Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
Libris
1The social construction of what?Hacking, IanThe social construction of what?
2Social konstruktion av vad?Hacking, IanSocial konstruktion av vad?
3Hacking. [Elektronisk resurs] : the next generationDhanjani, Nitesh.Hacking. [Elektronisk resurs] : the next generation
4Hacking : the art of exploitationErickson, Jon, 1977-Hacking : the art of exploitation
5Hacking : the next generationDhanjani, NiteshHacking : the next generation
6Hacking [Elektronisk resurs] the art of exploitationErickson, Jon 1977-Hacking [Elektronisk resurs] the art of exploitation
7Hacking [Elektronisk resurs] the art of exploitationErickson, Jon, 1977-Hacking [Elektronisk resurs] the art of exploitation
8Hacking : digital media and technological determinismJordan, Tim, 1959-Hacking : digital media and technological determinism
9Hacking exposed 6 : network security secrets & solutionsMcClure, Stuart.c2009Hacking exposed 6 : network security secrets & solutions
10Representing and intervening : introductory topics in the ph...Hacking, IanRepresenting and intervening : introductory topics in the ph...
11Social konstruktion av vad?Hacking, IanSocial konstruktion av vad?
12The taming of chanceHacking, IanThe taming of chance
13Hacking the City : Interventionen in urbanen und kommunikati...2011Hacking the City : Interventionen in urbanen und kommunikati...
14Hacking: World Class Hacking, Python and Cyber Security Stra...Studios, Hacking2017Hacking: World Class Hacking, Python and Cyber Security Stra...
15The emergence of probability : a philosophical study of earl...Hacking, IanThe emergence of probability : a philosophical study of earl...
16Historical ontologyHacking, IanHistorical ontology
17Rewriting the soul : multiple personality and the sciences o...Hacking, Iancop. 1995Rewriting the soul : multiple personality and the sciences o...
18Why is there philosophy of mathematics at all?Hacking, IanWhy is there philosophy of mathematics at all?
19Python: The No Bs Approach to Hacking and PythonStudios, Hacking2017Python: The No Bs Approach to Hacking and Python
20Logic of statistical inferenceHacking, IanLogic of statistical inference
21Hacking Europe [Elektronisk resurs] From Computer Cultures t...Alberts, Gerard.Hacking Europe [Elektronisk resurs] From Computer Cultures t...
22Ethical Hacking [Elektronisk resurs]Alana MaurushatEthical Hacking [Elektronisk resurs]
23Hacking Europe : from computer cultures to demoscenesAlberts, Gerard.Hacking Europe : from computer cultures to demoscenes
24Hacking Marketing [Elektronisk resurs]Brinker, ScottHacking Marketing [Elektronisk resurs]
25Kismet Hacking [Elektronisk resurs]Frank Thornton. Michael J. Schearer. Brad Haines.Kismet Hacking [Elektronisk resurs]
26Game Hacking [Elektronisk resurs]Game Hacking [Elektronisk resurs]
27Hacking Cyberspace [Elektronisk resurs]Gunkel, David J.2001Hacking Cyberspace [Elektronisk resurs]
28Hacking Harvard [Elektronisk resurs]Hacking Harvard [Elektronisk resurs]
29Compactifying Moduli spaces / Paul Hacking, Radu Laza, Drago...Hacking, Paul, author.Compactifying Moduli spaces / Paul Hacking, Radu Laza, Drago...
30The Taming of Chance [Elektronisk resurs]HackingThe Taming of Chance [Elektronisk resurs]
31Why Is There Philosophy of Mathematics At All? [Elektronisk ...HackingWhy Is There Philosophy of Mathematics At All? [Elektronisk ...
32Hacking Android [Elektronisk resurs]Kotipalli, Srinivasa RaoHacking Android [Elektronisk resurs]
33Hacking Android [Elektronisk resurs]Kotipalli, Srinivasa RaoHacking Android [Elektronisk resurs]
34Game Hacking [Elektronisk resurs]Nick Cano.2016Game Hacking [Elektronisk resurs]
35IoT-Hacking [Elektronisk resurs]Nitesh Dhanjani.2016IoT-Hacking [Elektronisk resurs]
36Hacking Health How to Make Money and Save Lives in the Healt...Putrino, David.Hacking Health How to Make Money and Save Lives in the Healt...
37Hacking Exposed [Elektronisk resurs]Soumya Ranjan BeheraHacking Exposed [Elektronisk resurs]
38The emergence of probability : a philosophical study of earl...Hacking, IanThe emergence of probability : a philosophical study of earl...
39Mad travelers : reflections on the reality of transient ment...Hacking, Ian1998Mad travelers : reflections on the reality of transient ment...
40Why does language matter to philosophy?Hacking, Ian1975Why does language matter to philosophy?
SwePub
1Quantum hacking : How eve can exploit component imperfection...Sauge, Sebastien, Makarov, V. Anisimov, A. Quantum hacking : How eve can exploit component imperfection...
2Hacking Capitalism The Free and Open Source Software Movemen...Söderberg, Johan, 1976-,2007Hacking Capitalism The Free and Open Source Software Movemen...
3Hacking sustainability Broadening participation through Gree...Zapico Lamela, Jorge Luis, Pargman, Daniel, Ebner, Hannes, Eriksson, Elina, 2013Hacking sustainability Broadening participation through Gree...
4Effects of chemotherapy and hormonal therapy for early breas...Abe, O Abe, R Enomoto, K Kikuchi, K Effects of chemotherapy and hormonal therapy for early breas...
5EFFECTS OF RADIOTHERAPY AND SURGERY IN EARLY BREAST-CANCER -...ABE, O ABE, R ASAISHI, K ENOMOTO, K EFFECTS OF RADIOTHERAPY AND SURGERY IN EARLY BREAST-CANCER -...
