Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1The Basics of Hacking and Penetration TestingPatrick Engebretson2011-07-21The Basics of Hacking and Penetration Testing serves as an i...ISBN-13:1597496561
2Hacking: The Art of Exploitation, 2nd EditionJon Erickson2008-02-01Hacking is the art of creative problem solving, whether that...ISBN-13:1593271441
3Hacking For DummiesKevin Beaver2007-01-23Shows network administrators and security testers how to ent...ISBN-13:0470113073
4HackingTim Jordan2008Hacking provides an introduction to the community of hackers...ISBN-13:0745639712
5Hacking the Cable ModemDerEngel2006A guide to cable modems includes tutorials, diagrams, source...ISBN-13:1593271018
6Google Hacking for Penetration TestersBill Gardner2011-04-18This book helps people find sensitive information on the Web...ISBN-13:0080484263
7Hacking Exposed 7 : Network Security Secrets & Solutions, Se...Stuart McClure2012-07-11The latest tactics for thwarting digital attacks “Our new ...ISBN-13:0071780289
8Hacking ExposedJoel Scambray2000-11-01This one-of-a-kind book provides in-depth expert insight int...ISBN-13:0072192143
9Hacking-- the Untold StoryPranav Pareek2007CHI:092580931
10HackingJon Erickson2003This book is for both technical and nontechnical people inte...ISBN-13:9781593270070
11Hacking Linux ExposedBrian Hatch2001Tighten holes and maintain security on your Linux system!Fro...UOM:39015050482861
12Hacking Exposed Cisco NetworksAndrew Vladimirov2006-01-06Focusing solely on Cisco network hacking, security auditing ...UOM:39015063661345
13Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Editi...Daniel Regalado2015-01-09Cutting-edge techniques for finding and fixing critical secu...ISBN-13:0071838503
14Hacking Through BelgiumEdmund Dane1914WISC:89100103266
15English Patents of Inventions, Specifications1872DMM:057002678407
16Directory of the boroughs of Blackburn, Accrington and Darwe...Barrett's publications, ltd1900OXFORD:752642694
17DIY RC Airplanes from Scratch : The Brooklyn Aerodrome Bible...Breck Baldwin2013-05-22BUILD YOUR OWN REMOTE-CONTROLLED AIRPLANES QUICKLY, EASILY, ...ISBN-13:0071810048
18Beginners Guide to Ethical Hacking and Cyber SecurityAbhinav Ojha2023-07-09This textbook 'Ethical Hacking and Cyber Security ' is inten...
19Hacking Exposed Windows 2000Joel Scambray2001UOM:39015053038827
20The Encyclopedia of pure materia medica v. 9, 1879Timothy Field Allen1879STANFORD:24503374283
Libris
1HackingBeaver, Kevin M.[2026]Hacking
2Social konstruktion av vad?Hacking, Ian2000Social konstruktion av vad?
3The social construction of what?Hacking, Ian1999The social construction of what?
4Hacking. [Elektronisk resurs] : the next generationDhanjani, Nitesh.2009Hacking. [Elektronisk resurs] : the next generation
5Hacking : the art of exploitationErickson, Jon, 1977-c2008Hacking : the art of exploitation
6Hacking : world class hacking, Python and cyber security str...2017Hacking : world class hacking, Python and cyber security str...
7HackingBeaver, KevinArrayHacking
8Hacking : the next generationDhanjani, Nitesh2009Hacking : the next generation
9Hacking [Elektronisk resurs] the art of exploitationErickson, Jon 1977-c2003Hacking [Elektronisk resurs] the art of exploitation
10Hacking [Elektronisk resurs] the art of exploitationErickson, Jon, 1977-c2008Hacking [Elektronisk resurs] the art of exploitation
11Hacking : digital media and technological determinismJordan, Tim, 1959-2008Hacking : digital media and technological determinism
12Hacking exposed 6 : network security secrets & solutionsMcClure, Stuart.c2009Hacking exposed 6 : network security secrets & solutions
13Social konstruktion av vad?Hacking, Ian2004Social konstruktion av vad?
14SAP BusinessObjects Dashboards 4.0 Cookbook [Elektronisk res...Hacking, Xavier2011SAP BusinessObjects Dashboards 4.0 Cookbook [Elektronisk res...
15Representing and intervening : introductory topics in the ph...Hacking, Ian1983Representing and intervening : introductory topics in the ph...
16Asterisk Hacking [Elektronisk resurs]Jackson, Benjamin2007Asterisk Hacking [Elektronisk resurs]
17Mind hacking : för rebeller - eller för dig som vill bli e...Tydén, Karin, 1964-ArrayMind hacking : för rebeller - eller för dig som vill bli e...
