Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Hacking). Showing records 1 – 30 of 156 total matches.

[1] [2] [3] [4] [5] [6]

Search Limiters

Last 2 Years | English Only

Levels

Country

▼ Search Limiters

1. Zufferey, Eric. Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover : Changing workplace or society ? : Hackers between compliance with the social order and the will to innovate.

Degree: Docteur es, Sociologie, 2018, Université Lille I – Sciences et Technologies

Cette thèse vise à interroger le hacking comme source de changement social, voire de subversion de l’ordre social. En mettant en jeu une forme d’autodidaxie… (more)

Subjects/Keywords: Hacking; 303.484

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zufferey, E. (2018). Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover : Changing workplace or society ? : Hackers between compliance with the social order and the will to innovate. (Doctoral Dissertation). Université Lille I – Sciences et Technologies. Retrieved from http://www.theses.fr/2018LIL1A001

Chicago Manual of Style (16th Edition):

Zufferey, Eric. “Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover : Changing workplace or society ? : Hackers between compliance with the social order and the will to innovate.” 2018. Doctoral Dissertation, Université Lille I – Sciences et Technologies. Accessed September 29, 2020. http://www.theses.fr/2018LIL1A001.

MLA Handbook (7th Edition):

Zufferey, Eric. “Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover : Changing workplace or society ? : Hackers between compliance with the social order and the will to innovate.” 2018. Web. 29 Sep 2020.

Vancouver:

Zufferey E. Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover : Changing workplace or society ? : Hackers between compliance with the social order and the will to innovate. [Internet] [Doctoral dissertation]. Université Lille I – Sciences et Technologies; 2018. [cited 2020 Sep 29]. Available from: http://www.theses.fr/2018LIL1A001.

Council of Science Editors:

Zufferey E. Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover : Changing workplace or society ? : Hackers between compliance with the social order and the will to innovate. [Doctoral Dissertation]. Université Lille I – Sciences et Technologies; 2018. Available from: http://www.theses.fr/2018LIL1A001


Boston University

2. Peace, Breana. Examination of hacking and blunt force skeletal trauma.

Degree: MS, Forensic Anthropology, 2019, Boston University

 The present research examines the effects of multiple different implements on long bones to determine if there is a point at which blunt force trauma… (more)

Subjects/Keywords: Forensic anthropology; Hacking; Trauma

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peace, B. (2019). Examination of hacking and blunt force skeletal trauma. (Masters Thesis). Boston University. Retrieved from http://hdl.handle.net/2144/38688

Chicago Manual of Style (16th Edition):

Peace, Breana. “Examination of hacking and blunt force skeletal trauma.” 2019. Masters Thesis, Boston University. Accessed September 29, 2020. http://hdl.handle.net/2144/38688.

MLA Handbook (7th Edition):

Peace, Breana. “Examination of hacking and blunt force skeletal trauma.” 2019. Web. 29 Sep 2020.

Vancouver:

Peace B. Examination of hacking and blunt force skeletal trauma. [Internet] [Masters thesis]. Boston University; 2019. [cited 2020 Sep 29]. Available from: http://hdl.handle.net/2144/38688.

Council of Science Editors:

Peace B. Examination of hacking and blunt force skeletal trauma. [Masters Thesis]. Boston University; 2019. Available from: http://hdl.handle.net/2144/38688


Royal Roads University

3. Laur, Brandon. Information security’s perception of phishing tactics .

Degree: 2018, Royal Roads University

 This research develops qualitative knowledge from the information security industry about communication tactics as a type of security vulnerability in infosec. These perspectives included security… (more)

Subjects/Keywords: Cybersecurity; Hacking; Infosec; Phishing; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laur, B. (2018). Information security’s perception of phishing tactics . (Thesis). Royal Roads University. Retrieved from http://hdl.handle.net/10613/6696

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Laur, Brandon. “Information security’s perception of phishing tactics .” 2018. Thesis, Royal Roads University. Accessed September 29, 2020. http://hdl.handle.net/10613/6696.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Laur, Brandon. “Information security’s perception of phishing tactics .” 2018. Web. 29 Sep 2020.

Vancouver:

Laur B. Information security’s perception of phishing tactics . [Internet] [Thesis]. Royal Roads University; 2018. [cited 2020 Sep 29]. Available from: http://hdl.handle.net/10613/6696.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Laur B. Information security’s perception of phishing tactics . [Thesis]. Royal Roads University; 2018. Available from: http://hdl.handle.net/10613/6696

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

4. Lockridge, Timothy Alan. Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery.

Degree: PhD, Rhetoric and Writing, 2012, Virginia Tech

 This dissertation uses a case study of 2600: The Hacker Quarterly to consider how the practices of a hacker public might be theorized as a… (more)

Subjects/Keywords: Circulation; Hacking; Distribution; Memory; Delivery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lockridge, T. A. (2012). Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/77355

Chicago Manual of Style (16th Edition):

Lockridge, Timothy Alan. “Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery.” 2012. Doctoral Dissertation, Virginia Tech. Accessed September 29, 2020. http://hdl.handle.net/10919/77355.

MLA Handbook (7th Edition):

Lockridge, Timothy Alan. “Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery.” 2012. Web. 29 Sep 2020.

