White hat (computer security) (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "White hat (computer security)" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
5th place
5th place
11th place
8th place
2,435th place
1,699th place
774th place
716th place
low place
low place
3rd place
3rd place
low place
low place
low place
low place
low place
7,606th place
355th place
454th place
7th place
7th place
1,038th place
668th place
28th place
26th place
low place
low place
4,725th place
3,556th place
269th place
201st place
7,043rd place
4,687th place
149th place
178th place

books.google.com

cnn.com

defense.gov

doi.org

infosecurity-magazine.com

kuleuven.be

law.kuleuven.be

newscientist.com

newsweek.com

nist.gov

csrc.nist.gov

norton.com

us.norton.com

nsa.gov

nytimes.com

python.engineering

sciencedirect.com

secpoint.com

semanticscholar.org

api.semanticscholar.org

techtarget.com

searchsecurity.techtarget.com

  • "What is white hat? - a definition from Whatis.com". Searchsecurity.techtarget.com. Archived from the original on 2011-02-01. Retrieved 2012-06-06.

textfiles.com

pdf.textfiles.com

web.archive.org

  • "What is white hat? - a definition from Whatis.com". Searchsecurity.techtarget.com. Archived from the original on 2011-02-01. Retrieved 2012-06-06.
  • Ward, Mark (14 September 1996). "Sabotage in cyberspace". New Scientist. 151 (2047). Archived from the original on 13 January 2022. Retrieved 28 March 2018.
  • Knight, William (16 October 2009). "License to Hack". InfoSecurity. 6 (6): 38–41. doi:10.1016/s1742-6847(09)70019-9. Archived from the original on 9 January 2014. Retrieved 19 July 2014.
  • "What is the difference between black, white, and grey hackers". Norton.com. Norton Security. Archived from the original on 15 January 2018. Retrieved 2 October 2018.
  • "What is a White Hat?". Secpoint.com. 2012-03-20. Archived from the original on 2019-05-02. Retrieved 2012-06-06.
  • Palmer, C.C. (2001). "Ethical Hacking" (PDF). IBM Systems Journal. 40 (3): 769. doi:10.1147/sj.403.0769. Archived (PDF) from the original on 2019-05-02. Retrieved 2014-07-19.
  • Paul A. Karger; Roger R. Scherr (June 1974). MULTICS SECURITY EVALUATION: VULNERABILITY ANALYSIS (PDF) (Report). Archived (PDF) from the original on 13 November 2017. Retrieved 12 Nov 2017.
  • McLellan, Vin (1981-07-26). "Case of the Purloined Password". The New York Times. Archived from the original on 2016-03-07. Retrieved 11 August 2015.
  • Perez, Natasha Bertrand, Zachary Cohen, Alex Marquardt, Evan (2023-04-13). "Pentagon leak leads to limits on who gets access to military's top secrets | CNN Politics". CNN. Archived from the original on 2023-12-15. Retrieved 2023-12-15.{{cite web}}: CS1 maint: multiple names: authors list (link)
  • Justin Seitz, Tim Arnold (April 14, 2021). Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters. No Starch Press. ISBN 978-1-7185-0112-6. Archived from the original on August 26, 2021. Retrieved August 30, 2021.
  • Drechsler, Charlotte Somers, Koen Vranckaert, Laura (3 May 2023). "Belgium legalises ethical hacking: a threat or an opportunity for cybersecurity?". CITIP blog. Archived from the original on 17 May 2023. Retrieved 7 May 2023.{{cite web}}: CS1 maint: multiple names: authors list (link)
  • Brar, Aadil (18 January 2024). "China Raises Private Hacker Army To Probe Foreign Governments". Newsweek. Archived from the original on 20 January 2024. Retrieved 20 January 2024.
  • "Attention DEF CON® 20 attendees". National Security Agency. 2012. Archived from the original on 2012-07-30.

worldcat.org

search.worldcat.org