Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1HackingJosh Thompsons2017-05-08Have You Ever Wanted To Be A Hacker? Do You Want To Take You...ISBN-13:9781546548935
2Hands on HackingMatthew Hickey2020-09-16A fast, hands-on introduction to offensive hacking technique...ISBN-13:1119561450
3Mind HackingJohn Hargrave2017-09-12Have you ever wished you could reprogram your brain, just as...ISBN-13:1501105663
4Hardware HackingJoe Grand2004-01-29"If I had this book 10 years ago, the FBI would never have f...ISBN-13:9780080478258
5Hacking GrowthSean Ellis2017That methodology is called Growth Hacking, and it'spractitio...ISBN-13:045149721X
6HackingGary Mitnick2015-08-05"The Best Hacking Course for Beginners Available." Are you r...ISBN-13:9781523720651
7Hacking LifeJoseph M. Reagl Jr.2020-02-18Life hackers track and analyze the food they eat, the hours ...ISBN-13:0262538997
8HackingErickson Karnel2021-01-044 Manuscripts in 1 Book!Have you always been interested and ...ISBN-13:9781990151125
9Google Hacking for Penetration TestersJohnny Long2011-04-18This book helps people find sensitive information on the Web...ISBN-13:9780080484266
10Hacking the HackerRoger A. Grimes2017-04-18Meet the world's top ethical hackers and explore the tools o...ISBN-13:1119396220
11HackingTim Jordan2008Hacking provides an introduction to the community of hackers...ISBN-13:0745639712
12Ninja HackingThomas Wilhelm2010-11-02Ninja Hacking offers insight on how to conduct unorthodox at...ISBN-13:9781597495899
13The Basics of Hacking and Penetration TestingPatrick Engebretson2013-06-24The Basics of Hacking and Penetration Testing, Second Editio...ISBN-13:0124116418
14Hacking Through BelgiumEdmund Dane1914WISC:89100103266
15Hacking- The art Of ExploitationJ. Erickson2018-03-06This text introduces the spirit and theory of hacking as wel...
16Penetration TestingGeorgia Weidman2014-06-14Penetration testers simulate cyber attacks to find security ...ISBN-13:1593275641
17HackersSteven Levy2010-05-19This 25th anniversary edition of Steven Levy's classic book ...ISBN-13:9781449393748
18HackingHarsh Bothra2017-06-24Be a Hacker with EthicsISBN-13:9386173050
19Hacking and Securing IOS ApplicationsJonathan Zdziarski2012Explores hacking the iPhone and iPad; provides practical inf...ISBN-13:1449318746
20Hacking the CodeMark Burnett2004-05-10Hacking the Code has over 400 pages of dedicated exploit, vu...ISBN-13:9780080478173
21The Growth Hacking BookParul Agrawal2019-08-15There are two ways to learn anything: 1) by experimenting wi...ISBN-13:9781733095556
22Handmade Electronic MusicNicolas Collins2006Providing a practical introduction for students of electroni...ISBN-13:0415975921
23HackersPaul A. Taylor1999In this text the author looks at the battle between the comp...ISBN-13:0415180724
24The Web Application Hacker's HandbookDafydd Stuttard2011-03-16This book is a practical guide to discovering and exploiting...ISBN-13:1118079612
25Hacking DiversityChristina Dunbar-Hester2019-12-10"We regularly read and hear exhortations for women to take u...ISBN-13:069119288X
26CUCKOO'S EGGClifford Stoll2012-05-23Before the Internet became widely known as a global tool for...ISBN-13:0307819426
27The Basics of Web HackingJosh Pauli2013-06-18The Basics of Web Hacking introduces you to a tool-driven pr...ISBN-13:0124166598
28Learn Ethical Hacking from ScratchZaid Sabih2018-07-31Learn how to hack systems like black hat hackers and secure ...ISBN-13:1788624785
29Social EngineeringChristopher Hadnagy2010-11-29The first book to reveal and dissect the technical aspect of...ISBN-13:1118029712
30Hacking Connected CarsAlissa Knight2020-02-25A field manual on contextualizing cyber threats, vulnerabili...ISBN-13:1119491789
31Hacking Web AppsMike Shema2012-10-22How can an information security professional keep up with al...ISBN-13:1597499560
32HackingAlex Wagner2019-08-15Do you want to know more about today's most Sophisticated cy...ISBN-13:9781839380235
33The Hacker Playbook 2Peter Kim2015-06-20Just as a professional athlete doesn't show up without a sol...ISBN-13:9781512214567
34The Hacker and the StateBen Buchanan2020-02-28“One of the finest books on information security published...ISBN-13:0674245989
35Game HackingNick Cano2016-12-16You don’t need to be a wizard to transform a game you like...ISBN-13:1593276699
36UndergroundSuelette Dreyfus2012-01-05Suelette Dreyfus and her co-author, WikiLeaks founder Julian...ISBN-13:085786260X
37Hacker StatesLuca Follis2020-04-21How hackers and hacking moved from being a target of the sta...ISBN-13:0262043602
38Hacking Point of SaleSlava Gomzin2014-02-03Must-have guide for professionals responsible for securingcr...ISBN-13:1118810074
39The Social Construction of What?Ian Hacking1999Often lost in the debate over the validity of social constru...ISBN-13:9780674812000
40The Hardware HackerAndrew Bunnie Huang2019-08-27For over a decade, Andrew "bunnie" Huang, one of the world's...ISBN-13:1593278136
Libris
1The social construction of what?Hacking, Ian1999The social construction of what?
