Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
Libris
1HackersLevy, StevenHackers
2Hackers [Elektronisk resurs]Steven Levy.Hackers [Elektronisk resurs]
3Medieval Hackers [Elektronisk resurs]Medieval Hackers [Elektronisk resurs]
4Hackers [Elektronisk resurs] Heroes of the Computer Revoluti...Levy, Steven.Hackers [Elektronisk resurs] Heroes of the Computer Revoluti...
5Design for Hackers [Elektronisk resurs] Reverse Engineering ...Kadavy, David.Design for Hackers [Elektronisk resurs] Reverse Engineering ...
6Essential Skills for Hackers [Elektronisk resurs]Essential Skills for Hackers [Elektronisk resurs]
7Wireless hacking [Elektronisk resurs] projects for Wi-Fi ent...Barken, Lee.Wireless hacking [Elektronisk resurs] projects for Wi-Fi ent...
8OS X for hackers at heart [Elektronisk resurs]OS X for hackers at heart [Elektronisk resurs]
9Epic win for Anonymous : how 4chan's army conquered the WebStryker, ColeEpic win for Anonymous : how 4chan's army conquered the Web
10The web application hacker's handbook : discovering and expl...Stuttard, DafyddThe web application hacker's handbook : discovering and expl...
11Hackers Wanted: An Examination of the Cybersecurity Labor Ma...Pollak, JuliaHackers Wanted: An Examination of the Cybersecurity Labor Ma...
12Biohackers [Elektronisk resurs] the politics of open science...Delfanti, Alessandro.Biohackers [Elektronisk resurs] the politics of open science...
13Hackers & Painters [Elektronisk resurs]Graham, Paul.Hackers & Painters [Elektronisk resurs]
14Machine Learning for Hackers [Elektronisk resurs]Conway, Drew.Machine Learning for Hackers [Elektronisk resurs]
15Hackers Beware [Elektronisk resurs]Cole, EricHackers Beware [Elektronisk resurs]
16Hacker's Delight [Elektronisk resurs]Warren, Henry S.Hacker's Delight [Elektronisk resurs]
17Hacker's delight [Elektronisk resurs]Warren, Henry S.Hacker's delight [Elektronisk resurs]
18Hacking for dummiesBeaver, KevinHacking for dummies
19Hacking for dummiesBeaver, KevinHacking for dummies
20iOS Hacker's Handbook [Elektronisk resurs]Blazakis, DioniOS Hacker's Handbook [Elektronisk resurs]
21Berek & Hackers Gynecologic Oncology [Elektronisk resurs]Hacker, Neville F.Berek & Hackers Gynecologic Oncology [Elektronisk resurs]
22Stealing the network [Elektronisk resurs] how to own a shado...Long, Johnny.Stealing the network [Elektronisk resurs] how to own a shado...
23UR Samtiden - From business to buttons 2019 [Elektronisk res...UR Samtiden - From business to buttons 2019 [Elektronisk res...
24The Antivirus Hacker's Handbook [Elektronisk resurs]Koret, Joxean.The Antivirus Hacker's Handbook [Elektronisk resurs]
25Stealing the network [Elektronisk resurs] how to own an iden...Stealing the network [Elektronisk resurs] how to own an iden...
26InfoSec career hacking [Elektronisk resurs] sell your skillz...Bayles, Aaron W.InfoSec career hacking [Elektronisk resurs] sell your skillz...
27New Hacker's Dictionary [Elektronisk resurs]Raymond, Eric S.New Hacker's Dictionary [Elektronisk resurs]
28Android Hacker's Handbook [Elektronisk resurs]Drake, Joshua J.Android Hacker's Handbook [Elektronisk resurs]
29Android hacker's handbookAndroid hacker's handbook
30En bok, en författare [Elektronisk resurs] Daniel GoldbergEn bok, en författare [Elektronisk resurs] Daniel Goldberg
31UR Samtiden - The Conference 2018 [Elektronisk resurs] Att h...UR Samtiden - The Conference 2018 [Elektronisk resurs] Att h...
32The Browser Hacker's Handbook [Elektronisk resurs]Frichot, ChristianThe Browser Hacker's Handbook [Elektronisk resurs]
33UR Samtiden - Internet och revolutionärerna [Elektronisk re...UR Samtiden - Internet och revolutionärerna [Elektronisk re...
34Världen [Elektronisk resurs] InternetaktivisternaVärlden [Elektronisk resurs] Internetaktivisterna
35We Are Legion: The Story of the Hacktivists [Elektronisk res...We Are Legion: The Story of the Hacktivists [Elektronisk res...
36The Mobile Application Hacker's Handbook [Elektronisk resurs...Chell, Dominic.The Mobile Application Hacker's Handbook [Elektronisk resurs...
37The girl who takes an eye for an eyeLagercrantz, David, 1962-The girl who takes an eye for an eye
38Computer and Information Security Handbook [Elektronisk resu...Vacca, John R.Computer and Information Security Handbook [Elektronisk resu...
39Insider threat [Elektronisk resurs] protecting the enterpris...Cole, Eric.Insider threat [Elektronisk resurs] protecting the enterpris...
40Penetration tester's open source toolkit [Elektronisk resurs...Penetration tester's open source toolkit [Elektronisk resurs...
SwePub
1Hackers for Equality (HfE) : Evaluation of a Transnational C...Lundgren, Mats, 1949-, von Schantz Lundgren, Ina, 1958-, 2007Hackers for Equality (HfE) : Evaluation of a Transnational C...
