Siga este enlace para ver otros tipos de publicaciones sobre el tema: Hackers.

Tesis sobre el tema "Hackers"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores tesis para su investigación sobre el tema "Hackers".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Obruch, Arseniy. "The hackers attacks and modern viruses." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Barudy, G. Claudia, and A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno." Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.

Texto completo
Resumen
Seminario Para Optar al Grado Académico de Licenciado en Comunicación Social<br>El autor no autoriza el acceso a texto completo de su documento<br>Nuestra época se ha visto marcada por un ascendente proceso de globalización en el área de las comunicaciones. La rápida ampliación de las posibilidades de acceso a la comunicación vía Internet se ha constituido en el principal agente de este proceso. Por esto, consideramos que es muy importante poner atención a las relaciones comunicacionales que esta red genera. El hacker se instala en este contexto, nace y se desarrolla dentro de Internet
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.

Texto completo
Resumen
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove target
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Lockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.

Texto completo
Resumen
This dissertation uses a case study of 2600: The Hacker Quarterly to consider how the practices of a hacker public might be theorized as a rhetorical activity. The project is contextualized within a history of hacking (building from a narrative that centers on Levy's 1984 book Hackers) and within the arc of recent copyright legislation, specifically the Digital Millennium Copyright Act (DMCA) and the 2011-12 Stop Online Piracy Act (SOPA) debates. Within this framework, the dissertation examines how specific patterns and cases within 2600 might further our understanding of the rhetorical canons
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Howlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.

Texto completo
Resumen
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from gove
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

DELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.

Texto completo
Resumen
Crack the code, share your data, have fun, save the world, be independent, become famous and make a lot of money. The remix between the Mertonian ethic of 20th century science and the hacker ethic is producing an emergent open science culture that is redefining the relation between researchers, scientific institutions and intellectual property is redefined. The case studies, analysed through extensive media analysis, interviews and participatory observation, include the open access turn of the American biologist Craig Venter, the rebellion of the Italian virologist Ilaria Capua against WHO dat
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Taylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing." Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.

Texto completo
Resumen
The study is an examination of hacking, placing the act in the context of theories of technological change. Hacking is found to provide illustrative evidence within computing of theories which emphasise the societal shaping of technology over the notion of technological determination. The evolution of hacking is traced, showing how it reflects changing trends in the nature of information, the most vivid of which is the conceptualisation of information known as 'cyberspace'. Instead of simply cataloguing the impact of technical changes within computing and the effects they have had upon informa
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Viroli, Edoardo <1991&gt. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.

Texto completo
Resumen
L'informatica e la tecnologia ad essa correlata (dai computer ad Internet) ha cominciato a svilupparsi a partire dal periodo immediatamente successivo alla Seconda guerra mondiale, rivelandosi sia uno strumento utilizzabile a fin di bene sia una potente arma qualora fosse impiegata con intenti dannosi tanto per i singoli individui quanto per la sicurezza degli Stati. L'avvento di Internet e una sempre più facile accessibilità a computer e strumenti multimediali, infatti, ha permesso la nascita prima e l'evoluzione poi di una nuova serie di crimini e criminali in grado di trarre sempre maggior
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Humbert, Jean-Philippe. "Les mondes de la cyberdélinquance et images sociales du pirate informatique." Thesis, Metz, 2007. http://www.theses.fr/2007METZ003L/document.

Texto completo
Resumen
La cyberdélinquance constitue un phénomène indissociable du monde numérique, depuis les premiers hackers recherchant la compréhension des mécanismes innovants de communication, jusqu'aux pirates informatiques majoritairement voués désormais à la criminalité. L'évolution et l'état actuel de ce phénomène déterminent, dès lors, un véritable questionnement sur la réalité sociale du pirate informatique responsable des faits de cyberdélinquance. En effet, comment l'appréhender et en atteindre la connaissance ? Afin d'en dégager les clés de compréhension, ces interrogations sont abordées par l'étude
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Famiglietti, Andrew A. "Hackers, Cyborgs, and Wikipedians: The Political Economy and Cultural History of Wikipedia." Bowling Green State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1300717552.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Oswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Dalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Vignoli, Alessandro. "Identità, prestigio ed etica: analisi antropologica delle motivazioni e delle soddisfazioni degli Hackers." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1218/.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Artore, Diane. "Honeynet design and implementation." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Imhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Molony, Scott. "Finding Divinity in Fortran." Thesis, Boston College, 2011. http://hdl.handle.net/2345/1980.

