Showing 1 - 20 results of 23 for search '"The Hacker"', query time: 0.50s Refine Results
  1. 1
  2. 2
    by Rosén, Carl-Johan
    Published 2012
    Subjects: ...hacker...
    Get full text
    Others
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
    by Johansson, Björn
    Published 2018
    ... of a case studies on this group with the theoretical framework of John Warden. Hacker groups...
    Get full text
    Others
  10. 10
    by Ohlsson, Oliver
    Published 2013
    ... och mer viktig information såsom mail, sms och viktiga filer. För en hacker skulle det därför vara...
    Get full text
    Others
  11. 11
    by Johnsson, Daniel, Krohn, Lina
    Published 2019
    ... and vulnerabilities in devices, which could potentially be used by a hacker with the purpose of exploiting information...
    Get full text
    Others
  12. 12
    by Fransén, Johan, Sorlija, Adnan
    Published 2019
    ... an outside hacker does it to find the system vulnerabilities. This is done with an automated hacking tool...
    Get full text
    Others
  13. 13
  14. 14
  15. 15
    by Edblad, Linnea
    Published 2011
    ... lyckat slutresultat (Kotter, 2007, s.96; Washington and Hacker, 2005; Kitchen & Daly, 2002...
    Get full text
    Others
  16. 16
    by Bengtsson, Clara, Leikas, Nette
    Published 2018
    ... of hackers and cyber security professionals by researchers without further IT background. Thus...
    Get full text
    Others
  17. 17
    by EKBERG, JOAKIM
    Published 2013
    ...Detta examensarbete utfördes på uppdrag på Barefoot Hackers AB och syftade till att undersöka om...
    Get full text
    Others
  18. 18
    by Younan, Karam
    Published 2016
    ... that threats and attacks have also increased on smartphones. Hackers have focused their attacks on smartphones...
    Get full text
    Others
  19. 19
    by Svensson, Malin, Laurell, Jeanna
    Published 2014
    ... be aware of, for example hackers. Risk, security, trust and confidence are discussed and analyzed...
    Get full text
    Others
  20. 20
    by Hamlin, Jenny, Wall, Emelie
    Published 2018
    ... and more easily accessible information, that cyber hackers can penetrate. The audit process focuses more...
    Get full text
    Others