Hacker States最新文献

筛选
英文 中文
When to Hack 何时入侵
Hacker States Pub Date : 1900-01-01 DOI: 10.7551/mitpress/11844.003.0004
{"title":"When to Hack","authors":"","doi":"10.7551/mitpress/11844.003.0004","DOIUrl":"https://doi.org/10.7551/mitpress/11844.003.0004","url":null,"abstract":"","PeriodicalId":197714,"journal":{"name":"Hacker States","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132935543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prosecuting a Hacker 起诉黑客
Hacker States Pub Date : 1900-01-01 DOI: 10.7551/mitpress/11844.003.0005
{"title":"Prosecuting a Hacker","authors":"","doi":"10.7551/mitpress/11844.003.0005","DOIUrl":"https://doi.org/10.7551/mitpress/11844.003.0005","url":null,"abstract":"","PeriodicalId":197714,"journal":{"name":"Hacker States","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126068060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Index 指数
Hacker States Pub Date : 1900-01-01 DOI: 10.7551/mitpress/11844.003.0010
{"title":"Index","authors":"","doi":"10.7551/mitpress/11844.003.0010","DOIUrl":"https://doi.org/10.7551/mitpress/11844.003.0010","url":null,"abstract":"","PeriodicalId":197714,"journal":{"name":"Hacker States","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hacking the State Boundary 入侵国家边界
Hacker States Pub Date : 1900-01-01 DOI: 10.7551/mitpress/11844.003.0003
{"title":"Hacking the State Boundary","authors":"","doi":"10.7551/mitpress/11844.003.0003","DOIUrl":"https://doi.org/10.7551/mitpress/11844.003.0003","url":null,"abstract":"","PeriodicalId":197714,"journal":{"name":"Hacker States","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133860214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hacking for Profit 黑客牟利
Hacker States Pub Date : 1900-01-01 DOI: 10.7551/mitpress/11844.003.0006
{"title":"Hacking for Profit","authors":"","doi":"10.7551/mitpress/11844.003.0006","DOIUrl":"https://doi.org/10.7551/mitpress/11844.003.0006","url":null,"abstract":"","PeriodicalId":197714,"journal":{"name":"Hacker States","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131230216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acknowledgments 致谢
Hacker States Pub Date : 1900-01-01 DOI: 10.7551/mitpress/11844.003.0001
{"title":"Acknowledgments","authors":"","doi":"10.7551/mitpress/11844.003.0001","DOIUrl":"https://doi.org/10.7551/mitpress/11844.003.0001","url":null,"abstract":"","PeriodicalId":197714,"journal":{"name":"Hacker States","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130164735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hacker States 黑客州
Hacker States Pub Date : 1900-01-01 DOI: 10.7551/mitpress/11844.003.0002
Luca Follis, Adam Fish
{"title":"Hacker States","authors":"Luca Follis, Adam Fish","doi":"10.7551/mitpress/11844.003.0002","DOIUrl":"https://doi.org/10.7551/mitpress/11844.003.0002","url":null,"abstract":"","PeriodicalId":197714,"journal":{"name":"Hacker States","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123918736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
High Breach Societies 高违约社团
Hacker States Pub Date : 1900-01-01 DOI: 10.7551/mitpress/11844.003.0007
{"title":"High Breach Societies","authors":"","doi":"10.7551/mitpress/11844.003.0007","DOIUrl":"https://doi.org/10.7551/mitpress/11844.003.0007","url":null,"abstract":"","PeriodicalId":197714,"journal":{"name":"Hacker States","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信