Vancouver:

Lockridge TA. Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery. [Internet] [Doctoral dissertation]. Virginia Tech; 2012. [cited 2020 Sep 29]. Available from: http://hdl.handle.net/10919/77355.

Council of Science Editors:

Lockridge TA. Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery. [Doctoral Dissertation]. Virginia Tech; 2012. Available from: http://hdl.handle.net/10919/77355


Halmstad University

5. Stenberg, Jan-Ola; Mujanovic, Erko. Samhällskonsekvenser av bristande IT-säkerhet.

Degree: Computer and Electrical Engineering (IDE), 2012, Halmstad University

Antalet företag, organisationer och instanser vars IT-system utsätts för attacker ökar. Något som märks trots att det försöker mörkläggas inom många organisationer. Myndigheter som… (more)

Subjects/Keywords: IT-säkerhet; Samhälle; Riskanalys; Hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stenberg, Jan-Ola; Mujanovic, E. (2012). Samhällskonsekvenser av bristande IT-säkerhet. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-19434

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Stenberg, Jan-Ola; Mujanovic, Erko. “Samhällskonsekvenser av bristande IT-säkerhet.” 2012. Thesis, Halmstad University. Accessed September 29, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-19434.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Stenberg, Jan-Ola; Mujanovic, Erko. “Samhällskonsekvenser av bristande IT-säkerhet.” 2012. Web. 29 Sep 2020.

Vancouver:

Stenberg, Jan-Ola; Mujanovic E. Samhällskonsekvenser av bristande IT-säkerhet. [Internet] [Thesis]. Halmstad University; 2012. [cited 2020 Sep 29]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-19434.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Stenberg, Jan-Ola; Mujanovic E. Samhällskonsekvenser av bristande IT-säkerhet. [Thesis]. Halmstad University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-19434

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

6. Koopari Roopkumar, Bharath Kumar. Ethical Hacking Using Penetration Testing.

Degree: MS, Electrical and Computer Engineering, 2014, Louisiana State University

 This thesis provides details of the hardware architecture and the software scripting, which are employed to demonstrate penetration testing in a laboratory setup. The architecture… (more)

Subjects/Keywords: penetration testing; network security; hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koopari Roopkumar, B. K. (2014). Ethical Hacking Using Penetration Testing. (Masters Thesis). Louisiana State University. Retrieved from etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238

Chicago Manual of Style (16th Edition):

Koopari Roopkumar, Bharath Kumar. “Ethical Hacking Using Penetration Testing.” 2014. Masters Thesis, Louisiana State University. Accessed September 29, 2020. etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238.

MLA Handbook (7th Edition):

Koopari Roopkumar, Bharath Kumar. “Ethical Hacking Using Penetration Testing.” 2014. Web. 29 Sep 2020.

Vancouver:

Koopari Roopkumar BK. Ethical Hacking Using Penetration Testing. [Internet] [Masters thesis]. Louisiana State University; 2014. [cited 2020 Sep 29]. Available from: etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238.

Council of Science Editors:

Koopari Roopkumar BK. Ethical Hacking Using Penetration Testing. [Masters Thesis]. Louisiana State University; 2014. Available from: etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238


University of Iowa

7. Thomas, Matthew A. Life hacking: a critical history, 2004-2014.

Degree: PhD, American Studies, 2015, University of Iowa

  This dissertation intervenes in the larger academic and popular discussion of hacking by looking at life hacking. In essence, life hacking presumes that your… (more)

Subjects/Keywords: hacking; life hacking; self-help; self-improvement; technology; work; American Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thomas, M. A. (2015). Life hacking: a critical history, 2004-2014. (Doctoral Dissertation). University of Iowa. Retrieved from https://ir.uiowa.edu/etd/5658

Chicago Manual of Style (16th Edition):

Thomas, Matthew A. “Life hacking: a critical history, 2004-2014.” 2015. Doctoral Dissertation, University of Iowa. Accessed September 29, 2020. https://ir.uiowa.edu/etd/5658.

MLA Handbook (7th Edition):

Thomas, Matthew A. “Life hacking: a critical history, 2004-2014.” 2015. Web. 29 Sep 2020.

Vancouver:

Thomas MA. Life hacking: a critical history, 2004-2014. [Internet] [Doctoral dissertation]. University of Iowa; 2015. [cited 2020 Sep 29]. Available from: https://ir.uiowa.edu/etd/5658.

Council of Science Editors:

Thomas MA. Life hacking: a critical history, 2004-2014. [Doctoral Dissertation]. University of Iowa; 2015. Available from: https://ir.uiowa.edu/etd/5658


UCLA

8. Sullivan, Robert Edward. The Geography of the Everyday.

Degree: Geography, 2012, UCLA

 Beginning with the premise that the everyday is constitutionally elusive, a mobile structure is formulated and then deployed to, if not capture the everyday, at… (more)

Subjects/Keywords: Geography; Everyday; Foucault; Goffman; Hacking; Reproduction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sullivan, R. E. (2012). The Geography of the Everyday. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/78d1h7b7

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sullivan, Robert Edward. “The Geography of the Everyday.” 2012. Thesis, UCLA. Accessed September 29, 2020. http://www.escholarship.org/uc/item/78d1h7b7.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sullivan, Robert Edward. “The Geography of the Everyday.” 2012. Web. 29 Sep 2020.

