Results 241 to 250 of about 188,146 (296)
Some of the next articles are maybe not open access.
Hacker Taggers: A new type of hackers
Information Systems Frontiers, 2009Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being the work of a hacker however little is known about hacker ...
Matthew Warren, Shona Leitch
openaire +1 more source
2020
How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the ...
Luca Follis, Adam Fish
openaire +2 more sources
How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the ...
Luca Follis, Adam Fish
openaire +2 more sources
IEEE Security & Privacy, 2003
The US Department of Homeland Security and the TSA have been attacked by their first hacker. He wasn't a terrorist; he wasn't out to take over the planes. He isn't even a criminal; he didn't try to extort money. He was a hacker, plain and simple. He wanted to test the security screeners' efficacy, to demonstrate that our airport security measures are ...
openaire +1 more source
The US Department of Homeland Security and the TSA have been attacked by their first hacker. He wasn't a terrorist; he wasn't out to take over the planes. He isn't even a criminal; he didn't try to extort money. He was a hacker, plain and simple. He wanted to test the security screeners' efficacy, to demonstrate that our airport security measures are ...
openaire +1 more source
Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
Decision Analysis, 2022Yong Wu, Mengyao Xu, Dong Cheng
exaly
2010
Il presente volume è finalizzato al raggiungimento di diversi obiettivi: operare una ricostruzione critica e unitaria del fenomeno degli hackers; superare le concezioni sensazionalistiche e superficiali che lo hanno travisato; analizzarne gli aspetti involutivi ed evolutivi mettendo in luce i profili giuridicamente rilevanti; valutare il contributo ...
openaire +1 more source
Il presente volume è finalizzato al raggiungimento di diversi obiettivi: operare una ricostruzione critica e unitaria del fenomeno degli hackers; superare le concezioni sensazionalistiche e superficiali che lo hanno travisato; analizzarne gli aspetti involutivi ed evolutivi mettendo in luce i profili giuridicamente rilevanti; valutare il contributo ...
openaire +1 more source