2Social konstruktion av vad?Hacking, Ian2000Social konstruktion av vad?
3Hacking. [Elektronisk resurs] : the next generationDhanjani, Nitesh.2009Hacking. [Elektronisk resurs] : the next generation
4Hacking : the art of exploitationErickson, Jon, 1977-c2008Hacking : the art of exploitation
5Hacking : world class hacking, Python and cyber security str...2017Hacking : world class hacking, Python and cyber security str...
6Hacking : the next generationDhanjani, Nitesh2009Hacking : the next generation
7Hacking [Elektronisk resurs] the art of exploitationErickson, Jon 1977-c2003Hacking [Elektronisk resurs] the art of exploitation
8Hacking [Elektronisk resurs] the art of exploitationErickson, Jon, 1977-c2008Hacking [Elektronisk resurs] the art of exploitation
9Hacking : digital media and technological determinismJordan, Tim, 1959-2008Hacking : digital media and technological determinism
10Hacking exposed 6 : network security secrets & solutionsMcClure, Stuart.c2009Hacking exposed 6 : network security secrets & solutions
11Representing and intervening : introductory topics in the ph...Hacking, Ian1983Representing and intervening : introductory topics in the ph...
12Social konstruktion av vad?Hacking, Ian2004Social konstruktion av vad?
13Mind hacking : för rebeller - eller för dig som vill bli e...Tydén, Karin, 1964-ArrayMind hacking : för rebeller - eller för dig som vill bli e...
14Historical ontologyHacking, Ian2002Historical ontology
15Hacking the City : Interventionen in urbanen und kommunikati...2011Hacking the City : Interventionen in urbanen und kommunikati...
16The taming of chanceHacking, Iancop.1990The taming of chance
17Rewriting the soul : multiple personality and the sciences o...Hacking, Iancop. 1995Rewriting the soul : multiple personality and the sciences o...
18Why is there philosophy of mathematics at all?Hacking, Ian2014Why is there philosophy of mathematics at all?
19Logic of statistical inferenceHacking, Ian1965Logic of statistical inference
20The emergence of probability : a philosophical study of earl...Hacking, Ian1975The emergence of probability : a philosophical study of earl...
21Hacking Europe [Elektronisk resurs] From Computer Cultures t...Alberts, Gerard.2014Hacking Europe [Elektronisk resurs] From Computer Cultures t...