Vancouver:

Sullivan RE. The Geography of the Everyday. [Internet] [Thesis]. UCLA; 2012. [cited 2020 Sep 29]. Available from: http://www.escholarship.org/uc/item/78d1h7b7.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sullivan RE. The Geography of the Everyday. [Thesis]. UCLA; 2012. Available from: http://www.escholarship.org/uc/item/78d1h7b7

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

9. Maggs, Catherine. WikiLeaks and Communicative Counterpower .

Degree: 2015, University of Sydney

 WikiLeaks’ rise to prominence in 2010, with its release of classified U.S. government and military documents, polarised opinion worldwide; some viewed it as a cyber-terrorist… (more)

Subjects/Keywords: WikiLeaks; counterpower; communication; networks; social agency; hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maggs, C. (2015). WikiLeaks and Communicative Counterpower . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/13511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Maggs, Catherine. “WikiLeaks and Communicative Counterpower .” 2015. Thesis, University of Sydney. Accessed September 29, 2020. http://hdl.handle.net/2123/13511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Maggs, Catherine. “WikiLeaks and Communicative Counterpower .” 2015. Web. 29 Sep 2020.

Vancouver:

Maggs C. WikiLeaks and Communicative Counterpower . [Internet] [Thesis]. University of Sydney; 2015. [cited 2020 Sep 29]. Available from: http://hdl.handle.net/2123/13511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Maggs C. WikiLeaks and Communicative Counterpower . [Thesis]. University of Sydney; 2015. Available from: http://hdl.handle.net/2123/13511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Alberta

10. Larocque, Rachelle MJ. Serials: The contested and contextual meanings of seriality.

Degree: MA, Department of Sociology, 2009, University of Alberta

 Systems of classifications are socially created and historically contingent. New classifications lead to the creation of new categories, new objects and new kinds of people.… (more)

Subjects/Keywords: murder; monogamy; seriality; Hacking; arson; classification; genealogy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Larocque, R. M. (2009). Serials: The contested and contextual meanings of seriality. (Masters Thesis). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/7m01bk92k

Chicago Manual of Style (16th Edition):

Larocque, Rachelle MJ. “Serials: The contested and contextual meanings of seriality.” 2009. Masters Thesis, University of Alberta. Accessed September 29, 2020. https://era.library.ualberta.ca/files/7m01bk92k.

MLA Handbook (7th Edition):

Larocque, Rachelle MJ. “Serials: The contested and contextual meanings of seriality.” 2009. Web. 29 Sep 2020.

Vancouver:

Larocque RM. Serials: The contested and contextual meanings of seriality. [Internet] [Masters thesis]. University of Alberta; 2009. [cited 2020 Sep 29]. Available from: https://era.library.ualberta.ca/files/7m01bk92k.

Council of Science Editors:

Larocque RM. Serials: The contested and contextual meanings of seriality. [Masters Thesis]. University of Alberta; 2009. Available from: https://era.library.ualberta.ca/files/7m01bk92k

11. Bolgan, Samuela. Securing cyberspace: development and evaluation of a novel research toolset.

Degree: Doctoral Thesis, Psychology, 2018, Abertay University

 Cybersecurity is an issue of great concern today; data breaches are becoming more frequent and are causing huge economic losses in almost all the industry… (more)

Subjects/Keywords: Cognitive psychology; Ethical hacking; Individual differences; Systemizing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bolgan, S. (2018). Securing cyberspace: development and evaluation of a novel research toolset. (Thesis). Abertay University. Retrieved from https://rke.abertay.ac.uk/en/studentTheses/fec61742-8054-42f3-8bcf-cfd0491fa4e2

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bolgan, Samuela. “Securing cyberspace: development and evaluation of a novel research toolset.” 2018. Thesis, Abertay University. Accessed September 29, 2020. https://rke.abertay.ac.uk/en/studentTheses/fec61742-8054-42f3-8bcf-cfd0491fa4e2.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bolgan, Samuela. “Securing cyberspace: development and evaluation of a novel research toolset.” 2018. Web. 29 Sep 2020.

Vancouver:

Bolgan S. Securing cyberspace: development and evaluation of a novel research toolset. [Internet] [Thesis]. Abertay University; 2018. [cited 2020 Sep 29]. Available from: https://rke.abertay.ac.uk/en/studentTheses/fec61742-8054-42f3-8bcf-cfd0491fa4e2.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bolgan S. Securing cyberspace: development and evaluation of a novel research toolset. [Thesis]. Abertay University; 2018. Available from: https://rke.abertay.ac.uk/en/studentTheses/fec61742-8054-42f3-8bcf-cfd0491fa4e2

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Toronto

12. Xu, Feihu. Practical Issues in Quantum Cryptography.

Degree: 2012, University of Toronto

Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of quantum physics. Unfortunately, real-life implementations of a QKD system may contain… (more)

Subjects/Keywords: Quantum Hacking; Quantum random number generator; 0544

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, F. (2012). Practical Issues in Quantum Cryptography. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/32641

Chicago Manual of Style (16th Edition):

Xu, Feihu. “Practical Issues in Quantum Cryptography.” 2012. Masters Thesis, University of Toronto. Accessed September 29, 2020. http://hdl.handle.net/1807/32641.