Texto completo
Resumen
Thesis advisor: Richard Spinello<br>Thesis advisor: Stephen Pope<br>The information revolution is the single most important change in society since the printing press. At no other time has our society benefited from nearly limitless access to information and communication, and the changes brought on by this access have changed, and are changing, society in fundamental ways. Our homes, our workplaces, and our democracy have all been transformed by information and communication technologies.However, our ethics have not kept pace with our technological progress, and the immense changes brought by
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Rota, Andrea. "Hacking the Web 2.0 : user agency and the role of hackers as computational mediators." Thesis, London School of Economics and Political Science (University of London), 2016. http://etheses.lse.ac.uk/3313/.

Texto completo
Resumen
This thesis studies the contested reconfigurations of computational agency within the domain of practices and affordances involved in the use of the Internet in everyday life (here labelled lifeworld Internet), through the transition of the Internet to a much deeper reliance on computation than at any previous stage. Computational agency is here considered not only in terms of capacity to act enabled (or restrained) by the computational layer but also as the recursive capacity to reconfigure the computational layer itself, therefore in turn affecting one’s own and others’ computational agency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Lira, Isadora Teixeira de. "Hacktivismo e organizações midiáticas: hackeamento de narrativas em wikileaks e mídia ninja." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9789.

Texto completo
Resumen
Submitted by Leonardo Cavalcante (leo.ocavalcante@gmail.com) on 2018-04-06T19:36:10Z No. of bitstreams: 1 Arquivototal.pdf: 2079200 bytes, checksum: 06b2527ecca826172c32b42bb3ef3e3c (MD5)<br>Made available in DSpace on 2018-04-06T19:36:10Z (GMT). No. of bitstreams: 1 Arquivototal.pdf: 2079200 bytes, checksum: 06b2527ecca826172c32b42bb3ef3e3c (MD5) Previous issue date: 2017-08-21<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES<br>The maxim that says "information is power" takes on a larger and more complex dimension when experienced in the era of the spread of Inte
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Howell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.

Texto completo
Resumen
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystrok
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Guimarães, Nathalia Muylaert Locks. "A tese como obra de arte na era de sua reprodutibilidade tecnica /." Araraquara, 2016. http://hdl.handle.net/11449/146686.

Texto completo
Resumen
Orientador: Milton Lahuerta<br>Banca: Carlota Josefina M. C. Reis Boto<br>Banca: Gabriel Henrique Burnatelli de Antônio<br>Banca: Ana Lúcia de Castro<br>Banca: Raul Fiker<br>Resumo: O Objetivo dessa tese foi a de criar um protótipo de tese virtual, que esteja de acordo com as novas formas de produção de conteúdo. A criação desse protótipo, que nada mais é do que a transposição de uma tese escrita para a forma de blog permite que a Universidade se aproprie do espaço Web, uma vez que a Universidade tem perdido o seu papel enquanto instituição de formação. Em uma época de excesso de informação, o
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Emerson, William J. III. "Mechanics and The Essence of Technology." Bowling Green State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Fontoura, Marcelo Crispim da. "Hackers e participação: uma análise de aplicativos de dados públicos do Brasil e seus criadores." Pontifícia Universidade Católica do Rio Grande do Sul, 2014. http://hdl.handle.net/10923/5691.

Texto completo
Resumen
Made available in DSpace on 2014-03-26T02:01:20Z (GMT). No. of bitstreams: 1 000455564-Texto+Completo-0.pdf: 2427221 bytes, checksum: 395629c80655b9bca09b8c14836ed987 (MD5) Previous issue date: 2014<br>This work seeks to explore the phenomenon of public data applications in Brazil. Mobile or not, they are digital programs created from public databases of the government. These programs reformat the information so as to make them more comprehensive and publicized to the general public. These applications are created by programmers and people interested in computer science, which are dedicated
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Summers, Timothy Corneal. "HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELSAND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427809862.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Almeida, Fernanda Albuquerque de. "Machinima: entre a narrativa e a experimentação." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/.

Texto completo
Resumen
Desde os primeiros filmes realizados em jogos digitais nos anos 1990, a noção de machinima vem sendo associada às convenções do cinema clássico. Com isso, ela falha em abranger a diversidade das obras audiovisuais produzidas em ambientes virtuais interativos em tempo real. Assim, o presente estudo busca contribuir com uma melhor compreensão dessa noção, através da análise interpretativa dos seus filmes experimentais e da bibliografia específica. Ele também pretende colaborar com a sua expansão como meio de comunicação e expressão artística. Em um primeiro momento, busca-se evidenciar a associa
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Bilan, Carolina, and Carl Hedberg. "Säkerhetshot och lösningar för privatpersoner med bredband." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.

