-
1
Análisis de seguridad de las redes inalámbricas en la carrera de Tecnologías de Información
Published 2021-08-01Subjects: “…auditorias; hacking; integridad; protocolos.…”
Get full text
Article -
2
Análisis de seguridad de las redes inalámbricas en la carrera de Tecnologías de Información
Published 2021-08-01Subjects: “…auditorias; hacking; integridad; protocolos.…”
Get full text
Article -
3
-
4
-
5
El contexto del debate contemporáneo en torno a la superación / recuperación de la epistemología
Published 2010-12-01Subjects: Get full text
Article -
6
Pathways to Criminal Hacking: Connecting Lived Experiences with Theoretical Explanations
Published 2024-12-01Subjects: Get full text
Article -
7
Digital Security in Human Security: A Case Study of the Bjorka Hacking Incident
Published 2024-09-01Subjects: Get full text
Article -
8
SEGURIDAD OFENSIVA MEDIANTE HACKING ÉTICO PARA FORTALECER INFRAESTRUCTURAS EN REDES DE TELECOMUNICACIONES
Published 2021-11-01Subjects: “…Hacking ético, seguridad de la información, ciberataques…”
Get full text
Article -
9
Glitch(ing)! A refusal and gateway to more caring techno-urban worlds?
Published 2025-06-01Subjects: Get full text
Article -
10
SEGURIDAD OFENSIVA MEDIANTE HACKING ÉTICO PARA FORTALECER INFRAESTRUCTURAS EN REDES DE TELECOMUNICACIONES
Published 2021-11-01Subjects: “…hacking ético, seguridad de la información, ciberataques…”
Get full text
Article -
11
Kriminológiai elméletek és informatikai bűnözés
Published 2021-07-01Subjects: “…hacking…”
Get full text
Article -
12
Status and Legal Consequences of Microchip Implantation with Emphasis on Civil Liability
Published 2023-11-01Subjects: Get full text
Article -
13
-
14
Leaking Network Devices with Rubber Ducky Attack
Published 2024-12-01Subjects: Get full text
Article -
15
-
16
Hacking in the University: Contesting the Valorisation of Academic Labour
Published 2013-11-01Subjects: “…hacking…”
Get full text
Article -
17
Realismo de entidades e descontinuidade da ciência
Published 2024-07-01Subjects: Get full text
Article -
18
<monospace>pwnobd</monospace>: Offensive Cybersecurity Toolkit for Vulnerability Analysis and Penetration Testing of OBD-II Devices
Published 2025-01-01Subjects: Get full text
Article -
19
Ready for Battle?: Legal Considerations for Upcoming AI Hacker and Vulnerability Issues
Published 2022-05-01Subjects: Get full text
Article -
20
Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks
Published 2025-03-01Subjects: “…Hacking…”
Get full text
Article