MLA Handbook (7th Edition):

Xu, Feihu. “Practical Issues in Quantum Cryptography.” 2012. Web. 29 Sep 2020.

Vancouver:

Xu F. Practical Issues in Quantum Cryptography. [Internet] [Masters thesis]. University of Toronto; 2012. [cited 2020 Sep 29]. Available from: http://hdl.handle.net/1807/32641.

Council of Science Editors:

Xu F. Practical Issues in Quantum Cryptography. [Masters Thesis]. University of Toronto; 2012. Available from: http://hdl.handle.net/1807/32641


University of New South Wales

13. Creech, Gideon. Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks.

Degree: Engineering & Information Technology, 2014, University of New South Wales

 Current anomaly host-based intrusion detection systems are limited in accuracy with any increase in detection rate resulting in a corresponding increase in false alarm rate.… (more)

Subjects/Keywords: Hacking; Intrusion detection; Zero-day attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Creech, G. (2014). Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/53218 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11913/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Creech, Gideon. “Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks.” 2014. Doctoral Dissertation, University of New South Wales. Accessed September 29, 2020. http://handle.unsw.edu.au/1959.4/53218 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11913/SOURCE02?view=true.

MLA Handbook (7th Edition):

Creech, Gideon. “Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks.” 2014. Web. 29 Sep 2020.

Vancouver:

Creech G. Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks. [Internet] [Doctoral dissertation]. University of New South Wales; 2014. [cited 2020 Sep 29]. Available from: http://handle.unsw.edu.au/1959.4/53218 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11913/SOURCE02?view=true.

Council of Science Editors:

Creech G. Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks. [Doctoral Dissertation]. University of New South Wales; 2014. Available from: http://handle.unsw.edu.au/1959.4/53218 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11913/SOURCE02?view=true


Universiteit Utrecht

14. Juffermans, P.M. Hacking History: attachement.

Degree: 2016, Universiteit Utrecht

Subjects/Keywords: Hacking History; attachement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Juffermans, P. M. (2016). Hacking History: attachement. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/328484

Chicago Manual of Style (16th Edition):

Juffermans, P M. “Hacking History: attachement.” 2016. Masters Thesis, Universiteit Utrecht. Accessed September 29, 2020. http://dspace.library.uu.nl:8080/handle/1874/328484.

MLA Handbook (7th Edition):

Juffermans, P M. “Hacking History: attachement.” 2016. Web. 29 Sep 2020.

Vancouver:

Juffermans PM. Hacking History: attachement. [Internet] [Masters thesis]. Universiteit Utrecht; 2016. [cited 2020 Sep 29]. Available from: http://dspace.library.uu.nl:8080/handle/1874/328484.

Council of Science Editors:

Juffermans PM. Hacking History: attachement. [Masters Thesis]. Universiteit Utrecht; 2016. Available from: http://dspace.library.uu.nl:8080/handle/1874/328484


Brunel University

15. Meades, Alan Frederick. Playing against the grain : rhetorics of counterplay in console based first-person shooter videogames.

Degree: PhD, 2013, Brunel University

 Counterplay is a way of playing digital games that opposes the encoded algorithms that define their appropriate use and interaction. Counterplay is often manifested within… (more)

Subjects/Keywords: 700; Hacking; Cheating; Modding; Grief play

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meades, A. F. (2013). Playing against the grain : rhetorics of counterplay in console based first-person shooter videogames. (Doctoral Dissertation). Brunel University. Retrieved from http://bura.brunel.ac.uk/handle/2438/14139 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.573602

Chicago Manual of Style (16th Edition):

Meades, Alan Frederick. “Playing against the grain : rhetorics of counterplay in console based first-person shooter videogames.” 2013. Doctoral Dissertation, Brunel University. Accessed September 29, 2020. http://bura.brunel.ac.uk/handle/2438/14139 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.573602.

MLA Handbook (7th Edition):

Meades, Alan Frederick. “Playing against the grain : rhetorics of counterplay in console based first-person shooter videogames.” 2013. Web. 29 Sep 2020.

Vancouver:

Meades AF. Playing against the grain : rhetorics of counterplay in console based first-person shooter videogames. [Internet] [Doctoral dissertation]. Brunel University; 2013. [cited 2020 Sep 29]. Available from: http://bura.brunel.ac.uk/handle/2438/14139 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.573602.

Council of Science Editors:

Meades AF. Playing against the grain : rhetorics of counterplay in console based first-person shooter videogames. [Doctoral Dissertation]. Brunel University; 2013. Available from: http://bura.brunel.ac.uk/handle/2438/14139 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.573602

16. Maghrebi, Houssem. Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques : Masking countermeasures against HO-DPA : security evaluation and enhancement by specific mask encodings.

Degree: Docteur es, Electronique et communications, 2012, Paris, ENST

Les circuits électroniques réalisés avec les méthodes de conception assisté par ordinateur usuelles présentent une piètre résistance par rapport aux attaques physiques. Parmi les attaques… (more)

Subjects/Keywords: Robustesse système; Piratage informatique; System robustness; Hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maghrebi, H. (2012). Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques : Masking countermeasures against HO-DPA : security evaluation and enhancement by specific mask encodings. (Doctoral Dissertation). Paris, ENST. Retrieved from http://www.theses.fr/2012ENST0083

Chicago Manual of Style (16th Edition):

Maghrebi, Houssem. “Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques : Masking countermeasures against HO-DPA : security evaluation and enhancement by specific mask encodings.” 2012. Doctoral Dissertation, Paris, ENST. Accessed September 29, 2020. http://www.theses.fr/2012ENST0083.

