For Hackers | Bokreferens.se
Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1Design for HackersDavid Kadavy2011-08-29Discover the techniques behind beautiful design by deconstru...ISBN-13:1119998956
2Linux Basics for Hackers, 2nd EditionOccupyTheWeb2025-07-01A revised introduction to the Linux operating system for beg...ISBN-13:1718503547
3The Official Computer Hater's HandbookD. J. Arneson1983ISBN-13:9780440566199
48th International Conference on Motivation2002STANFORD:36105113045426
5Wireless Operational SecurityJohn W. Rittinghouse2004-02-23Front Cover; Wireless Operational Security; Copyright Page; ...UOM:39015058717862
6Black Hat Python, 2nd EditionJustin Seitz2021-04-13Fully-updated for Python 3, the second edition of this world...ISBN-13:1718501137
7New Scientist2000UOM:39015051245408
8Networking Basics for HackersMatthew TwellsA practical and engaging guide to the fundamentals of comput...ISBN-13:1718501315
9Buildings1986The Construction and Building Management Journal.UCLA:L0061662375
10PC World1997UOM:39015047324945
11Network SecurityBRAGG2012-08-11Teaches end-to-end network security concepts and techniques....ISBN-13:0071811737
12Red Hat? Linux? 6 ServerMohammed J. Kabir1999-10-07This guide addresses all the details involved in setting up ...PSU:000043778867
13Ethics in Information TechnologyGeorge Walter Reynolds2003Filled with current examples and ideal for a full or part co...UCSC:32106016550003
14Computer ConfluenceGeorge Beekman2000-07For introductory courses in computer concepts or computer li...ISBN-13:9780130322791
15Government Executive2001NWU:35556033616954
16CompTIA Security+ Certification Boxed Set (Exam SY0-301)Glen E. Clarke2013-10-11The best fully integrated CompTIA Security+ self-study packa...ISBN-13:0071823999
17The Waite Group's HyperTalk BibleMitchell Waite1989UOM:39015013838449
18UNIX Review1990-07UOM:39015022329380
19Professional ResponsibilityRonald D. Rotunda2005STANFORD:36105063267665
20Monterey Life1990UCSC:32106020202468
Libris
1HackersLevy, Steven2010Hackers
2Hackers [Elektronisk resurs]Levy, Steven2010Hackers [Elektronisk resurs]
3Respawn : gamers, hackers, and technogenic life / Colin Milb...Milburn, Colinuuuu-uuuuRespawn : gamers, hackers, and technogenic life / Colin Milb...
4Hackers [Elektronisk resurs]Taylor, Paul1999Hackers [Elektronisk resurs]
5Hackers [Elektronisk resurs] Heroes of the Computer Revoluti...Levy, Steven.2010Hackers [Elektronisk resurs] Heroes of the Computer Revoluti...
6Medieval Hackers [Elektronisk resurs]2015Medieval Hackers [Elektronisk resurs]
7Hackers [Elektronisk resurs]Steven Levy.1999Hackers [Elektronisk resurs]
8Hackers [Elektronisk resurs]Maíllo Fernández, Juan Andrés2020Hackers [Elektronisk resurs]
9Design for Hackers [Elektronisk resurs] Reverse Engineering ...Kadavy, David.2011Design for Hackers [Elektronisk resurs] Reverse Engineering ...
10Medieval Hackers Kathleen E. Kennedy [Elektronisk resurs]Kennedy, Kathleen E.uuuu-uuuuMedieval Hackers Kathleen E. Kennedy [Elektronisk resurs]
11Football hackersBiermann, Christoph, 1960-2019Football hackers
12The Oracle® Hacker's Handbook: Hacking and Defending Oracle...Litchfield, David William2007The Oracle® Hacker's Handbook: Hacking and Defending Oracle...
13Markets for Cybercrime Tools and Stolen Data [electronic res...Ablon, Lillian.uuuu-uuuuMarkets for Cybercrime Tools and Stolen Data [electronic res...
14Respawn: Gamers, Hackers, and Technogenic Life [Elektronisk ...Milburn, Colin2018Respawn: Gamers, Hackers, and Technogenic Life [Elektronisk ...
15Reconnaissance for ethical hackers. [Elektronisk resurs] : f...Singh, Glen D.ArrayReconnaissance for ethical hackers. [Elektronisk resurs] : f...
16HackingBeaver, Kevin M.[2026]Hacking
17Epic win for Anonymous : how 4chan's army conquered the WebStryker, Colec2011Epic win for Anonymous : how 4chan's army conquered the Web
18Essential Skills for Hackers [Elektronisk resurs]Cardwell, Kevin2016Essential Skills for Hackers [Elektronisk resurs]
19Hackers beware [Elektronisk resurs]Cole, Eric2002Hackers beware [Elektronisk resurs]
20Machine Learning for Hackers [Elektronisk resurs]Conway, Drew2012Machine Learning for Hackers [Elektronisk resurs]
21Hacker's Delight [Elektronisk resurs]Henry S. Warrenuuuu-uuuuHacker's Delight [Elektronisk resurs]
22Social engineering : how crowdmasters, phreaks, hackers, and...Gehl, Robert W.uuuu-uuuuSocial engineering : how crowdmasters, phreaks, hackers, and...
