Tesis sobre el tema "Hackers"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Hackers".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.
Texto completoWilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Texto completoObruch, Arseniy. "The hackers attacks and modern viruses." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.
Texto completoBarudy, G. Claudia, and A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno." Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.
Texto completoChavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.
Texto completoLockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.
Texto completoHowlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.
Texto completoDELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.
Texto completoTaylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing." Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.
Texto completoViroli, Edoardo <1991>. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.
Texto completoHumbert, Jean-Philippe. "Les mondes de la cyberdélinquance et images sociales du pirate informatique." Thesis, Metz, 2007. http://www.theses.fr/2007METZ003L/document.
Texto completoFamiglietti, Andrew A. "Hackers, Cyborgs, and Wikipedians: The Political Economy and Cultural History of Wikipedia." Bowling Green State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1300717552.
Texto completoOswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.
Texto completoDalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.
Texto completoVignoli, Alessandro. "Identità, prestigio ed etica: analisi antropologica delle motivazioni e delle soddisfazioni degli Hackers." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1218/.
Texto completoArtore, Diane. "Honeynet design and implementation." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.
Texto completoImhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.
Texto completoMolony, Scott. "Finding Divinity in Fortran." Thesis, Boston College, 2011. http://hdl.handle.net/2345/1980.
Texto completoRota, Andrea. "Hacking the Web 2.0 : user agency and the role of hackers as computational mediators." Thesis, London School of Economics and Political Science (University of London), 2016. http://etheses.lse.ac.uk/3313/.
Texto completoLira, Isadora Teixeira de. "Hacktivismo e organizações midiáticas: hackeamento de narrativas em wikileaks e mídia ninja." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9789.
Texto completoHowell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.
Texto completoGuimarães, Nathalia Muylaert Locks. "A tese como obra de arte na era de sua reprodutibilidade tecnica /." Araraquara, 2016. http://hdl.handle.net/11449/146686.
Texto completoEmerson, William J. III. "Mechanics and The Essence of Technology." Bowling Green State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.
Texto completoFontoura, Marcelo Crispim da. "Hackers e participação: uma análise de aplicativos de dados públicos do Brasil e seus criadores." Pontifícia Universidade Católica do Rio Grande do Sul, 2014. http://hdl.handle.net/10923/5691.
Texto completoSummers, Timothy Corneal. "HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELSAND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427809862.
Texto completoAlmeida, Fernanda Albuquerque de. "Machinima: entre a narrativa e a experimentação." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/.
Texto completoBilan, Carolina, and Carl Hedberg. "Säkerhetshot och lösningar för privatpersoner med bredband." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.
Texto completoZufferey, Eric. "Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover." Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A001/document.
Texto completoTreguer, Félix. "Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle)." Thesis, Paris, EHESS, 2017. http://www.theses.fr/2017EHES0117/document.
Texto completoVillavicencio, Terreros Felipe A. "Cybercrimes." IUS ET VERITAS, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/123541.
Texto completoFontoura, Marcelo Crispim da. "Hackers e participa??o : uma an?lise de aplicativos de dados p?blicos do Brasil e seus criadores." Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2014. http://tede2.pucrs.br/tede2/handle/tede/4561.
Texto completoBachmann, Michael. "WHAT MAKES THEM CLICK? APPLYING THE RATIONAL CHOICE PERSPECTIVE TO THE HACKING UNDERGROUND." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2277.
Texto completoBach, Sirlei Lourdes. "Contribuição do hacker para o desenvolvimento tecnológico da informática." Florianópolis, SC, 2001. http://repositorio.ufsc.br/xmlui/handle/123456789/82176.
Texto completoLevine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.
Texto completoKelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.
Texto completoMenezes, Karina Moreira. "Pirâmide da pedagogia hacker =[vivências do (in) possível]." Faculdade de Educação, 2018. http://repositorio.ufba.br/ri/handle/ri/27168.
Texto completoAlbuquerque, Mônica Ramalho de. "Existe vida além do código binário? Os hackers e o redimensionamento de princípios modernos em práticas pós-modernas na sociedade informacional." Universidade Federal da Paraíba, 2009. http://tede.biblioteca.ufpb.br:8080/handle/tede/7266.
Texto completoGupta, Nirbhay. "Determining the effectiveness of deceptive honeynets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1303.
Texto completoPaulo, Luis Gonzaga de. "Um modelo complementar para aprimorar a segurança da informação no SDLC para dispositivos móveis: SDD - security driven development." Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1895.
Texto completoOgbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.
Texto completoDiGiusto, Dennis Michael. "A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /." ResearchArchive@Victoria e-Thesis, 2008. http://hdl.handle.net/10063/1148.
Texto completoBuys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.
Texto completoWithers, Kim. "A Psychosocial Behavioral Attribution Model: Examining the Relationship Between the “Dark Triad” and Cyber-Criminal Behaviors Impacting Social Networking Sites." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1072.
Texto completoKrutisch, Dorothee. "Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /." Frankfurt am Main [u.a.] : Lang, 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/376082763.pdf.
Texto completoGozukeles, Ibrahim Izlem. "Free And Open Source Software In Turkey." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607173/index.pdf.
Texto completoДумчиков, Михайло Олександрович, Михаил Александрович Думчиков, Mykhailo Oleksandrovych Dumchykov, Олена Сергіївна Бондаренко, Елена Сергеевна Бондаренко та Olena Serhiivna Bondarenko. "Сучасні аспекти кібербезпеки в контексті глобальних загроз". Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78666.
Texto completoWidyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication." Electronic Thesis or Diss., Paris 8, 2014. http://www.theses.fr/2014PA080003.
Texto completoWidyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication." Thesis, Paris 8, 2014. http://www.theses.fr/2014PA080003.
Texto completoBurtet, Cecilia Gerhardt. "Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/109016.
Texto completoSanches, Wilken David. "O movimento de software livre e a produção colaborativa do conhecimento." Pontifícia Universidade Católica de São Paulo, 2007. http://tede2.pucsp.br/handle/handle/2676.
Texto completo