MLA Handbook (7th Edition):

Maghrebi, Houssem. “Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques : Masking countermeasures against HO-DPA : security evaluation and enhancement by specific mask encodings.” 2012. Web. 29 Sep 2020.

Vancouver:

Maghrebi H. Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques : Masking countermeasures against HO-DPA : security evaluation and enhancement by specific mask encodings. [Internet] [Doctoral dissertation]. Paris, ENST; 2012. [cited 2020 Sep 29]. Available from: http://www.theses.fr/2012ENST0083.

Council of Science Editors:

Maghrebi H. Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques : Masking countermeasures against HO-DPA : security evaluation and enhancement by specific mask encodings. [Doctoral Dissertation]. Paris, ENST; 2012. Available from: http://www.theses.fr/2012ENST0083


Georgia State University

17. Artrip, Aaron. A Series of Quiet Decisions.

Degree: MFA, Art and Design, 2019, Georgia State University

  A Series of Quiet Decisions is a set of prints and an installation documenting my examination of sound. A center piece containing a modified… (more)

Subjects/Keywords: Sound; Vibration; Drawing; Cyanotype; Listening; Viewing; Hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Artrip, A. (2019). A Series of Quiet Decisions. (Thesis). Georgia State University. Retrieved from https://scholarworks.gsu.edu/art_design_theses/255

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Artrip, Aaron. “A Series of Quiet Decisions.” 2019. Thesis, Georgia State University. Accessed September 29, 2020. https://scholarworks.gsu.edu/art_design_theses/255.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Artrip, Aaron. “A Series of Quiet Decisions.” 2019. Web. 29 Sep 2020.

Vancouver:

Artrip A. A Series of Quiet Decisions. [Internet] [Thesis]. Georgia State University; 2019. [cited 2020 Sep 29]. Available from: https://scholarworks.gsu.edu/art_design_theses/255.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Artrip A. A Series of Quiet Decisions. [Thesis]. Georgia State University; 2019. Available from: https://scholarworks.gsu.edu/art_design_theses/255

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Farropas, Vitor Manuel Sousa. Proposta de plataforma para o ensino de técnicas de hacking em ambiente de laboratório virtualizado, baseada em tecnologias abertas e de baixo custo.

Degree: 2015, RCAAP

 Esta dissertação apresenta, de uma forma enquadrada, a implementação de uma solução prática para o ensino de técnicas de hacking. Esta consiste no desenvolvimento de… (more)

Subjects/Keywords: Ensino; Hacking; Cibersegurança; Técnicas de hacking; Plataforma de ensino; Ensino à distância

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farropas, V. M. S. (2015). Proposta de plataforma para o ensino de técnicas de hacking em ambiente de laboratório virtualizado, baseada em tecnologias abertas e de baixo custo. (Thesis). RCAAP. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4719

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Farropas, Vitor Manuel Sousa. “Proposta de plataforma para o ensino de técnicas de hacking em ambiente de laboratório virtualizado, baseada em tecnologias abertas e de baixo custo.” 2015. Thesis, RCAAP. Accessed September 29, 2020. https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4719.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Farropas, Vitor Manuel Sousa. “Proposta de plataforma para o ensino de técnicas de hacking em ambiente de laboratório virtualizado, baseada em tecnologias abertas e de baixo custo.” 2015. Web. 29 Sep 2020.

Vancouver:

Farropas VMS. Proposta de plataforma para o ensino de técnicas de hacking em ambiente de laboratório virtualizado, baseada em tecnologias abertas e de baixo custo. [Internet] [Thesis]. RCAAP; 2015. [cited 2020 Sep 29]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4719.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Farropas VMS. Proposta de plataforma para o ensino de técnicas de hacking em ambiente de laboratório virtualizado, baseada em tecnologias abertas e de baixo custo. [Thesis]. RCAAP; 2015. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4719

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

19. Norrman, Erik. Growth hacking : Cyberrymdens marknadsföringsverktyg.

Degree: Organisation and Entrepreneurship, 2015, Linnaeus University

Bakgrund: De senaste åren har ett nytt begrepp uppkommit som ett alternativ till onlinemarknadsföring – Growth hacking. På grund av att growth hacking är… (more)

Subjects/Keywords: Start-ups; growth hacking; online marketing; growth; Growth hacking; Tillväxt; Startups; onlinemarknadsföring; Business Administration; Företagsekonomi

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Norrman, E. (2015). Growth hacking : Cyberrymdens marknadsföringsverktyg. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Norrman, Erik. “Growth hacking : Cyberrymdens marknadsföringsverktyg.” 2015. Thesis, Linnaeus University. Accessed September 29, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Norrman, Erik. “Growth hacking : Cyberrymdens marknadsföringsverktyg.” 2015. Web. 29 Sep 2020.

Vancouver:

Norrman E. Growth hacking : Cyberrymdens marknadsföringsverktyg. [Internet] [Thesis]. Linnaeus University; 2015. [cited 2020 Sep 29]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Norrman E. Growth hacking : Cyberrymdens marknadsföringsverktyg. [Thesis]. Linnaeus University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

20. Maloušek, Zdeněk. Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN: Application for monitoring and controlling the security of large LAN and WAN computer networks.

