Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1HackingTim Jordan2013-05-03Hacking provides an introduction to the community of hackers...ISBN-13:0745658156
2Hacking- The art Of ExploitationJ. Erickson2018-03-06This text introduces the spirit and theory of hacking as wel...
3Hacking the HackerRoger A. Grimes2017-05Meet the world's top ethical hackers and explore the tools o...ISBN-13:1119396212
4HackingHarsh Bothra2017-06-24Be a Hacker with EthicsISBN-13:9386173050
5HackingHacking Boy2015-04-19Learn the basics of hacking with this book Why we wrote this...ISBN-13:9781511799218
6HackersPaul A. Taylor1999In this text the author looks at the battle between the comp...ISBN-13:0415180724
7Spirit HackingShaman Durek2019-10-15“This guy does next level stuff. I have worked with him an...ISBN-13:1250232708
8Hacking LifeJoseph M. Reagle Jr.2019-04-16In an effort to keep up with a world of too much, life hacke...ISBN-13:0262038153
9Hacking the XboxAndrew Huang2003Provides step-by-step instructions on basic hacking techniqu...ISBN-13:9781593270292
10HackingHacking Studios2017-08-12Imagine Yourself... Programming like a hacker, landing a sof...ISBN-13:9781974517718
11Mind HackingJohn Hargrave2017-09-12Have you ever wished you could reprogram your brain, just as...ISBN-13:1501105663
12Ethical Hacking and Penetration Testing GuideRafay Baloch2017-09-29Requiring no prior hacking experience, Ethical Hacking and P...ISBN-13:148223162X
13HackingGary Mitnick2015-08-05"The Best Hacking Course for Beginners Available." Are you r...ISBN-13:9781523720651
14Ninja HackingThomas Wilhelm2010-11-02Ninja Hacking offers insight on how to conduct unorthodox at...ISBN-13:9781597495899
15Hacking GrowthSean Ellis2017-04-25The definitive playbook by the pioneers of Growth Hacking, o...ISBN-13:0451497228
16Hacking for BeginnersRamon Nastase2018-08-06Hacking and Security for anyone to understand! This is a boo...ISBN-13:9781792105883
17Google Hacking for Penetration TestersJohnny Long2011-04-18This book helps people find sensitive information on the Web...ISBN-13:9780080484266
18Hacking For DummiesKevin Beaver2018-06-27Stop hackers before they hack you! In order to outsmart a wo...ISBN-13:1119485517
19Coding FreedomE. Gabriella Coleman2013Who are computer hackers? What is free software? And what do...ISBN-13:0691144613
20Internet SecurityKenneth Einar Himma2007This collection of papers, articles, and monographs details ...ISBN-13:9780763735364
21Hack AttackNick Davies2014-08-12At first, it seemed like a small story. The royal editor of ...ISBN-13:0865478821
22Ghost in the WiresKevin Mitnick2011-08-15The thrilling memoir of the world's most wanted computer hac...ISBN-13:0316134473
23HackingJosh Thompsons2017-05-08Have You Ever Wanted To Be A Hacker? Do You Want To Take You...ISBN-13:9781546548935
24UndergroundSuelette Dreyfus2012-01-05Suelette Dreyfus and her co-author, WikiLeaks founder Julian...ISBN-13:085786260X
25HackersSteven Levy2010-05-19This 25th anniversary edition of Steven Levy's classic book ...ISBN-13:9781449393748
26Hacking the HumanMr Ian Mann2012-09-28Ian Mann's Hacking the Human highlights the main sources of ...ISBN-13:1409458288
27Historical OntologyIan Hacking2004With the unusual clarity, distinctive and engaging style, an...ISBN-13:9780674016071
28Hacker CultureDouglas ThomasThe author of Cybercrime: Law Enforcement, Security, and Sur...ISBN-13:9781452904283
29The Art of HackingAnto.Y2012-03Hacker is a person who uses his creativity and knowledge to ...ISBN-13:3848426056
30Hacking: Hacking For Beginners and Basic Security: How To Ha...Jacob Hatcher2016-02-02HACKING: Ultimate Hacking for Beginners Hacking is a widespr...ISBN-13:1329837290
