Literatura científica selecionada sobre o tema "Hacking hack"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Hacking hack".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Hacking hack"

1

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Texto completo da fonte
Resumo:
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together wi
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Pratt, Mike. "Raptor Hacking." Wildlife Rehabilitation Bulletin 29, no. 1 (2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.

Texto completo da fonte
Resumo:
In the raptor rehabilitation field, hacking is a special procedure for raising juvenile raptors that simulates natural fledging and allows young raptors—those that cannot yet fly and either are still restricted to or just leaving the nest—a gradual acclimation to independence. Hacking also is known as a ‘soft release.’ This paper focuses on hacking raptors and discusses advantages, disadvantages, hacking age, procedures, hack box design and construction, site selection, fledging age of raptor species, and hack release.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Adzhakhunov, E. A., and O. V. Nikolaev. "UAV control hack system." Journal of «Almaz – Antey» Air and Space Defence Corporation, no. 2 (June 23, 2021): 35–41. http://dx.doi.org/10.38013/2542-0542-2021-2-35-41.

Texto completo da fonte
Resumo:
The paper presents an alternative solution to the problem of drone hacking over a radio channel and uses signal spoofing of a global positioning system (GPS, GLONASS). Within the framework of the study, block diagram and operation algorithm of the system were developed and experimental data were obtained.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Aiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips, and Ruby R. Farr. "Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking." Forensic Sciences 4, no. 1 (2024): 24–41. http://dx.doi.org/10.3390/forensicsci4010003.

Texto completo da fonte
Resumo:
Adolescents are currently the most digitally connected generation in history. There is an ever-growing need to understand how typical adolescent risk-taking intersects with the vastly criminogenic potential of digital technology. Criminal hacking in older adolescents (16–19-year-olds) was assessed using an adapted Theory of Planned Behaviour (TPB) model, a cohesive theoretical framework that incorporates cognitive processes and human drivers (informed by psychology, cyberpsychology, and criminology theory). In 2021, a large-scale anonymous online survey was conducted across nine European count
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Pisarić, Milana. "The use of policeware to hack electronic evidence in Germany and the Netherlands." Nauka, bezbednost, policija 28, no. 1 (2023): 16–26. http://dx.doi.org/10.5937/nabepo28-43759.

Texto completo da fonte
Resumo:
Hacking as manipulation of software, data, computer system or network without the knowledge and permission of the user constitutes an act of criminal offence. However, given that certain technological tendencies make it difficult/impossible to collect electronic evidence, the question arises as to whether the authorities responsible for detecting and proving criminal offenses should be authorized to hack, i.e. to conduct investigations in the digital environment in such a way that they would be authorized to exploit technical, systemic and human vulnerabilities within the IT system, without kn
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Fidler, David P. "The U.S. Election Hacks, Cybersecurity, and International Law." AJIL Unbound 110 (2016): 337–42. http://dx.doi.org/10.1017/aju.2017.5.

Texto completo da fonte
Resumo:
In October 2016, the United States accused Russia of hacking political organizations involved in the U.S. elections and leaking pilfered information to influence the outcome. In December, President Obama imposed sanctions for the hacking. This incident damaged President Obama's cybersecurity legacy. The “hack and leak” campaign targeted American self-government—a challenge to his administration's promotion of democracy in cyberspace. It created problems for the president's emphasis on international law and norms as “rules of the road” for cybersecurity. The episode exposed failures in his atte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Ul Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, et al. "The Impacts of Ethical Hacking and its Security Mechanisms." Pakistan Journal of Engineering and Technology 5, no. 4 (2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.

Texto completo da fonte
Resumo:
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Hussain, Syed Muzaffar. "AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS." Journal of Correctional Issues 5, no. 1 (2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.

Texto completo da fonte
Resumo:
This paper considers two different classes of computer hackers, with a special emphasis on disparate motivations of hacking. Hackers’ psychology widely discussed in the media is almost entirely unexplored by psychologists. In this study, hackers’ and crackers’ motivation is investigated, using the study of values scale. One hundred and fourteen participants completed our online research instrument. The study of values and demographic data were questioned. Participants were categorized as hackers and crackers through their responses on two items questioned in the demographic datasheet. Results
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Bohnsack, René, and Meike Malena Liesner. "What the hack? A growth hacking taxonomy and practical applications for firms." Business Horizons 62, no. 6 (2019): 799–818. http://dx.doi.org/10.1016/j.bushor.2019.09.001.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Jordan, Tim. "A genealogy of hacking." Convergence: The International Journal of Research into New Media Technologies 23, no. 5 (2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.

Texto completo da fonte
Resumo:
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This article proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame, a history of hacking will be proposed in four phases. The first phase is the ‘prehistory’ of hacking in which four core
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!