6Long-term outcomes for neoadjuvant versus adjuvant chemother...Alberro, JA Ballester, B Deulofeu, P Fabregas, R Long-term outcomes for neoadjuvant versus adjuvant chemother...
7Ovarian ablation in early breast cancer: overview of the ran...Clarke, M Collins, R Davies, C Godwin, J Ovarian ablation in early breast cancer: overview of the ran...
8Effects of radiotherapy and of differences in the extent of ...Early Breast Cancer Trialists' Collaborative Group, EBCTCG Bengtsson, Nils-Olof, Jonsson, Håkan, Larsson, Lars-Gunnar, Effects of radiotherapy and of differences in the extent of ...
9Postnatal depression across countries and cultures: a qualit...Oates, M.R. Cox, J.L. Neema, S. Asten, P. Postnatal depression across countries and cultures: a qualit...
10Hacking deportability: How migrants change migration control...K. Franck, Anja, 1973-, Vigneswaran, Darshan Hacking deportability: How migrants change migration control...
11Hacking delivery systems : exploring design tools for user-l...Davoli, Lorenzo, Redström, Johan, van der Vleuten, Ruben, Hacking delivery systems : exploring design tools for user-l...
12Hacking Women’s HealthBalaam, Madeline, Hansen, Lone Koefoed, D’Ignazio, Catherine, Simpson, Emma, Hacking Women’s Health
13Hacking the codeHogenboom, Katja, 1976-,2014Hacking the code
14Hacking for SustainabilityZapico Lamela, Jorge Luis,2014Hacking for Sustainability
15From hacking to simulation: Periodizing digitally-inspired s...Palmås, Karl, 1976-,From hacking to simulation: Periodizing digitally-inspired s...
16Inquiring Hacking as Politics. A New Departure in Hacker Stu...Söderberg, Johan, 1976-,Inquiring Hacking as Politics. A New Departure in Hacker Stu...
17Repurposing the hacker: Three cycles of recuperation in the ...Delfanti, Alessandro Söderberg, Johan, 1976-, Repurposing the hacker: Three cycles of recuperation in the ...
18Play at work : Contested frames of hackingGarsten, Christina,Play at work : Contested frames of hacking
19Green Hackathon : Hacking for sustainable foodZapico, Jorge Luis,Green Hackathon : Hacking for sustainable food
20Green Hackathon : Hacking for sustainable foodZapico, Jorge Luis,Green Hackathon : Hacking for sustainable food
21P-hacking in academic research a critical review of the job ...Ingre, Michael, 1965-,2017P-hacking in academic research a critical review of the job ...
22Fashion-able. Hacktivism and engaged fashion designVon Busch, Otto, 1975-,2008Fashion-able. Hacktivism and engaged fashion design
23The Practices of ProgrammingBergström, Ilias, Blackwell, Alan F. The Practices of Programming
24'Zombies ahead!' A study of how hacked digital road signs de...Olofsson, Jennie,'Zombies ahead!' A study of how hacked digital road signs de...
25The Nordfront customer database-leak: A case studyFriberg von Sydow, Rikard, 1978-,The Nordfront customer database-leak: A case study
26Humanizing Technology Through Post-Digital ArtSimbelis, Vygandas Vegas,2018Humanizing Technology Through Post-Digital Art
27Piracy and Social Change : Roundtable DiscussionAndersson Schwarz, Jonas, 1978-, Burkart, Patrick, Aufderheide, Patricia, Jaszi, Peter, Piracy and Social Change : Roundtable Discussion
28Book of Peer ProductionSöderberg, Johan, 1976-,2014Book of Peer Production
29Materializing infrastructures for participatory hackingDavoli, Lorenzo, Redström, Johan, Materializing infrastructures for participatory hacking
30Transtructures prototyping transitional practices for the de...Davoli, Lorenzo, 1983-,2016Transtructures prototyping transitional practices for the de...
31Alt. vs. Ctrl.: Editorial notes for the JoPP issue on Altern...Félix Tréguer, Félix Antoniadis, Panayotis Söderberg, Johan, 1976-, Alt. vs. Ctrl.: Editorial notes for the JoPP issue on Altern...
32Balancing data protection and privacy : The case of informat...Naarttijärvi, Markus, 1981-,Balancing data protection and privacy : The case of informat...
33Making Up the ‘‘Drug-Abusing Immigrant’’ : Knowledge...Nordgren, Johan,Making Up the ‘‘Drug-Abusing Immigrant’’ : Knowledge...
34Economic and industrial espionage at the start of the 21st c...Solberg Søilen, Klaus, 1968-,Economic and industrial espionage at the start of the 21st c...
35Reproducing wealth without money, one 3d printer at a timeSöderberg, Johan, 1976-,Reproducing wealth without money, one 3d printer at a time
36Users in the Dark: The Development of a User-Controlled Tech...Söderberg, Johan, 1976-,Users in the Dark: The Development of a User-Controlled Tech...
37Zen and the Abstract Machine of KnittingVon Busch, Otto, 1975-,Zen and the Abstract Machine of Knitting
38Hacking the OPAC with ExcelWillén, Niklas, 1984-,Hacking the OPAC with Excel
39I3DermoscopyApp: Hacking Melanoma thanks to IoT technologies...Di Leo, Giuseppe, Liguori, Consolatina, Pietrosanto, Antonio, Sommella, Paolo, I3DermoscopyApp: Hacking Melanoma thanks to IoT technologies...
40Hacking Hacked! The Life Cycles of Digital InnovationSöderberg, Johan, 1976-, Delfanti, A. Hacking Hacked! The Life Cycles of Digital Innovation

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 2.227.134 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 993 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2019 Illius Media