Works matching DE "COMPUTER hackers"


Results: 770
    1
    2

    Inquiring Hacking as Politics.

    Published in:
    Science, Technology & Human Values, 2017, v. 42, n. 5, p. 969, doi. 10.1177/0162243916688094
    By:
    • Söderberg, Johan
    Publication type:
    Article
    3
    4

    Hacker Trading.

    Published in:
    Style, 1999, v. 33, n. 2, p. 283
    By:
    • McKenzie, Jon
    Publication type:
    Article
    5
    6
    7

    IT Enabling: Essence of Virtual Organizations.

    Published in:
    International Journal of Information Technology & Decision Making, 2002, v. 1, n. 3, p. 367, doi. 10.1142/S0219622002000233
    By:
    • Tianfield, Huaglory;
    • Unland, Rainer
    Publication type:
    Article
    8
    9
    10
    11
    12

    Markov Chain Based Roaming Schemes for Honeypots.

    Published in:
    Wireless Personal Communications, 2014, v. 78, n. 2, p. 995, doi. 10.1007/s11277-014-1797-9
    By:
    • Tapaswi, Shashikala;
    • Mahboob, Adnan;
    • Shukla, Ajay;
    • Gupta, Ishan;
    • Verma, Pranshu;
    • Dhar, Joydip
    Publication type:
    Article
    13
    14
    15
    16
    17
    18

    Hacker.

    Published in:
    2006
    By:
    • Pike, Christina
    Publication type:
    Book Review
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28

    CRAFT(Y)NESS.

    Published in:
    British Journal of Criminology, 2015, v. 55, n. 1, p. 125, doi. 10.1093/bjc/azu061
    By:
    • STEINMETZ, KEVIN F.
    Publication type:
    Article
    29
    30

    NOVI KONCEPT MALICIOZNIH PROGRAMA.

    Published in:
    Singidunum Scientific Review / Singidunum Revija, 2011, v. 8, n. 1, p. 133
    By:
    • Grubor, Gojko;
    • Franc, Igor
    Publication type:
    Article
    31
    32

    MEDICAL DATA RISK EXPOSURE.

    Published in:
    Journal of Applied Electromagnetism, 2009, v. 11, n. 2, p. 26
    By:
    • Dimitrova, Tzveta
    Publication type:
    Article
    33
    34
    35
    36
    37
    38
    39

    Hacker Taggers: A new type of hackers.

    Published in:
    Information Systems Frontiers, 2010, v. 12, n. 4, p. 425, doi. 10.1007/s10796-009-9203-y
    By:
    • Warren, Matthew;
    • Leitch, Shona
    Publication type:
    Article
    40
    41
    42
    43
    44

    HACKING HOME LAND.

    Published in:
    Harvard Political Review, 2012, v. 39, n. 4, p. 11
    By:
    • Silver, Tom
    Publication type:
    Article
    45
    46
    47
    48
    49
    50