Texto completo
Resumen
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Zufferey, Eric. "Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover." Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A001/document.

Texto completo
Resumen
Cette thèse vise à interroger le hacking comme source de changement social, voire de subversion de l’ordre social. En mettant en jeu une forme d’autodidaxie et un décloisonnement social entre amateurs, professionnels et militants, il fait espérer des changements dans l’accès aux savoirs, ainsi que dans les manières de penser le rôle de la technologie au sein de nos sociétés. Dans le prolongement d’une sociologie bourdieusienne, l’enquête analyse comment la pratique du hacking s’articule aux instances classiques de la socialisation – famille, amis, institutions scolaires, etc. – et examine quel
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Treguer, Félix. "Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle)." Thesis, Paris, EHESS, 2017. http://www.theses.fr/2017EHES0117/document.

Texto completo
Resumen
Prenant pour point de départ les controverses contemporaines sur la liberté d’expression et la vie privée à l’ère numérique, cette thèse propose de revisiter l’histoire d’Internet au croisement de l’histoire du droit, des théories politiques et de l’histoire des sciences et des techniques. À travers une enquête de temps long sur l’affrontement des stratégies de pouvoir et de résistance associées aux techniques de communication, elle se veut une contribution à l’histoire de l’espace public et de l’activisme numérique. À partir de la « naissance » de l’imprimerie, la première partie retrace les
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Villavicencio, Terreros Felipe A. "Cybercrimes." IUS ET VERITAS, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/123541.

Texto completo
Resumen
In recent times, due to the development of information technology,a new form of crime called informational crimes has developed. in relation to this new type of crime, a special criminal law was issued, whose purpose is to prevent and punish illegal activities that affect computer systems and datas, secret communications, and other legal goods that are affected withthis type of crime, such as equity, public faith and sexual freedom.<br>En los últimos tiempos, producto del desarrollo de las tecnologías informáticas se ha ido desarrollando una nueva forma de criminalidad denominada delitos infor
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Fontoura, Marcelo Crispim da. "Hackers e participa??o : uma an?lise de aplicativos de dados p?blicos do Brasil e seus criadores." Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2014. http://tede2.pucrs.br/tede2/handle/tede/4561.

Texto completo
Resumen
Made available in DSpace on 2015-04-14T14:41:54Z (GMT). No. of bitstreams: 1 455564.pdf: 2427221 bytes, checksum: 395629c80655b9bca09b8c14836ed987 (MD5) Previous issue date: 2014-01-14<br>This work seeks to explore the phenomenon of public data applications in Brazil. Mobile or not, they are digital programs created from public databases of the government. These programs reformat the information so as to make them more comprehensive and publicized to the general public. These applications are created by programmers and people interested in computer science, which are dedicated to explore gov
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Bachmann, Michael. "WHAT MAKES THEM CLICK? APPLYING THE RATIONAL CHOICE PERSPECTIVE TO THE HACKING UNDERGROUND." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2277.

Texto completo
Resumen
The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by hackers and other types of cyber-criminals has been growing significantly in the last decade, main-stream criminology has only recently begun to realize the significance of this threat. Cyber-criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastere
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Bach, Sirlei Lourdes. "Contribuição do hacker para o desenvolvimento tecnológico da informática." Florianópolis, SC, 2001. http://repositorio.ufsc.br/xmlui/handle/123456789/82176.

Texto completo
Resumen
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação.<br>Made available in DSpace on 2012-10-19T12:25:48Z (GMT). No. of bitstreams: 0Bitstream added on 2014-09-25T20:01:43Z : No. of bitstreams: 1 184565.pdf: 8279207 bytes, checksum: 24d5f3b085dc3ef82704a988dfaf46c0 (MD5)<br>Dada a enorme importância política, econômica e social da Internet, urge realizar-se um estudo sobre a evolução das formas de invasão dos chamados piratas eletrônicos. Para tal, buscou-se primeiramente classificá-los de acordo com a terminolo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Levine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.

Texto completo
Resumen
A Methodology for Detecting and Classifying Rootkit Exploits John G. Levine 164 Pages Directed by Dr. Henry L. Owen We propose a methodology to detect and classify rootkit exploits. The goal of this research is to provide system administrators, researchers, and security personnel with the information necessary in order to take the best possible recovery actions concerning systems that are compromised by rootkits. There is no such methodolgoy available at present to perform this function. This may also help to detect and fingerprint additional instances and prevent further security instances
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Kelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.