31Hacking the AcademyDaniel J Cohen2013-05-13On May 21, 2010, Daniel J. Cohen and Tom Scheinfeldt posted ...ISBN-13:0472029479
32Hacking DiversityChristina Dunbar-Hester2019-12-10"We regularly read and hear exhortations for women to take u...ISBN-13:069119288X
33Learn Ethical Hacking from ScratchZaid Sabih2018-07-31Learn how to hack systems like black hat hackers and secure ...ISBN-13:1788624785
34Breaking and EnteringJeremy N. Smith2019-01-08This taut, true thriller dives into a dark world that touche...ISBN-13:0544903218
35Hacking iSeriesISBN-13:9659088906
36HackingAlex Wagner2017-05-06## ## ## The Ultimate Beginners Guide to Hacking 2017 ## ## ...ISBN-13:9781546511885
37Hacking Wireless Access PointsJennifer Kurtz2016-12-08Hacking Wireless Access Points: Cracking, Tracking, and Sign...ISBN-13:0128092254
38Hacking the Cable ModemDerEngel2006A guide to cable modems includes tutorials, diagrams, source...ISBN-13:1593271018
39Hacking and Securing IOS ApplicationsJonathan Zdziarski2012Explores hacking the iPhone and iPad; provides practical inf...ISBN-13:1449318746
40KingpinKevin Poulsen2012Documents how a troubled young computer hacker seized contro...ISBN-13:0307588696
Libris
1The social construction of what?Hacking, IanThe social construction of what?
2Social konstruktion av vad?Hacking, IanSocial konstruktion av vad?
3Hacking. [Elektronisk resurs] : the next generationDhanjani, Nitesh.Hacking. [Elektronisk resurs] : the next generation
4Hacking : the art of exploitationErickson, Jon, 1977-Hacking : the art of exploitation
5Hacking : the next generationDhanjani, NiteshHacking : the next generation
6Hacking [Elektronisk resurs] the art of exploitationErickson, Jon 1977-Hacking [Elektronisk resurs] the art of exploitation
7Hacking [Elektronisk resurs] the art of exploitationErickson, Jon, 1977-Hacking [Elektronisk resurs] the art of exploitation
8Hacking : digital media and technological determinismJordan, Tim, 1959-Hacking : digital media and technological determinism
9Hacking exposed 6 : network security secrets & solutionsMcClure, Stuart.c2009Hacking exposed 6 : network security secrets & solutions
10Representing and intervening : introductory topics in the ph...Hacking, IanRepresenting and intervening : introductory topics in the ph...
11Social konstruktion av vad?Hacking, IanSocial konstruktion av vad?
12The taming of chanceHacking, IanThe taming of chance
13Hacking the City : Interventionen in urbanen und kommunikati...2011Hacking the City : Interventionen in urbanen und kommunikati...
14Hacking: World Class Hacking, Python and Cyber Security Stra...Studios, Hacking2017Hacking: World Class Hacking, Python and Cyber Security Stra...
15The emergence of probability : a philosophical study of earl...Hacking, IanThe emergence of probability : a philosophical study of earl...
16Historical ontologyHacking, IanHistorical ontology
17Rewriting the soul : multiple personality and the sciences o...Hacking, IanRewriting the soul : multiple personality and the sciences o...
18Why is there philosophy of mathematics at all?Hacking, IanWhy is there philosophy of mathematics at all?
19Compactifying Moduli spaces / Paul Hacking, Radu Laza, Drago...Hacking, PaulCompactifying Moduli spaces / Paul Hacking, Radu Laza, Drago...
20Python: The No Bs Approach to Hacking and PythonStudios, Hacking2017Python: The No Bs Approach to Hacking and Python
21Logic of statistical inferenceHacking, IanLogic of statistical inference
22Hacking Europe [Elektronisk resurs] From Computer Cultures t...Alberts, Gerard.Hacking Europe [Elektronisk resurs] From Computer Cultures t...