22Ethical Hacking: System Hacking [Elektronisk resurs]uuuu-uuuuEthical Hacking: System Hacking [Elektronisk resurs]
23Ethical Hacking [Elektronisk resurs]Alana Maurushat2019Ethical Hacking [Elektronisk resurs]
24Hacking Europe : from computer cultures to demoscenesAlberts, Gerard.2014Hacking Europe : from computer cultures to demoscenes
25Hacking Marketing [Elektronisk resurs]Brinker, Scott2016Hacking Marketing [Elektronisk resurs]
26Game Hacking [Elektronisk resurs]Cano, Nick2016Game Hacking [Elektronisk resurs]
27Hacking Diversity [Elektronisk resurs]Christina Dunbar-Hester2020Hacking Diversity [Elektronisk resurs]
28Ethical Hacking [Elektronisk resurs]uuuu-uuuuEthical Hacking [Elektronisk resurs]
29Kismet Hacking [Elektronisk resurs]Frank Thornton. Michael J. Schearer. Brad Haines.2007Kismet Hacking [Elektronisk resurs]
30Game Hacking [Elektronisk resurs]2016Game Hacking [Elektronisk resurs]
31Hacking Growth [Elektronisk resurs]uuuu-uuuuHacking Growth [Elektronisk resurs]
32Hacking Happiness [Elektronisk resurs]uuuu-uuuuHacking Happiness [Elektronisk resurs]
33Hacking Happiness [Elektronisk resurs]uuuu-uuuuHacking Happiness [Elektronisk resurs]
34The Taming of Chance [Elektronisk resurs]Hacking1990The Taming of Chance [Elektronisk resurs]
35Why Is There Philosophy of Mathematics At All? [Elektronisk ...Hacking2014Why Is There Philosophy of Mathematics At All? [Elektronisk ...
36IoT-Hacking [Elektronisk resurs]uuuu-uuuuIoT-Hacking [Elektronisk resurs]
37Hacking Android [Elektronisk resurs]Kotipalli, Srinivasa Rao2016Hacking Android [Elektronisk resurs]
38Hacking Android [Elektronisk resurs]Kotipalli, Srinivasa Raouuuu-uuuuHacking Android [Elektronisk resurs]
39Hacking Kubernetes [Elektronisk resurs]Michael Hausenblas2021Hacking Kubernetes [Elektronisk resurs]
40Hacking Health How to Make Money and Save Lives in the Healt...Putrino, David.2018Hacking Health How to Make Money and Save Lives in the Healt...
SwePub
1Social konstruktion av vad?Hacking, Ian Hansson, Bengt Social konstruktion av vad?
2Quantum hacking : How eve can exploit component imperfection...Sauge, Sebastien Makarov, V. Anisimov, A. Quantum hacking : How eve can exploit component imperfection...
3Hacking Capitalism : The Free and Open Source Software Movem...Söderberg, Johan, 1976Hacking Capitalism : The Free and Open Source Software Movem...
4Hacking sustainability : Broadening participation through Gr...Zapico Lamela, Jorge Luis Pargman, Daniel Ebner, Hannes Eriksson, Elina Hacking sustainability : Broadening participation through Gr...
5Effects of chemotherapy and hormonal therapy for early breas...Abe, O Abe, R Enomoto, K Kikuchi, K Effects of chemotherapy and hormonal therapy for early breas...
6Effects of radiotherapy and of differences in the extent of ...Abe, O Abe, R Enomoto, K Kikuchi, K Effects of radiotherapy and of differences in the extent of ...
7EFFECTS OF RADIOTHERAPY AND SURGERY IN EARLY BREAST-CANCER -...ABE, O ABE, R ASAISHI, K ENOMOTO, K EFFECTS OF RADIOTHERAPY AND SURGERY IN EARLY BREAST-CANCER -...
8Long-term outcomes for neoadjuvant versus adjuvant chemother...Alberro, JA Ballester, B Deulofeu, P Fabregas, R Long-term outcomes for neoadjuvant versus adjuvant chemother...
9Ovarian ablation in early breast cancer: overview of the ran...Clarke, M Collins, R Davies, C Godwin, J Ovarian ablation in early breast cancer: overview of the ran...
10Postnatal depression across countries and cultures: a qualit...Oates, M.R. Cox, J.L. Neema, S. Asten, P. Postnatal depression across countries and cultures: a qualit...
11Outcomes of Patients Presenting with Mild Acute Respiratory ...Pham, T Neto, AS Pelosi, P Laffey, JG Outcomes of Patients Presenting with Mild Acute Respiratory ...
12Hacking the codeHogenboom, Katja, 1976-Hacking the code
13Hacking migration control: Repurposing and reprogramming dep...Franck, Anja, 1973 Vigneswaran, Darshan Hacking migration control: Repurposing and reprogramming dep...
14Hacking deportability: How migrants change migration control...K. Franck, Anja, 1973 Vigneswaran, Darshan Hacking deportability: How migrants change migration control...