23Hackers & Painters [Elektronisk resurs]Graham, Paul.2009Hackers & Painters [Elektronisk resurs]
24Machine Learning for Hackers [Elektronisk resurs]Conway, Drew.2012Machine Learning for Hackers [Elektronisk resurs]
25Educações, culturas e hackers: escritos e reflexões [Elek...Prettouuuu-uuuuEducações, culturas e hackers: escritos e reflexões [Elek...
26Defense against the Black Arts: How Hackers Do What They Do ...Jesse Varsaloneuuuu-uuuuDefense against the Black Arts: How Hackers Do What They Do ...
27Algoritmen2020Algoritmen
28The Web Application Hacker's Handbook [Elektronisk resurs] F...Stuttard, Dafydd.2011The Web Application Hacker's Handbook [Elektronisk resurs] F...
29Biohackers [Elektronisk resurs] the politics of open science...Delfanti, Alessandro.2013Biohackers [Elektronisk resurs] the politics of open science...
30The web application hacker's handbook : discovering and expl...Stuttard, Dafydd2007The web application hacker's handbook : discovering and expl...
31Hacker's Delight [Elektronisk resurs]Henry S. Warrenuuuu-uuuuHacker's Delight [Elektronisk resurs]
32Linux Basics for Hackers [Elektronisk resurs]OccupyTheWeb .uuuu-uuuuLinux Basics for Hackers [Elektronisk resurs]
33Hacking for dummiesBeaver, KevinArrayHacking for dummies
34Ethical hacking [Elektronisk resurs]Maurushat, Alana2019Ethical hacking [Elektronisk resurs]
35Hackers Beware [Elektronisk resurs]Cole, Eric2001Hackers Beware [Elektronisk resurs]
36Penetration Testing For DummiesShimonski, Robert2020Penetration Testing For Dummies
37Hacker's delight [Elektronisk resurs]Warren, Henry S.2013Hacker's delight [Elektronisk resurs]
38Hacker's Delight [Elektronisk resurs]Warren, Henry S2002Hacker's Delight [Elektronisk resurs]
39Hackers Wanted: An Examination of the Cybersecurity Labor Ma...Martin C. Libicki2014Hackers Wanted: An Examination of the Cybersecurity Labor Ma...
40Algoritmen2022Algoritmen
SwePub
1Hackers for Equality (HfE) : Evaluation of a Transnational ...Lundgren, Mats, 1949- von Schantz Lundgren, Ina, 1958- Hackers for Equality (HfE) : Evaluation of a Transnational ...
2Biocomputation Using Molecular Agents Moving in Microfluidic...Blaudeck, Thomas Meinecke, Christoph R. Reuter, Danny Steenhusen, Sönke Biocomputation Using Molecular Agents Moving in Microfluidic...
3Examining the social networks of malware writers and hackers...Holt, Thomas J. Strumsky, Deborah Smirnova, Olga Kilger, Max Examining the social networks of malware writers and hackers...
4La redécouverte d’un éthos journalistique avec la chaÃ...Premat, Christophe, 1976-La redécouverte d’un éthos journalistique avec la chaÃ...
5Free software to open hardware: Critical theory on the front...Söderberg, Johan, 1976Free software to open hardware: Critical theory on the front...
6Why Hackers Love eHealth ApplicationsGoyal, Rohit Dragoni, Nicola, 1978- Why Hackers Love eHealth Applications
7Dams Safety : Inspections, Safety Reviews, and LegislationsAdamo, Nasrat Al-Ansari, Nadhir, 1947- Sissakian, Varoujan Laue, Jan Dams Safety : Inspections, Safety Reviews, and Legislations
8Dam Safety : Hazards Created by Human Failings and ActionsAdamo, Nasrat Al-Ansari, Nadhir, 1947- Sissakian, Varoujan Laue, Jan Dam Safety : Hazards Created by Human Failings and Actions
9Techniques for Improving Intrusion DetectionAlmgren, Magnus, 1972Techniques for Improving Intrusion Detection
10Svensk dataspelsutveckling, 1960–1995 : Transkript av ett ...Ernkvist, Mirko, 1980-Svensk dataspelsutveckling, 1960–1995 : Transkript av ett ...
11Pojkarna vid datorn : Unga entusiaster i datateknikens värl...Nissen, Jörgen, 1958-Pojkarna vid datorn : Unga entusiaster i datateknikens värl...
12Logging for Intrusion and Fraud DetectionLundin Barse, Emilie, 1975Logging for Intrusion and Fraud Detection
13Efficient Security Protocols for Constrained DevicesGunnarsson, Martin Gehrmann, Christian Hell, Martin Pagnin, Elena Efficient Security Protocols for Constrained Devices
14Predictive model for multistage cyber-attack simulationKour, Ravdeep, 1981- Thaduri, Adithya Karim, Ramin, 1964- Predictive model for multistage cyber-attack simulation
15DroidPosture : A Trusted Posture Assessment Service for Mobi...Yalew, Sileshi Demesie Maguire Jr., Gerald Q. Haridi, Seif Correia, Miguel DroidPosture : A Trusted Posture Assessment Service for Mobi...