23Ethical Hacking [Elektronisk resurs]Alana MaurushatEthical Hacking [Elektronisk resurs]
24Hacking Europe : from computer cultures to demoscenesAlberts, Gerard.Hacking Europe : from computer cultures to demoscenes
25Hacking Marketing [Elektronisk resurs]Brinker, ScottHacking Marketing [Elektronisk resurs]
26Game Hacking [Elektronisk resurs]Game Hacking [Elektronisk resurs]
27Hacking Cyberspace [Elektronisk resurs]Gunkel, David J.2001Hacking Cyberspace [Elektronisk resurs]
28Hacking Harvard [Elektronisk resurs]Hacking Harvard [Elektronisk resurs]
29The Taming of Chance [Elektronisk resurs]HackingThe Taming of Chance [Elektronisk resurs]
30Hacking Android [Elektronisk resurs]Kotipalli, Srinivasa RaoHacking Android [Elektronisk resurs]
31Hacking Android [Elektronisk resurs]Kotipalli, Srinivasa RaoHacking Android [Elektronisk resurs]
32Game Hacking [Elektronisk resurs]Nick Cano.2016Game Hacking [Elektronisk resurs]
33IoT-Hacking [Elektronisk resurs]Nitesh Dhanjani.2016IoT-Hacking [Elektronisk resurs]
34Hacking Health How to Make Money and Save Lives in the Healt...Putrino, David.Hacking Health How to Make Money and Save Lives in the Healt...
35Hacking Exposed [Elektronisk resurs]Soumya Ranjan BeheraHacking Exposed [Elektronisk resurs]
36What's Hacking? [Elektronisk resurs]What's Hacking? [Elektronisk resurs]
37Kismet Hacking [Elektronisk resurs]Frank Thornton. Michael J. Schearer. Brad Haines.Kismet Hacking [Elektronisk resurs]
38Why Is There Philosophy of Mathematics At All? [Elektronisk ...HackingWhy Is There Philosophy of Mathematics At All? [Elektronisk ...
39The emergence of probability : a philosophical study of earl...Hacking, IanThe emergence of probability : a philosophical study of earl...
40Mad travelers : reflections on the reality of transient ment...Hacking, Ian1998Mad travelers : reflections on the reality of transient ment...
SwePub
1Quantum hacking : How eve can exploit component imperfection...Sauge, Sebastien, Makarov, V. Anisimov, A. Quantum hacking : How eve can exploit component imperfection...
2Hacking Capitalism The Free and Open Source Software Movemen...Söderberg, Johan, 1976-,2007Hacking Capitalism The Free and Open Source Software Movemen...
3Hacking sustainability Broadening participation through Gree...Zapico Lamela, Jorge Luis, Pargman, Daniel, Ebner, Hannes, Eriksson, Elina, 2013Hacking sustainability Broadening participation through Gree...
4Effects of chemotherapy and hormonal therapy for early breas...Abe, O Abe, R Enomoto, K Kikuchi, K Effects of chemotherapy and hormonal therapy for early breas...
5EFFECTS OF RADIOTHERAPY AND SURGERY IN EARLY BREAST-CANCER -...ABE, O ABE, R ASAISHI, K ENOMOTO, K EFFECTS OF RADIOTHERAPY AND SURGERY IN EARLY BREAST-CANCER -...
6Long-term outcomes for neoadjuvant versus adjuvant chemother...Alberro, JA Ballester, B Deulofeu, P Fabregas, R Long-term outcomes for neoadjuvant versus adjuvant chemother...
7Ovarian ablation in early breast cancer: overview of the ran...Clarke, M Collins, R Davies, C Godwin, J Ovarian ablation in early breast cancer: overview of the ran...
8Effects of radiotherapy and of differences in the extent of ...Early Breast Cancer Trialists' Collaborative Group, EBCTCG Bengtsson, Nils-Olof, Jonsson, Håkan, Larsson, Lars-Gunnar, Effects of radiotherapy and of differences in the extent of ...
9Postnatal depression across countries and cultures: a qualit...Oates, M.R. Cox, J.L. Neema, S. Asten, P. Postnatal depression across countries and cultures: a qualit...
10Hacking deportability: How migrants change migration control...K. Franck, Anja, 1973-, Vigneswaran, Darshan Hacking deportability: How migrants change migration control...
11Hacking delivery systems : exploring design tools for user-l...Davoli, Lorenzo, Redström, Johan, van der Vleuten, Ruben, Hacking delivery systems : exploring design tools for user-l...