15Hacking delivery systems : exploring design tools for user-l...Davoli, Lorenzo Redström, Johan van der Vleuten, Ruben Hacking delivery systems : exploring design tools for user-l...
16Hacking Women’s HealthBalaam, Madeline Hansen, Lone Koefoed D’Ignazio, Catherine Simpson, Emma Hacking Women’s Health
17Hacking for SustainabilityZapico Lamela, Jorge Luis Turpeinen, Marko Nils, Brandt Huang, Elaine, Dr. Hacking for Sustainability
18From hacking to simulation: Periodizing digitally-inspired s...Palmås, Karl, 1976From hacking to simulation: Periodizing digitally-inspired s...
19Inquiring Hacking as Politics. A New Departure in Hacker Stu...Söderberg, Johan, 1976Inquiring Hacking as Politics. A New Departure in Hacker Stu...
20Repurposing the hacker: Three cycles of recuperation in the ...Delfanti, Alessandro Söderberg, Johan, 1976 Repurposing the hacker: Three cycles of recuperation in the ...
21‘Life Hacking’ Everyday Temporality : Project Managing D...Dymek, Mikolaj, 1978-‘Life Hacking’ Everyday Temporality : Project Managing D...
22Play at work : Contested frames of hackingGarsten, ChristinaPlay at work : Contested frames of hacking
23Green Hackathon : Hacking for sustainable foodZapico, Jorge LuisGreen Hackathon : Hacking for sustainable food
24P-hacking in academic research : a critical review of the jo...Ingre, Michael, 1965- Wiens, Stefan, Professor Nilsonne, Gustav, MD, PhD Eriksson, Kimmo, Professor P-hacking in academic research : a critical review of the jo...
25Fashion-able. Hacktivism and engaged fashion designVon Busch, Otto, 1975Fashion-able. Hacktivism and engaged fashion design
26The Practices of ProgrammingBergström, Ilias Blackwell, Alan F. The Practices of Programming
27'Zombies ahead!' A study of how hacked digital road signs de...Olofsson, Jennie'Zombies ahead!' A study of how hacked digital road signs de...
28The Nordfront customer database-leak: A case studyFriberg von Sydow, Rikard, 1978-The Nordfront customer database-leak: A case study
29Humanizing Technology Through Post-Digital ArtSimbelis, Vygandas Vegas Höök, Kristina, 1964- Bowers, John Humanizing Technology Through Post-Digital Art
30Piracy and Social Change : Roundtable DiscussionAndersson Schwarz, Jonas, 1978- Burkart, Patrick Aufderheide, Patricia Jaszi, Peter Piracy and Social Change : Roundtable Discussion
31Iran Awaits U.S. Vote With Strategic Patience, Tactical Inte...Behravesh, MaysamIran Awaits U.S. Vote With Strategic Patience, Tactical Inte...
32Book of Peer ProductionSöderberg, Johan, 1976Book of Peer Production
33Materializing infrastructures for participatory hackingDavoli, Lorenzo Redström, Johan Materializing infrastructures for participatory hacking
34Transtructures : prototyping transitional practices for the ...Davoli, Lorenzo, 1983- Redström, Johan, Professor Tonkinwise, Cameron, Professor Transtructures : prototyping transitional practices for the ...
35Alt. vs. Ctrl.: Editorial notes for the JoPP issue on Altern...Félix Tréguer, Félix Antoniadis, Panayotis Söderberg, Johan, 1976 Alt. vs. Ctrl.: Editorial notes for the JoPP issue on Altern...
36Balancing data protection and privacy : The case of informat...Naarttijärvi, Markus, 1981-Balancing data protection and privacy : The case of informat...
37Making Up the ‘‘Drug-Abusing Immigrant’’ : Knowledge...Nordgren, JohanMaking Up the ‘‘Drug-Abusing Immigrant’’ : Knowledge...
38Economic and industrial espionage at the start of the 21st c...Solberg Søilen, Klaus, 1968-Economic and industrial espionage at the start of the 21st c...
39Reproducing wealth without money, one 3d printer at a timeSöderberg, Johan, 1976Reproducing wealth without money, one 3d printer at a time
40Users in the Dark: The Development of a User-Controlled Tech...Söderberg, Johan, 1976Users in the Dark: The Development of a User-Controlled Tech...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 3.119.031 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 967 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2021 Illius Media