Degree: 2019, Brno University of Technology

 Computer networks are used in much wider extent than 20 years ago. People use the computer mainly for communication, entertainment and data storage. Information is… (more)

Subjects/Keywords: zabezpečení počítačových sítí; proxy; firewall; hacking; Perl; network security; proxy; firewall; hacking; Perl

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maloušek, Z. (2019). Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN: Application for monitoring and controlling the security of large LAN and WAN computer networks. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/16936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Maloušek, Zdeněk. “Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN: Application for monitoring and controlling the security of large LAN and WAN computer networks.” 2019. Thesis, Brno University of Technology. Accessed September 29, 2020. http://hdl.handle.net/11012/16936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Maloušek, Zdeněk. “Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN: Application for monitoring and controlling the security of large LAN and WAN computer networks.” 2019. Web. 29 Sep 2020.

Vancouver:

Maloušek Z. Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN: Application for monitoring and controlling the security of large LAN and WAN computer networks. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Sep 29]. Available from: http://hdl.handle.net/11012/16936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Maloušek Z. Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN: Application for monitoring and controlling the security of large LAN and WAN computer networks. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/16936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Nascimento Duarte, Bárbara. O futuro do corpo : tecnociência, pirataria e metamorfose : L'avenir du corps : technoscience, piratage et métamorphose.

Degree: Docteur es, Sociologie, 2015, Strasbourg; Universidade federal de Juiz de Fora (Juiz de Fora, Brésil)

Dans l’ère technoscientifique la valeur du corps est directement liée à sa production rationnelle produit dans les laboratoires scientifiques. Notre investigation empirique cherche à découvrir… (more)

Subjects/Keywords: Body hacking; Corps; Technoscience; Métamorphose; Implants; Amélioration humaine; Body hacking; Body; Technoscience; Metamorphosis; Implants; Human enhancement; Body hacking; Corpo; Tecnociência; Metamorfose; Implantes; Aperfeiçoamento humano; 306.45; 306.46

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nascimento Duarte, B. (2015). O futuro do corpo : tecnociência, pirataria e metamorfose : L'avenir du corps : technoscience, piratage et métamorphose. (Doctoral Dissertation). Strasbourg; Universidade federal de Juiz de Fora (Juiz de Fora, Brésil). Retrieved from http://www.theses.fr/2015STRAG017

Chicago Manual of Style (16th Edition):

Nascimento Duarte, Bárbara. “O futuro do corpo : tecnociência, pirataria e metamorfose : L'avenir du corps : technoscience, piratage et métamorphose.” 2015. Doctoral Dissertation, Strasbourg; Universidade federal de Juiz de Fora (Juiz de Fora, Brésil). Accessed September 29, 2020. http://www.theses.fr/2015STRAG017.

MLA Handbook (7th Edition):

Nascimento Duarte, Bárbara. “O futuro do corpo : tecnociência, pirataria e metamorfose : L'avenir du corps : technoscience, piratage et métamorphose.” 2015. Web. 29 Sep 2020.

Vancouver:

Nascimento Duarte B. O futuro do corpo : tecnociência, pirataria e metamorfose : L'avenir du corps : technoscience, piratage et métamorphose. [Internet] [Doctoral dissertation]. Strasbourg; Universidade federal de Juiz de Fora (Juiz de Fora, Brésil); 2015. [cited 2020 Sep 29]. Available from: http://www.theses.fr/2015STRAG017.

Council of Science Editors:

Nascimento Duarte B. O futuro do corpo : tecnociência, pirataria e metamorfose : L'avenir du corps : technoscience, piratage et métamorphose. [Doctoral Dissertation]. Strasbourg; Universidade federal de Juiz de Fora (Juiz de Fora, Brésil); 2015. Available from: http://www.theses.fr/2015STRAG017


KTH

22. Sjödin, Andreas. The ADS-B protocol and its'weaknesses : Exploring potential attack vectors.

Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH

ADS-B är ett protokoll som används över hela världen för att piloter och flygledning ska få en bättre bild över trafiksituationen i luften.Tidigare studier… (more)

Subjects/Keywords: ADS-B; Air Safety; Hacking; OSSTMM3; Pentesting;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sjödin, A. (2020). The ADS-B protocol and its'weaknesses : Exploring potential attack vectors. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sjödin, Andreas. “The ADS-B protocol and its'weaknesses : Exploring potential attack vectors.” 2020. Thesis, KTH. Accessed September 29, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sjödin, Andreas. “The ADS-B protocol and its'weaknesses : Exploring potential attack vectors.” 2020. Web. 29 Sep 2020.

Vancouver:

Sjödin A. The ADS-B protocol and its'weaknesses : Exploring potential attack vectors. [Internet] [Thesis]. KTH; 2020. [cited 2020 Sep 29]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sjödin A. The ADS-B protocol and its'weaknesses : Exploring potential attack vectors. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

23. Tsai, Ju-han. Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.

Degree: Master, Information Management, 2010, NSYSU

 Given that computer hacking cause huge loss among firms, itâs necessary to understand how individuals engage to commit it. Most of previous research on computer… (more)

Subjects/Keywords: Severity Level of Computer Hacking; Punishment Certainty; Punishment Severity; Moral Intensity; Social Learning Theory; Intrinsic Motivation; Computer Hacking; Extrinsic Motivation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, J. (2010). Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Ju-han. “Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.” 2010. Thesis, NSYSU. Accessed September 29, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Ju-han. “Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.” 2010. Web. 29 Sep 2020.