2Free software to open hardware: Critical theory on the front...Söderberg, Johan, 1976-,2011Free software to open hardware: Critical theory on the front...
3Why Hackers Love eHealth ApplicationsGoyal, Rohit, Dragoni, Nicola, 1978-, 2016Why Hackers Love eHealth Applications
4Pojkarna vid datorn : Unga entusiaster i datateknikens värl...Nissen, Jörgen, 1958-,1993Pojkarna vid datorn : Unga entusiaster i datateknikens värl...
5Techniques for Improving Intrusion DetectionAlmgren, Magnus, 1972-,2008Techniques for Improving Intrusion Detection
6Svensk dataspelsutveckling, 1960–1995 Transkript av ett vi...Ernkvist, Mirko, 1980-,2008Svensk dataspelsutveckling, 1960–1995 Transkript av ett vi...
7Logging for Intrusion and Fraud DetectionLundin Barse, Emilie, 1975-,2004Logging for Intrusion and Fraud Detection
8DroidPosture : A Trusted Posture Assessment Service for Mobi...Yalew, Sileshi Demesie, Maguire Jr., Gerald Q., Haridi, Seif, Correia, Miguel, DroidPosture : A Trusted Posture Assessment Service for Mobi...
9Architecture for Adaptive Information Security Systems as ap...Mwakalinga, Jeffy Kowalski, Stewart Mwakalinga, G Jeffy, 2011Architecture for Adaptive Information Security Systems as ap...
10RESTRICTING OR RELEASING PASSION FOR INNOVATION – THE CASE...Bergquist, Magnus, Rolandsson, Bertil, RESTRICTING OR RELEASING PASSION FOR INNOVATION – THE CASE...
11Setting the stage : The vulnerability of critical infrastruc...Thedéen, Torbjörn,Setting the stage : The vulnerability of critical infrastruc...
12Vulnerability Analysis and Patches Management using Secure M...Stirparo, Pasquale, Shibli, Muhammad Awais, Muftic, Sead, Vulnerability Analysis and Patches Management using Secure M...
13Inquiring Hacking as Politics. A New Departure in Hacker Stu...Söderberg, Johan, 1976-,Inquiring Hacking as Politics. A New Departure in Hacker Stu...
14Security Infrastructure and Applicationsfor Mobile AgentsShibli, Awais, 1982-,2010Security Infrastructure and Applicationsfor Mobile Agents
15Non-State Actors in Cyberspace OperationsSigholm, Johan,Non-State Actors in Cyberspace Operations
16Modeling golf player skill using machine learningKönig, Rikard, Johansson, Ulf, Riveiro, Maria, Brattberg, Peter, Modeling golf player skill using machine learning
17Technologies of Collaboration : The Transformation of Hacke...Handler, Reinhard Anton, 1979-,Technologies of Collaboration : The Transformation of Hacke...
18Modeling Golf Player Skill Using Machine LearningKönig, Rikard, Johansson, Ulf, Riveiro, Maria, Brattberg, Peter, Modeling Golf Player Skill Using Machine Learning
19Secure and Privacy-enhanced E-Mail System based on the Conce...Kounelis, Ioannis, Muftic, Sead, Loeschner, Jan 2014Secure and Privacy-enhanced E-Mail System based on the Conce...
20Free Software Beyond Radical Politics: Negotiations of Creat...Velkova, Julia,Free Software Beyond Radical Politics: Negotiations of Creat...
21Feds Everywhere : Risk and Risk-mitigation in Anonymous Chat...Creswell, Philip K., 1982-,2016Feds Everywhere : Risk and Risk-mitigation in Anonymous Chat...
22“This is my cheating ex” Gender and sexuality in revenge...Hearn, Jeff, 1947-, Hall, Matthew, “This is my cheating ex” Gender and sexuality in revenge...
23Piracy and Social Change : Roundtable DiscussionAndersson Schwarz, Jonas, 1978-, Burkart, Patrick, Aufderheide, Patricia, Jaszi, Peter, Piracy and Social Change : Roundtable Discussion
24Revenge pornography and manhood acts : A discourse analysis ...Hall, Matthew, Hearn, Jeff, 1947-, Revenge pornography and manhood acts : A discourse analysis ...
25Haktology, Trump, and news practicesBarkho, Leon,Haktology, Trump, and news practices
26Shaping information security behaviors related to social eng...Rocha Flores, Waldo,2016Shaping information security behaviors related to social eng...
27Avant-Garde and Subversion in an Online 3D WorldBäcke, Maria2008Avant-Garde and Subversion in an Online 3D World
28Inadequate risk analysis might jeopardize the functional saf...Hänninen, Kaj, 1970-, Hansson, Hans, Thane, Henrik, Saadatmand, Mehrdad, Inadequate risk analysis might jeopardize the functional saf...
29Inadequate Risk Analysis Might Jeopardize The Functional Saf...Saadatmand, Mehrdad, 1980-, Hansson, Hans, Thane, Henrik, Hänninen, Kaj, 2016Inadequate Risk Analysis Might Jeopardize The Functional Saf...
30Using Active Learning in Intrusion DetectionAlmgren, Magnus, 1972-, Jonsson, Erland, 1946-, Using Active Learning in Intrusion Detection
31'State' strikes back : Forgotten actor as an agent of interv...Mehrabov, Ilkin, 1979-,2012'State' strikes back : Forgotten actor as an agent of interv...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 2.177.903 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 773 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2019 Illius Media