18Ethical hacking [Elektronisk resurs]Maurushat, Alana2019Ethical hacking [Elektronisk resurs]
19Historical ontologyHacking, Ian2002Historical ontology
20The taming of chance / Ian Hacking [Elektronisk resurs]Hacking, Ianuuuu-uuuuThe taming of chance / Ian Hacking [Elektronisk resurs]
21The taming of chance / Ian Hacking [Elektronisk resurs]Hacking, Ianuuuu-uuuuThe taming of chance / Ian Hacking [Elektronisk resurs]
22Hacking the City : Interventionen in urbanen und kommunikati...2011Hacking the City : Interventionen in urbanen und kommunikati...
23Imaging for students / Craig Hacking and David Lisle [Elektr...Hacking, Craiguuuu-uuuuImaging for students / Craig Hacking and David Lisle [Elektr...
24EHE: Ethical Hacking Expert, 4th volume [Elektronisk resurs]...STAR Ethical Hacking Experts2017EHE: Ethical Hacking Expert, 4th volume [Elektronisk resurs]...
25The emergence of probability : a philosophical study of earl...Hacking, Ian1975The emergence of probability : a philosophical study of earl...
26Why is there philosophy of mathematics at all?Hacking, Ian2014Why is there philosophy of mathematics at all?
27Hacking the bomb : cyber threats and nuclear weaponsFutter, Andrew, 1983-[2018]Hacking the bomb : cyber threats and nuclear weapons
28Logic of statistical inference / by Ian Hacking. [electronic...Hacking, Ianuuuu-uuuuLogic of statistical inference / by Ian Hacking. [electronic...
29Logic of statistical inference / Ian Hacking and Jan-Willem ...Hacking, Ianuuuu-uuuuLogic of statistical inference / Ian Hacking and Jan-Willem ...
30Why is there philosophy of mathematics at all? / Ian Hacking...Hacking, Ianuuuu-uuuuWhy is there philosophy of mathematics at all? / Ian Hacking...
31Logic of statistical inferenceHacking, Ian1965Logic of statistical inference
32Hacking Europe : from computer cultures to demoscenesArrayHacking Europe : from computer cultures to demoscenes
33Hacking Europe [Elektronisk resurs] From Computer Cultures t...Alberts, Gerard.2014Hacking Europe [Elektronisk resurs] From Computer Cultures t...
34Ethical Hacking [Elektronisk resurs]uuuu-uuuuEthical Hacking [Elektronisk resurs]
35Ethical Hacking [Elektronisk resurs]uuuu-uuuuEthical Hacking [Elektronisk resurs]
36Game Hacking [Elektronisk resurs]2016Game Hacking [Elektronisk resurs]
37Hacking APIs [Elektronisk resurs]uuuu-uuuuHacking APIs [Elektronisk resurs]
38Hacking Happiness [Elektronisk resurs]uuuu-uuuuHacking Happiness [Elektronisk resurs]
39IoT-Hacking [Elektronisk resurs]uuuu-uuuuIoT-Hacking [Elektronisk resurs]
40Ethical Hacking [Elektronisk resurs]Alana Maurushat2019Ethical Hacking [Elektronisk resurs]
SwePub
1Hacking ageCozza, Michela, 1978- Ellison, Kirsten L. Katz, Stephen Hacking age
2Social konstruktion av vad?Hacking, Ian Hansson, Bengt Social konstruktion av vad?
3Quantum hacking : How eve can exploit component imperfection...Sauge, Sebastien Makarov, V. Anisimov, A. Quantum hacking : How eve can exploit component imperfection...
4Hacking Capitalism : The Free and Open Source Software Movem...Söderberg, Johan, 1976Hacking Capitalism : The Free and Open Source Software Movem...
5Hacking sustainability : Broadening participation through Gr...Zapico Lamela, Jorge Luis Pargman, Daniel Ebner, Hannes Eriksson, Elina Hacking sustainability : Broadening participation through Gr...
6Effects of chemotherapy and hormonal therapy for early breas...Abe, O Abe, R Enomoto, K Sugimachi, K Effects of chemotherapy and hormonal therapy for early breas...
7Postnatal depression across countries and cultures: a qualit...Oates, M.R. Cox, J.L. Neema, S. Asten, P. Postnatal depression across countries and cultures: a qualit...
8Hacking the codeHogenboom, Katja, 1976-Hacking the code
9Secret data reading - dilemmas with government hackingEneman, Marie, 1969 Ljungberg, Jan, 1956 Secret data reading - dilemmas with government hacking
10Hacking migration control: Repurposing and reprogramming dep...Franck, Anja, 1973 Vigneswaran, Darshan Hacking migration control: Repurposing and reprogramming dep...
11Hacking deportability: How migrants change migration control...K. Franck, Anja, 1973 Vigneswaran, Darshan Hacking deportability: How migrants change migration control...
12Hacking delivery systems : exploring design tools for user-l...Davoli, Lorenzo Redström, Johan van der Vleuten, Ruben Hacking delivery systems : exploring design tools for user-l...
13Hacking Women’s HealthBalaam, Madeline Hansen, Lone Koefoed D’Ignazio, Catherine Simpson, Emma Hacking Women’s Health
14Hacking the Campus : Art and creative engagement to design a...Lundmark, Sofia, PhD Rodela, Romina, Ph.D. 1975- Hacking the Campus : Art and creative engagement to design a...