12Hacking Women’s HealthBalaam, Madeline, Hansen, Lone Koefoed, D’Ignazio, Catherine, Simpson, Emma, Hacking Women’s Health
13Hacking the codeHogenboom, Katja, 1976-,2014Hacking the code
14Hacking for SustainabilityZapico Lamela, Jorge Luis,2014Hacking for Sustainability
15From hacking to simulation: Periodizing digitally-inspired s...Palmås, Karl, 1976-,From hacking to simulation: Periodizing digitally-inspired s...
16Inquiring Hacking as Politics. A New Departure in Hacker Stu...Söderberg, Johan, 1976-,Inquiring Hacking as Politics. A New Departure in Hacker Stu...
17Repurposing the hacker: Three cycles of recuperation in the ...Delfanti, Alessandro Söderberg, Johan, 1976-, Repurposing the hacker: Three cycles of recuperation in the ...
18Play at work : Contested frames of hackingGarsten, Christina,Play at work : Contested frames of hacking
19Green Hackathon : Hacking for sustainable foodZapico, Jorge Luis,Green Hackathon : Hacking for sustainable food
20Green Hackathon : Hacking for sustainable foodZapico, Jorge Luis,Green Hackathon : Hacking for sustainable food
21P-hacking in academic research a critical review of the job ...Ingre, Michael, 1965-,2017P-hacking in academic research a critical review of the job ...
22Fashion-able. Hacktivism and engaged fashion designVon Busch, Otto, 1975-,2008Fashion-able. Hacktivism and engaged fashion design
23The Practices of ProgrammingBergström, Ilias, Blackwell, Alan F. The Practices of Programming
24'Zombies ahead!' A study of how hacked digital road signs de...Olofsson, Jennie,'Zombies ahead!' A study of how hacked digital road signs de...
25The Nordfront customer database-leak: A case studyFriberg von Sydow, Rikard, 1978-,The Nordfront customer database-leak: A case study
26Humanizing Technology Through Post-Digital ArtSimbelis, Vygandas Vegas,2018Humanizing Technology Through Post-Digital Art
27Piracy and Social Change : Roundtable DiscussionAndersson Schwarz, Jonas, 1978-, Burkart, Patrick, Aufderheide, Patricia, Jaszi, Peter, Piracy and Social Change : Roundtable Discussion
28Book of Peer ProductionSöderberg, Johan, 1976-,2014Book of Peer Production
29Materializing infrastructures for participatory hackingDavoli, Lorenzo, Redström, Johan, Materializing infrastructures for participatory hacking
30Transtructures prototyping transitional practices for the de...Davoli, Lorenzo, 1983-,2016Transtructures prototyping transitional practices for the de...
31Alt. vs. Ctrl.: Editorial notes for the JoPP issue on Altern...Félix Tréguer, Félix Antoniadis, Panayotis Söderberg, Johan, 1976-, Alt. vs. Ctrl.: Editorial notes for the JoPP issue on Altern...
32Balancing data protection and privacy : The case of informat...Naarttijärvi, Markus, 1981-,Balancing data protection and privacy : The case of informat...
33Making Up the ‘‘Drug-Abusing Immigrant’’ : Knowledge...Nordgren, Johan,Making Up the ‘‘Drug-Abusing Immigrant’’ : Knowledge...
34Economic and industrial espionage at the start of the 21st c...Solberg Søilen, Klaus, 1968-,Economic and industrial espionage at the start of the 21st c...
35Reproducing wealth without money, one 3d printer at a timeSöderberg, Johan, 1976-,Reproducing wealth without money, one 3d printer at a time
36Users in the Dark: The Development of a User-Controlled Tech...Söderberg, Johan, 1976-,Users in the Dark: The Development of a User-Controlled Tech...
37Zen and the Abstract Machine of KnittingVon Busch, Otto, 1975-,Zen and the Abstract Machine of Knitting
38Hacking the OPAC with ExcelWillén, Niklas, 1984-,Hacking the OPAC with Excel
39I3DermoscopyApp: Hacking Melanoma thanks to IoT technologies...Di Leo, Giuseppe, Liguori, Consolatina, Pietrosanto, Antonio, Sommella, Paolo, I3DermoscopyApp: Hacking Melanoma thanks to IoT technologies...
40Hacking Hacked! The Life Cycles of Digital InnovationSöderberg, Johan, 1976-, Delfanti, A. Hacking Hacked! The Life Cycles of Digital Innovation

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 2.519.611 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 316 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2020 Illius Media