legislation, members of underrepresented groups face unique challenges. The book explores who participates in voluntaristic technology cultures, to what ends, and with what consequences. Digging deep into the fundamental assumptions underpinning STEM-oriented societies, the book demonstrates that while the preferred solutions of tech enthusiasts—their “hacks” of projects and cultures—can ameliorate some of the “bugs” within their own communities, these methods come up short for issues of unequal social and economic power. Distributing “diversity” in technical production is not equal to generating justice. The book reframes questions of diversity advocacy to consider what interventions might appropriately broaden inclusion and participation in the hacking world and beyond.
APA, Harvard, Vancouver, ISO, and other styles
7

Hacking Darwin: Genetic Engineering and the Future of Humanity. Sourcebooks, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Metzl, Jamie, and Eric Jason Martin. Hacking Darwin: Genetic Engineering and the Future of Humanity. HighBridge Audio, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hacking Darwin: Genetic Engineering and the Future of Humanity. Sourcebooks, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ozkaya, Dr Erdal. Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert. Packt Publishing, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hadnagy, Christopher, and Seth Schulman. Human Hacking: Win Friends, Influence People, and Leave Them Better off for Having Met You. HarperCollins Publishers, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hadnagy, Christopher, and Seth Schulman. Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. Harpercollins, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Human Hacking: Win Friends, Influence People, and Leave Them Better off for Having Met You. HarperCollins Publishers, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Matloff, Judith. How to Drag a Body and Other Safety Tips You Hope to Never Need: Survival Tricks for Hacking, Hurricanes, and Hazards Life Might Throw at You. HarperCollins B and Blackstone Publishing, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Matloff, Judith. How to Drag a Body and Other Safety Tips You Hope to Never Need: Survival Tricks for Hacking, Hurricanes, and Hazards Life Might Throw at You. Harper Wave, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Anderson, James A. The Near Future. Oxford University Press, 2018. http://dx.doi.org/10.1093/acprof:oso/9780199357789.003.0018.

Full text
Abstract:
Digital computing has transformed our civilization. Eventually, both computer professionals and regular users will interact with a computer as they would with another human of equivalent or greater intelligence but with a better grasp of fine detail. However, computer pathologies will increase with increasing power and ubiquity. Unintended consequences will occur from the intrinsic unreliability of hugely complex systems. The most sinister danger in the near future of computing is from humans: malware, hacking, theft, attacks. Modern lessons can be learned from the past history of computer attacks, such as the decoding of the Enigma codes during World War II. Individual greed leads to crime, but much worse results follow when major states become involved in computer-based crimes, as they are now starting to do. Optimistic futures of computing assume benign co-operators doing good works, but the power to do evil may win in the long run.
APA, Harvard, Vancouver, ISO, and other styles
17

O'Hara, Kieron, Wendy Hall, and Vinton Cerf. Four Internets. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197523681.001.0001.

Full text
Abstract:
The book describes the Internet, and how Internet governance prevents it fragmenting into a ‘Splinternet’. Four opposing ideologies about how data flows around the network have become prominent because they are (a) implemented by technical standards, and (b) backed by influential geopolitical entities. Each of these specifies an ‘Internet’, described in relation to its implementation by a specific geopolitical entity. The four Internets of the title are: the Silicon Valley Open Internet, developed by pioneers of the Internet in the 1960s, based on principles of openness and efficient dataflow; the Brussels Bourgeois Internet, exemplified by the European Union, with a focus on human rights and legal administration; the DC Commercial Internet, exemplified by the Washington establishment and its focus on property rights and market solutions; and the Beijing Paternal Internet, exemplified by the Chinese government’s control of Internet content. These Internets have to coexist if the Internet as a whole is to remain connected. The book also considers the weaponization of the hacking ethic as the Moscow Spoiler model, exemplified by Russia’s campaigns of misinformation at scale; this is not a vision of the Internet, but is parasitic on the others. Each of these ideologies is illustrated by a specific policy question. Potential future directions of Internet development are considered, including the policy directions that India might take, and the development of technologies such as artificial intelligence, smart cities, the Internet of Things, and social machines. A conclusion speculates on potential future Internets that may emerge alongside those described.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography