Security hacker (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Security hacker" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
11th place
8th place
1st place
1st place
3,959th place
3,208th place
34th place
27th place
5th place
5th place
6th place
6th place
7th place
7th place
36th place
33rd place
low place
low place
low place
low place
146th place
110th place
low place
low place
61st place
54th place
652nd place
515th place
1,336th place
769th place
1,060th place
700th place
272nd place
225th place
low place
low place
3,812th place
3,173rd place
20th place
30th place
484th place
323rd place
220th place
155th place
92nd place
72nd place
low place
7,385th place
low place
low place
low place
low place
low place
low place
8th place
10th place
2,213th place
1,495th place
2,755th place
1,753rd place
3rd place
3rd place
204th place
353rd place
3,288th place
4,712th place
low place
low place
4,963rd place
7,139th place

archive.org

bbc.co.uk

bbc.com

books.google.com

carnegieendowment.org

catb.org

cnbc.com

cnet.com

news.cnet.com

computerhistory.org

defcon.org

doi.org

doi.org

  • Gao, Xing (2015). "Information security investment for competitive firms with hacker behavior and security requirements". Annals of Operations Research. 235: 277–300. doi:10.1007/s10479-015-1925-2. S2CID 207085416.
  • Bailey, David (April 1984). "Attacks on Computers: Congressional Hearings and Pending Legislation". 1984 IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE. pp. 180–186. doi:10.1109/SP.1984.10012. ISBN 978-0-8186-0532-1. S2CID 15187375.
  • Caldwell, Tracey (July 22, 2011). "Ethical hackers: putting on the white hat". Network Security. 2011 (7): 10–13. doi:10.1016/s1353-4858(11)70075-7.
  • Okpa, John Thompson; Ugwuoke, Christopher Uchechukwu; Ajah, Benjamin Okorie; Eshioste, Emmanuel; Igbe, Joseph Egidi; Ajor, Ogar James; Okoi, Ofem, Nnana; Eteng, Mary Juachi; Nnamani, Rebecca Ginikanwa (September 5, 2022). "Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria". SAGE Open. 12 (3): 215824402211227. doi:10.1177/21582440221122739. ISSN 2158-2440. S2CID 252096635.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  • Dey, Debabrata; Lahiri, Atanu; Zhang, Guoying (2011). "Hacker Behavior, Network Effects, and the Security Software Market". SSRN Electronic Journal. doi:10.2139/ssrn.1838656. ISSN 1556-5068.

dx.doi.org

dw.com

govinfosecurity.com

htbridge.com

ieee.org

ieeexplore.ieee.org

independent.co.uk

information-age.com

informit.com

jargon-file.org

newyorker.com

  • Yagoda, Ben (March 6, 2014). "A Short History of 'Hack'". The New Yorker. Retrieved June 21, 2019. Although Lifehacker and other neutral or positive applications of the word [hack] are increasingly prominent, the black-hat meaning still prevails among the general public.

npr.org

nytimes.com

overheid.nl

wetten.overheid.nl

pcmag.com

  • "Blue hat hacker Definition". PC Magazine Encyclopedia. Archived from the original on March 8, 2013. Retrieved May 31, 2010. A security professional invited by Microsoft to find vulnerabilities in Windows.

semanticscholar.org

api.semanticscholar.org

  • Gao, Xing (2015). "Information security investment for competitive firms with hacker behavior and security requirements". Annals of Operations Research. 235: 277–300. doi:10.1007/s10479-015-1925-2. S2CID 207085416.
  • Bailey, David (April 1984). "Attacks on Computers: Congressional Hearings and Pending Legislation". 1984 IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE. pp. 180–186. doi:10.1109/SP.1984.10012. ISBN 978-0-8186-0532-1. S2CID 15187375.
  • Okpa, John Thompson; Ugwuoke, Christopher Uchechukwu; Ajah, Benjamin Okorie; Eshioste, Emmanuel; Igbe, Joseph Egidi; Ajor, Ogar James; Okoi, Ofem, Nnana; Eteng, Mary Juachi; Nnamani, Rebecca Ginikanwa (September 5, 2022). "Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria". SAGE Open. 12 (3): 215824402211227. doi:10.1177/21582440221122739. ISSN 2158-2440. S2CID 252096635.{{cite journal}}: CS1 maint: multiple names: authors list (link)

stallman.org

time.com

tomandmaria.com

unibo.it

scienzagiovane.unibo.it

unt.edu

digital.library.unt.edu

usdoj.gov

vox.com

washingtonpost.com

web.archive.org

windowsecurity.com

worldcat.org