Vancouver:

Tsai J. Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level. [Internet] [Thesis]. NSYSU; 2010. [cited 2020 Sep 29]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai J. Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

24. Čapek, Jan. Zabezpečení online aplikací typu klient-server: Security of Online Client-Server Applications.

Degree: 2018, Brno University of Technology

 This thesis is dedicated to security of client-server applications running on Windows platform. In the beginning chapters it is possible to find motivation, about why… (more)

Subjects/Keywords: Bezpečnost aplikací Klient-Server; Anti-Hacking; Anti-Debugging; Windows; AMD64; Client-Server Security; Anti-Hacking; Anti-Debugging; Windows; AMD64

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Čapek, J. (2018). Zabezpečení online aplikací typu klient-server: Security of Online Client-Server Applications. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/84871

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Čapek, Jan. “Zabezpečení online aplikací typu klient-server: Security of Online Client-Server Applications.” 2018. Thesis, Brno University of Technology. Accessed September 29, 2020. http://hdl.handle.net/11012/84871.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Čapek, Jan. “Zabezpečení online aplikací typu klient-server: Security of Online Client-Server Applications.” 2018. Web. 29 Sep 2020.

Vancouver:

Čapek J. Zabezpečení online aplikací typu klient-server: Security of Online Client-Server Applications. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Sep 29]. Available from: http://hdl.handle.net/11012/84871.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Čapek J. Zabezpečení online aplikací typu klient-server: Security of Online Client-Server Applications. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/84871

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Florida

25. Howell, Christian Jordan-Michael. The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System.

Degree: 2016, University of South Florida

 System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system… (more)

Subjects/Keywords: Cybercrime; Particularistic restrictive deterrence; Hacking; Hackers; Cybercrime; Particularistic restrictive deterrence; Hacking; Hackers; System trespassers; Criminology and Criminal Justice

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Howell, C. J. (2016). The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/6259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Howell, Christian Jordan-Michael. “The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System.” 2016. Thesis, University of South Florida. Accessed September 29, 2020. https://scholarcommons.usf.edu/etd/6259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Howell, Christian Jordan-Michael. “The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System.” 2016. Web. 29 Sep 2020.

Vancouver:

Howell CJ. The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System. [Internet] [Thesis]. University of South Florida; 2016. [cited 2020 Sep 29]. Available from: https://scholarcommons.usf.edu/etd/6259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Howell CJ. The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System. [Thesis]. University of South Florida; 2016. Available from: https://scholarcommons.usf.edu/etd/6259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


UCLA

26. Currie, Morgan Elisabeth. The Data-fication of Openness - The Practices and Policies of Open Government Data in Los Angeles.

Degree: Information Studies, 2016, UCLA

 This dissertation explores the emergence of open government data in the City of Los Angeles and its implications for governance and citizen involvement. Open government… (more)

Subjects/Keywords: Information science; civic hacking; data; infrastructure; los angeles; open; transparency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Currie, M. E. (2016). The Data-fication of Openness - The Practices and Policies of Open Government Data in Los Angeles. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/4xn3832z

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Currie, Morgan Elisabeth. “The Data-fication of Openness - The Practices and Policies of Open Government Data in Los Angeles.” 2016. Thesis, UCLA. Accessed September 29, 2020. http://www.escholarship.org/uc/item/4xn3832z.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Currie, Morgan Elisabeth. “The Data-fication of Openness - The Practices and Policies of Open Government Data in Los Angeles.” 2016. Web. 29 Sep 2020.

Vancouver:

Currie ME. The Data-fication of Openness - The Practices and Policies of Open Government Data in Los Angeles. [Internet] [Thesis]. UCLA; 2016. [cited 2020 Sep 29]. Available from: http://www.escholarship.org/uc/item/4xn3832z.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Currie ME. The Data-fication of Openness - The Practices and Policies of Open Government Data in Los Angeles. [Thesis]. UCLA; 2016. Available from: http://www.escholarship.org/uc/item/4xn3832z

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

27. Velthoven, Luke van. Hacking in het nieuws. Frames die aan hackers worden toegekend op de Nederlandse sites NU.nl en Tweakers.

Degree: 2013, Leiden University

Subjects/Keywords: framing; berichtgeving; hacking; media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Velthoven, L. v. (2013). Hacking in het nieuws. Frames die aan hackers worden toegekend op de Nederlandse sites NU.nl en Tweakers. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/29392

Chicago Manual of Style (16th Edition):

Velthoven, Luke van. “Hacking in het nieuws. Frames die aan hackers worden toegekend op de Nederlandse sites NU.nl en Tweakers.” 2013. Masters Thesis, Leiden University. Accessed September 29, 2020. http://hdl.handle.net/1887/29392.

MLA Handbook (7th Edition):

Velthoven, Luke van. “Hacking in het nieuws. Frames die aan hackers worden toegekend op de Nederlandse sites NU.nl en Tweakers.” 2013. Web. 29 Sep 2020.