16The Three Pillars of Functional Autonomy of HackersSöderberg, Johan, 1976 Maxigas,, Maxigas, The Three Pillars of Functional Autonomy of Hackers
17CNN-HMM Model for Real Time DGA CategorizationMahmood, Aimen Abbas, Haider Amjad, Faisal CNN-HMM Model for Real Time DGA Categorization
18Deterritorializing Cyber Security and Warfare in Palestine: ...Cristiano, FabioDeterritorializing Cyber Security and Warfare in Palestine: ...
19Innovation leadership with mentors for team performance in m...Suominen, Anu Jonsson, Vilho Eriksson, Eric Fogelberg, Jessica Innovation leadership with mentors for team performance in m...
20Role of ubiquitous AI and blockchain security for military &...Mahesh, M. Deepak, P. Sharma, K. Mahadevaswamy, J.G. Role of ubiquitous AI and blockchain security for military &...
21Performance Analysis of Verifiable Data Registry Solutions f...Alizadeh, Morteza, 1987- Andersson, Karl, 1970- Schelén, Olov Performance Analysis of Verifiable Data Registry Solutions f...
22Solarwinds breach, a signal for a systemic enterprise view o...Magnusson, Lars, 1952-Solarwinds breach, a signal for a systemic enterprise view o...
23Architecture for Adaptive Information Security Systems as ap...Mwakalinga, G Jeffy Kowalski, Stewart Architecture for Adaptive Information Security Systems as ap...
24Industrial Internet of Things Security enhanced with Deep Le...Fontes, Afonso, 1987Industrial Internet of Things Security enhanced with Deep Le...
25RESTRICTING OR RELEASING PASSION FOR INNOVATION – THE CASE...Bergquist, Magnus, 1960 Rolandsson, Bertil RESTRICTING OR RELEASING PASSION FOR INNOVATION – THE CASE...
26Secure Smart Wearable Computing through Artificial Intellige...Ramasamy, Lakshmana Kumar Khan, Firoz Shah, Mohammad Prasad, Balusupati Veera Venkata Siva Secure Smart Wearable Computing through Artificial Intellige...
27E-commerce Managers at Work : Exploring the Role of a New Ma...Fuentes, Christian Bäckström, Kristina Wulff, Gabriella Stoopendahl, Patrik E-commerce Managers at Work : Exploring the Role of a New Ma...
28Drawbacks of Artificial Intelligence and Their Potential Sol...Khan, B. Fatima, H. Qureshi, A. Kumar, S. Drawbacks of Artificial Intelligence and Their Potential Sol...
29Watch your step! Detecting stepping stones in programmable n...Bhattacherjee, Debopam Gurtov, Andrei Aura, Tuomas Watch your step! Detecting stepping stones in programmable n...
30Analysing Drivers’ Preferences for Privacy Enhancing Car-...Islami, Lejla Fischer-Hübner, Simone, 1963- Hammond, E. N. K. Eloff, J. Analysing Drivers’ Preferences for Privacy Enhancing Car-...
31Vulnerability Analysis and Patches Management using Secure M...Stirparo, Pasquale Shibli, Muhammad Awais Muftic, Sead Vulnerability Analysis and Patches Management using Secure M...
32Inquiring Hacking as Politics. A New Departure in Hacker Stu...Söderberg, Johan, 1976Inquiring Hacking as Politics. A New Departure in Hacker Stu...
33Security Infrastructure and Applicationsfor Mobile AgentsShibli, Awais, 1982- Muftic, Sead, Professor Montanari, Rebecca, Associate Professor Security Infrastructure and Applicationsfor Mobile Agents
34Non-State Actors in Cyberspace OperationsSigholm, JohanNon-State Actors in Cyberspace Operations
35Modeling golf player skill using machine learningKönig, Rikard Johansson, Ulf Riveiro, Maria, 1978- Brattberg, Peter Modeling golf player skill using machine learning
36Technologies of Collaboration : The Transformation of Hacke...Handler, Reinhard Anton, 1979-Technologies of Collaboration : The Transformation of Hacke...
37Expanding the view on Offensive Cyber OperationsLarsson, Emil Jensen, Meiko, Docent Sigholm, Johan, Dr Liwång, Hans, Professor Expanding the view on Offensive Cyber Operations
38Modeling Golf Player Skill Using Machine LearningKönig, Rikard Johansson, Ulf Riveiro, Maria, 1978- Brattberg, Peter Modeling Golf Player Skill Using Machine Learning
39Secure and Privacy-enhanced E-Mail System based on the Conce...Kounelis, Ioannis Muftic, Sead Loeschner, Jan Secure and Privacy-enhanced E-Mail System based on the Conce...
40Free Software Beyond Radical Politics: Negotiations of Creat...Velkova, JuliaFree Software Beyond Radical Politics: Negotiations of Creat...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 4.701.048 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 59 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2025 Illius Media