Works matching Computer hacking


Results: 1050
    1
    2
    3
    4
    5
    6
    7
    8
    10
    11
    12

    MR ROBOT: Hacking the Apocalypse.

    Published in:
    Journal for Religion, Film & Media, 2019, v. 5, n. 2, p. 15, doi. 10.25364/05.052019.2.2
    By:
    • Lynch, John
    Publication type:
    Article
    13

    A Legislator's Dilemma.

    Published in:
    IEEE Internet Computing, 2012, v. 16, n. 6, p. 78, doi. 10.1109/MIC.2012.127
    By:
    • Ruth, Stephen;
    • Stone, Samuel
    Publication type:
    Article
    14
    15
    16
    17
    18
    19
    20

    Breaching and Entering.

    Published in:
    Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
    By:
    • Din, Myra F.
    Publication type:
    Article
    21
    22
    23
    24

    Government Hacking.

    Published in:
    Yale Law Journal, 2018, v. 127, n. 3, p. 570
    By:
    • MAYER, JONATHAN
    Publication type:
    Article
    25
    26

    CYBERCRIME: IN DISGUISE CRIMES.

    Published in:
    Journal of Information Systems & Operations Management, 2016, v. 10, n. 1, p. 1
    By:
    • Gupta, Pranshu;
    • Mata-Toledo, Ramon A.
    Publication type:
    Article
    27
    28
    29
    30
    31
    32
    33
    34

    Freedom to Hack.

    Published in:
    Ohio State Law Journal, 2019, v. 80, n. 3, p. 455
    By:
    • KILOVATY, IDO
    Publication type:
    Article
    35
    36
    37

    Court of Appeal High Court.

    Published in:
    Journal of Criminal Law, 2018, v. 82, n. 4, p. 296, doi. 10.1177/0022018318791670
    By:
    • Davies, Gemma
    Publication type:
    Article
    38
    39
    40
    41
    42
    43
    44
    45

    Cyberwar Spotlight: Iran.

    Published in:
    Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 1, p. 8
    By:
    • Gewirtz, David
    Publication type:
    Article
    46
    47
    49
    50