15Hacking for SustainabilityZapico Lamela, Jorge Luis Turpeinen, Marko Nils, Brandt Huang, Elaine, Dr. Hacking for Sustainability
16From hacking to simulation: Periodizing digitally-inspired s...Palmås, Karl, 1976From hacking to simulation: Periodizing digitally-inspired s...
17Inquiring Hacking as Politics. A New Departure in Hacker Stu...Söderberg, Johan, 1976Inquiring Hacking as Politics. A New Departure in Hacker Stu...
18Repurposing the hacker: Three cycles of recuperation in the ...Delfanti, Alessandro Söderberg, Johan, 1976 Repurposing the hacker: Three cycles of recuperation in the ...
19From Self-Tracking to Sleep-Hacking : Online Collaboration o...Karlgren, Kasper, 1994- Brown, Barry McMillan, Donald, 1981- From Self-Tracking to Sleep-Hacking : Online Collaboration o...
20Art, parasitic critique & hacking : Discussing international...Ølgaard, Daniel MøllerArt, parasitic critique & hacking : Discussing international...
21From Hacking to Making : The Commodification of Spanish DIY ...Cuartielles Ruiz, David García Sáez, César From Hacking to Making : The Commodification of Spanish DIY ...
22‘Life Hacking’ Everyday Temporality : Project Managing D...Dymek, Mikolaj, 1978-‘Life Hacking’ Everyday Temporality : Project Managing D...
23Play at work : Contested frames of hackingGarsten, ChristinaPlay at work : Contested frames of hacking
24Tracking and Hacking Sleep : Designing for lived experience ...Karlgren, Kasper, 1994- Brown, Barry, Professor McMillan, Donald, Associate Professor, 1981- Kirk, Dave, Professor Tracking and Hacking Sleep : Designing for lived experience ...
25Green Hackathon : Hacking for sustainable foodZapico, Jorge LuisGreen Hackathon : Hacking for sustainable food
26On-Campus Hands-On Ethical Hacking Course : Design, Deployme...Martucci, Leonardo, 1977- Magnusson, Jonathan Akil, Mahdi On-Campus Hands-On Ethical Hacking Course : Design, Deployme...
27P-hacking in academic research : a critical review of the jo...Ingre, Michael, 1965- Wiens, Stefan, Professor Nilsonne, Gustav, MD, PhD Eriksson, Kimmo, Professor P-hacking in academic research : a critical review of the jo...
28Fashion-able. Hacktivism and engaged fashion designVon Busch, Otto, 1975Fashion-able. Hacktivism and engaged fashion design
29The Practices of ProgrammingBergström, Ilias Blackwell, Alan F. The Practices of Programming
30'Zombies ahead!' A study of how hacked digital road signs de...Olofsson, Jennie'Zombies ahead!' A study of how hacked digital road signs de...
31Why Users Hack : Conflicting Interests and the Political Eco...Brown, Barry Vigren, Minna Rostami, Asreen, 1982- Glöss, Mareike Sibilla Why Users Hack : Conflicting Interests and the Political Eco...
32The Nordfront customer database-leak: A case studyFriberg von Sydow, Rikard, 1978-The Nordfront customer database-leak: A case study
33Humanizing Technology Through Post-Digital ArtSimbelis, Vygandas Vegas Höök, Kristina, 1964- Bowers, John Humanizing Technology Through Post-Digital Art
34Piracy and Social Change : Roundtable DiscussionAndersson Schwarz, Jonas, 1978- Burkart, Patrick Aufderheide, Patricia Jaszi, Peter Piracy and Social Change : Roundtable Discussion
35Book of Peer ProductionSöderberg, Johan, 1976Book of Peer Production
36Materializing infrastructures for participatory hackingDavoli, Lorenzo Redström, Johan Materializing infrastructures for participatory hacking
37Transtructures : prototyping transitional practices for the ...Davoli, Lorenzo, 1983- Redström, Johan, Professor Tonkinwise, Cameron, Professor Transtructures : prototyping transitional practices for the ...
38Alt. vs. Ctrl.: Editorial notes for the JoPP issue on Altern...Félix Tréguer, Félix Antoniadis, Panayotis Söderberg, Johan, 1976 Alt. vs. Ctrl.: Editorial notes for the JoPP issue on Altern...
39Hacking Limnology Workshop and DSOS22 : Creating a Community...Meyer, Michael F. Barbosa, Carolina C. Ladwig, Robert Mesman, Jorrit P., 1993- Hacking Limnology Workshop and DSOS22 : Creating a Community...
40Hacking Limnology Workshops and DSOS23 : Growing a Workforce...Meyer, Michael F. Harlan, Merritt E. Hensley, Robert T. Zhan, Qing Hacking Limnology Workshops and DSOS23 : Growing a Workforce...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 4.756.284 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 428 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2026 Illius Media