Vancouver:

Velthoven Lv. Hacking in het nieuws. Frames die aan hackers worden toegekend op de Nederlandse sites NU.nl en Tweakers. [Internet] [Masters thesis]. Leiden University; 2013. [cited 2020 Sep 29]. Available from: http://hdl.handle.net/1887/29392.

Council of Science Editors:

Velthoven Lv. Hacking in het nieuws. Frames die aan hackers worden toegekend op de Nederlandse sites NU.nl en Tweakers. [Masters Thesis]. Leiden University; 2013. Available from: http://hdl.handle.net/1887/29392


University of New South Wales

28. Harle, Joshua. Emerging topologies: maps and tours of augmented space.

Degree: Design Studies, 2013, University of New South Wales

 Under the title “Emerging Topologies”, this thesis draws together theories conceptualising space (Michel de Certeau's tactical and strategic) and theories spatialisating concepts (Gilles Deleuze and… (more)

Subjects/Keywords: Technology; De Certeau; Space; Built Environment; Augmented Reality; Videogames; Hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harle, J. (2013). Emerging topologies: maps and tours of augmented space. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/53387 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12082/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Harle, Joshua. “Emerging topologies: maps and tours of augmented space.” 2013. Doctoral Dissertation, University of New South Wales. Accessed September 29, 2020. http://handle.unsw.edu.au/1959.4/53387 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12082/SOURCE02?view=true.

MLA Handbook (7th Edition):

Harle, Joshua. “Emerging topologies: maps and tours of augmented space.” 2013. Web. 29 Sep 2020.

Vancouver:

Harle J. Emerging topologies: maps and tours of augmented space. [Internet] [Doctoral dissertation]. University of New South Wales; 2013. [cited 2020 Sep 29]. Available from: http://handle.unsw.edu.au/1959.4/53387 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12082/SOURCE02?view=true.

Council of Science Editors:

Harle J. Emerging topologies: maps and tours of augmented space. [Doctoral Dissertation]. University of New South Wales; 2013. Available from: http://handle.unsw.edu.au/1959.4/53387 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12082/SOURCE02?view=true


Universidade de Lisboa

29. Alves, Fernando Baptista Leal. Vulnerability discovery in power line communications.

Degree: 2015, Universidade de Lisboa

Tese de mestrado, Engenharia Informática (Arquitectura, Sistemas e Redes de Computadores), Universidade de Lisboa, Faculdade de Ciências, 2015

A comunicação em powerline é uma forma… (more)

Subjects/Keywords: Powerline; Segurança; Chaves criptográficas; Hacking; Teses de mestrado - 2015

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alves, F. B. L. (2015). Vulnerability discovery in power line communications. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/20154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alves, Fernando Baptista Leal. “Vulnerability discovery in power line communications.” 2015. Thesis, Universidade de Lisboa. Accessed September 29, 2020. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/20154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alves, Fernando Baptista Leal. “Vulnerability discovery in power line communications.” 2015. Web. 29 Sep 2020.

Vancouver:

Alves FBL. Vulnerability discovery in power line communications. [Internet] [Thesis]. Universidade de Lisboa; 2015. [cited 2020 Sep 29]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/20154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alves FBL. Vulnerability discovery in power line communications. [Thesis]. Universidade de Lisboa; 2015. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/20154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Helsinki

30. Loughney, Melanie Denise. Media Reform Groups: How they work post 2011 phone-hacking scandal in the United Kingdom.

Degree: Statsvetenskapliga fakulteten, 2018, University of Helsinki

 Media reform groups in the United Kingdom post 2011 phone-hacking scandal face many challenges. This thesis studies how some of these media reform groups work,… (more)

Subjects/Keywords: media reform; phone hacking; phone hacking scandal; media ownership; journalistic ethics; ethical regulation; journalism; power; media; media reform campaigns; media reform; phone hacking; phone hacking scandal; media ownership; journalistic ethics; ethical regulation; journalism; power; media; media reform campaigns

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Loughney, M. D. (2018). Media Reform Groups: How they work post 2011 phone-hacking scandal in the United Kingdom. (Masters Thesis). University of Helsinki. Retrieved from http://hdl.handle.net/10138/236933

Chicago Manual of Style (16th Edition):

Loughney, Melanie Denise. “Media Reform Groups: How they work post 2011 phone-hacking scandal in the United Kingdom.” 2018. Masters Thesis, University of Helsinki. Accessed September 29, 2020. http://hdl.handle.net/10138/236933.

MLA Handbook (7th Edition):

Loughney, Melanie Denise. “Media Reform Groups: How they work post 2011 phone-hacking scandal in the United Kingdom.” 2018. Web. 29 Sep 2020.

Vancouver:

Loughney MD. Media Reform Groups: How they work post 2011 phone-hacking scandal in the United Kingdom. [Internet] [Masters thesis]. University of Helsinki; 2018. [cited 2020 Sep 29]. Available from: http://hdl.handle.net/10138/236933.

Council of Science Editors:

Loughney MD. Media Reform Groups: How they work post 2011 phone-hacking scandal in the United Kingdom. [Masters Thesis]. University of Helsinki; 2018. Available from: http://hdl.handle.net/10138/236933

[1] [2] [3] [4] [5] [6]

.