Texto completo
Resumen
“The Freedom of Information Hacked: Console Cowboys, Computer Wizards, and Personal Freedom in the Digital Age” examines depictions of computer hackers in fiction, the media, and popular culture, assessing how such depictions both influence and reflect popular conceptions of hackers and what they do. In doing so, the dissertation demonstrates the central concerns of hacker stories—concerns about digital security, privacy, and the value of information—have become the concerns of digital culture as a whole, hackers laying bare collective hopes and fears regarding digital networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Menezes, Karina Moreira. "Pirâmide da pedagogia hacker =[vivências do (in) possível]." Faculdade de Educação, 2018. http://repositorio.ufba.br/ri/handle/ri/27168.

Texto completo
Resumen
Submitted by Karina Moreira Menezes (kaikamenezes@gmail.com) on 2018-08-23T18:04:29Z No. of bitstreams: 1 Kamenezes_P2H_EntregaPublica_Repositorio.pdf: 3636178 bytes, checksum: 81e197b6d5183b8028c2d340f16e8cb3 (MD5)<br>Rejected by Ana Miria Moreira (anamiriamoreira@hotmail.com), reason: Prezada Karina,gentileza retificar a ficha catalográfica, que deve ser exclusivamente elaborada pela bibliotecária responsável da Biblioteca Anísio Teixeira da Faculdade de Educação, por favor entrar em contato. (71) 3283-7255/7256; e-mail: biedu@ufba.br on 2018-08-24T17:24:03Z (GMT)<br>Submitted by Karina Mo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Albuquerque, Mônica Ramalho de. "Existe vida além do código binário? Os hackers e o redimensionamento de princípios modernos em práticas pós-modernas na sociedade informacional." Universidade Federal da Paraí­ba, 2009. http://tede.biblioteca.ufpb.br:8080/handle/tede/7266.

Texto completo
Resumen
Made available in DSpace on 2015-05-14T13:26:56Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 440560 bytes, checksum: c6c94dec998cdfdda6c1e605e4e45a52 (MD5) Previous issue date: 2009-12-02<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES<br>After the development of new information and communication technologies in the twentieth century, new social and aesthetic phenomena emerged by the adaptation of cultural, political and economic elements reestablishment. The hacker s and their actions are an unfolding of this scenario and they are part of the computer undergrou
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Gupta, Nirbhay. "Determining the effectiveness of deceptive honeynets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1303.

Texto completo
Resumen
Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of att
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Paulo, Luis Gonzaga de. "Um modelo complementar para aprimorar a segurança da informação no SDLC para dispositivos móveis: SDD - security driven development." Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1895.

Texto completo
Resumen
O uso de dispositivos móveis por um número cada vez maior de pessoas, e em um número crescente de atividades que requerem mais segurança da informação, coloca em evidência a necessidade de prover segurança nos softwares desse ambiente. O aspecto de segurança da informação em dispositivos móveis é preocupante. Entretanto os modelos utilizados pela indústria de software – e os encontrados na literatura atual - no desenvolvimento de aplicações móveis com requisitos de segurança da informação de alto nível ainda não respondem às necessidades de mais segurança reclamadas pelos usuários. O presente
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Texto completo
Resumen
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches f
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

DiGiusto, Dennis Michael. "A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /." ResearchArchive@Victoria e-Thesis, 2008. http://hdl.handle.net/10063/1148.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Buys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.

Texto completo
Resumen
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the information captured in log events. Analysis of these events is critical during incident response, forensic investigations related to network breaches, hacking attacks and data leaks. Such analysis has led to the discipline of Security Event Analysis, also known as Log Analysis. There are several challenges when dealing with events, foremost being the increased volumes at which events are often generated and stored. Fur
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Withers, Kim. "A Psychosocial Behavioral Attribution Model: Examining the Relationship Between the “Dark Triad” and Cyber-Criminal Behaviors Impacting Social Networking Sites." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1072.

Texto completo
Resumen
This study proposes that individual personality characteristics and behavioral triggering effects come together to motivate online victimization. It draws from psychology’s current understanding of personality traits, attribution theory, and criminological research. This study combines the current computer deviancy and hacker taxonomies with that of the Dark Triad model of personality mapping. Each computer deviant behavior is identified by its distinct dimensions of cyber-criminal behavior (e.g., unethical hacking, cyberbullying, cyberstalking, and identity theft) and analyzed against the Dar
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Krutisch, Dorothee. "Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /." Frankfurt am Main [u.a.] : Lang, 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/376082763.pdf.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Gozukeles, Ibrahim Izlem. "Free And Open Source Software In Turkey." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607173/index.pdf.

Texto completo
Resumen
In recent years, there has been growing interest of governments and firms for Free and Open Source Software (FOSS). However, FOSS is still a puzzlement for a wide spectrum of academic disciplines. Social scientists ask why FOSS hackers participate in FOSS if they do not get any monetary rewards. On the other hand firms ask, how a firm can earn money from FOSS. In this study, motivations of FOSS hackers and firms are taken as an interrelated phenomenon. For FOSS hackers, social and technical aspects of FOSS are essential. On the contrary to FOSS hackers, firms have profit oriented goals. In thi
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Думчиков, Михайло Олександрович, Михаил Александрович Думчиков, Mykhailo Oleksandrovych Dumchykov, Олена Сергіївна Бондаренко, Елена Сергеевна Бондаренко та Olena Serhiivna Bondarenko. "Сучасні аспекти кібербезпеки в контексті глобальних загроз". Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78666.

Texto completo
Resumen
В умовах глобальних загроз забезпечення безпеки в світі, вимагає координації і врегулювання багатьох політичних і економічних питань. Зокрема, це осередки цивільних, міжетнічних конфліктів і воєн, продовольчі загрози, негативні наслідки зміни клімату, забруднення навколишнього середовища, виснаження природнихресурсів і уповільнення їх повторного відновлення. Однак серед усіх компонентівзабезпечення безпеки з’явився новий і одночасно складний елемент безпеки – кібербезпека. Щорічно зростає збиток великих організацій, компаній, окремих громадян і ділових людей від кібер атак і нападів зловмисник
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Widyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication." Electronic Thesis or Diss., Paris 8, 2014. http://www.theses.fr/2014PA080003.

Texto completo
Resumen
Cette étude utilise à titre principal la théorie du « milieu » de Michel Serres dans le cadre de son grand concept de système de communication. Cette théorie considère les bruits qui environnent un message dans un canal de communication, comme des éléments importants qui décideront si le message est bien compris (ou non) par le Récepteur.Cette étude relie la théorie à un contexte plus large de la communication dans la province d’Aceh, en Indonésie, et reflète les éléments socio-politico-culture de sa reconstruction, après le tsunami de 2004.En appliquant l'approche de l'Anthropologie aux Techn
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Widyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication." Thesis, Paris 8, 2014. http://www.theses.fr/2014PA080003.

Texto completo
Resumen
Cette étude utilise à titre principal la théorie du « milieu » de Michel Serres dans le cadre de son grand concept de système de communication. Cette théorie considère les bruits qui environnent un message dans un canal de communication, comme des éléments importants qui décideront si le message est bien compris (ou non) par le Récepteur.Cette étude relie la théorie à un contexte plus large de la communication dans la province d’Aceh, en Indonésie, et reflète les éléments socio-politico-culture de sa reconstruction, après le tsunami de 2004.En appliquant l'approche de l'Anthropologie aux Techn
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Burtet, Cecilia Gerhardt. "Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/109016.

Texto completo
Resumen
Na tentativa de compreender como os saberes são desenvolvidos nas práticas de um grupo em um hackerspace, este estudo parte da perspectiva da aprendizagem baseada em práticas pelo viés da abordagem teórico-metodológica da teoria atorrede para acompanhar a realização das atividades cotidianas de um coletivo em um hackerspace. Sem definições prévias estabelecidas acerca do conceito de hackerspace, o estudo tem como objetivo compreender como os saberes são desenvolvidos nas práticas de um grupo, em um hackerspace, e como são enactados pelas relações entre os diversos elementos heterogêneos da red
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Sanches, Wilken David. "O movimento de software livre e a produção colaborativa do conhecimento." Pontifícia Universidade Católica de São Paulo, 2007. http://tede2.pucsp.br/handle/handle/2676.

Texto completo
Resumen
Made available in DSpace on 2016-04-25T20:21:49Z (GMT). No. of bitstreams: 1 Wilken.pdf: 1398546 bytes, checksum: 829e2098dbfebfbb3ec091d6b72d1bfd (MD5) Previous issue date: 2007-05-25<br>This dissertation approaches the construction of a collaborative model of knowledge production disseminated by the Free Software Movement and its opposition to the current law of intelectual property. It describes the genesis of the free software movement as well as how it has become consolidated as an independent domain of knowledge production. In order to better illustrate the model of production proposed
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!