Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Hacking (computer security)
An Entity of Type:
Concept
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
dbo:
wikiPageID
11647669
(xsd:integer)
dbo:
wikiPageRevisionID
977943147
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:CatAutoTOC
dbt
:Cat_main
dbt
:See_also_cat
rdf:
type
skos
:Concept
rdfs:
label
Hacking (computer security)
(en)
skos:
broader
dbc
:Cyberpunk_themes
dbc
:Cybercrime
dbc
:Theft
skos:
prefLabel
Hacking (computer security)
(en)
prov:
wasDerivedFrom
wikipedia-en
:Category:Hacking_(computer_security)?oldid=977943147&ns=14
is
dbo:
wikiPageWikiLink
of
dbr
:Car_hacking
dbr
:Roman_Seleznev
dbr
:Elfin_Team
dbr
:List_of_computer_criminals
dbr
:MAC_spoofing
dbr
:Metropolitan_Police_role_in_the_news_media_phone_hacking_scandal
dbr
:Black_Hat_Middle_East_and_Africa
dbr
:Bluesnarfing
dbr
:Dennis_L._Montgomery
dbr
:Antisec_Movement
dbr
:Jonathan_James
dbr
:Patriotic_hacking
dbr
:Cyber-arms_industry
dbr
:Cyber-collection
dbr
:Cyber_ShockWave
dbr
:Cyber_spying
dbr
:Cyber_spying_on_universities
dbr
:Cyberstrategy_3.0
dbr
:Cyberwarfare
dbr
:Cyberwarfare_by_China
dbr
:DNSChanger
dbr
:DNS_hijacking
dbr
:DNS_spoofing
dbr
:Decocidio
dbr
:Insecure_direct_object_reference
dbr
:Jan_Krissler
dbr
:List_of_security_hacking_incidents
dbr
:United_States_v._Ancheta
dbr
:Null_session
dbr
:Stakkato
dbr
:Robin_Sage
dbr
:Computer_Fraud_and_Abuse_Act
dbr
:Content_Security_Policy
dbr
:Mathew_Bevan
dbr
:Same-origin_policy
dbr
:RF_monitor_software
dbr
:Tiger_Team_(TV_series)
dbr
:Vulnerability_(computing)
dbr
:Climatic_Research_Unit_documents
dbr
:Great_Hacker_War
dbr
:Mustafa_Al-Bassam
dbr
:Cookiejacking
dbr
:Cross-site_scripting
dbr
:The_Secret_History_of_Hacking
dbr
:Damn_Vulnerable_Web_Application
dbr
:Milw0rm
dbr
:Zone-H
dbr
:1984_Network_Liberty_Alliance
dbr
:Legion_Hacktivist_Group
dbr
:Computer_Misuse_Act_1990
dbr
:Operation_AntiSec
dbr
:Pass_the_hash
dbr
:Market_for_zero-day_exploits
dbr
:Broker_injection
dbr
:Wargame_(hacking)
dbr
:Wicked_Rose
dbr
:Doxing
dbr
:Hack_Forums
dbr
:Hacker
dbr
:Hacker_Croll
dbr
:Hacker_Manifesto
dbr
:Hacker_culture
dbr
:Hackers_for_Charity
dbr
:Hacking_(computer_security)
dbr
:Hacktivism
dbr
:James_Linton_(hacker)
dbr
:Kaspersky_bans_and_allegations_of_Russian_government_ties
dbr
:Network_detector
dbr
:APT40
dbr
:Abbassa_Malik
dbr
:Albert_Gonzalez
dbr
:Cyberwarfare_in_the_United_States
dbr
:Daniel_Domscheit-Berg
dbr
:ELearnSecurity
dbr
:PLA_Unit_61398
dbr
:Capture_the_flag_(cybersecurity)
dbr
:Digital_art_theft
dbr
:Form_grabbing
dbr
:Frame_injection
dbr
:Government_hacking
dbr
:Katiba_des_Narvalos
dbr
:Website_defacement
dbr
:Phone_hacking
dbr
:Security_hacker
dbr
:HTTP_cookie
dbr
:HackThisSite
dbr
:Hackers_Are_People_Too
dbr
:Hackers_Wanted
dbr
:Hackers_in_Wonderland
dbr
:Attack_patterns
dbr
:Jean-Bernard_Condat
dbr
:The_Cuckoo's_Egg_(book)
dbr
:The_Hacker_Wars
dbr
:SamyGO
dbr
:AOHell
dbr
:ARP_spoofing
dbr
:Advanced_persistent_threat
dbr
:Karl_Koch_(hacker)
dbr
:Key_finding_attacks
dbr
:Billboard_hacking
dbr
:Black_hat_(computer_security)
dbr
:BlueHat
dbr
:Bluebugging
dbr
:Systempunkt
dbr
:White_hat_(computer_security)
dbr
:Relay_attack
dbr
:Automotive_hacking
dbr
:Markus_Hess
dbr
:Bug_bounty_program
dbr
:Bug_poaching
dbr
:File_binder
dbr
:Great_Cannon
dbr
:Grey_hat
dbr
:Michael_J._Saylor
dbr
:Network_Crack_Program_Hacker_Group
dbr
:News_International_phone_hacking_scandal
dbr
:Operation_Cybersnare
dbr
:Cameron_Lacroix
dbr
:Camfecting
dbr
:Certified_Ethical_Hacker
dbr
:Loyd_Blankenship
dbr
:Operation_High_Roller
dbr
:Lords_of_Dharmaraja
dbr
:Man-in-the-browser
dbr
:Shoulder_surfing_(computer_security)
dbr
:Web_shell
dbr
:Web_skimming
dbr
:Turla_(malware)
dbr
:Vulnerabilities_Equities_Process
dbr
:Ne0h
dbr
:Network_enumeration
dbr
:News_media_phone_hacking_scandal_reference_lists
dbr
:The_Hacker's_Handbook
dbr
:IP_camera
dbr
:ISP_redirect_page
dbr
:Script_kiddie
dbr
:Offensive_Security_Certified_Professional
dbr
:Old_Red_Cracker
dbr
:Firesheep
dbr
:Telehack
dbr
:National_Cyber_Force
dbr
:Tiger_team
dbr
:Pin_control_attack
dbr
:The_Ransomware_Hunting_Team
dbr
:South_African_hacker_history
dbr
:Structural_vulnerability_(computing)
dbr
:Xiang_Li_(hacker)
is
dcterms:
subject
of
dbr
:Car_hacking
dbr
:Roman_Seleznev
dbr
:Elfin_Team
dbr
:List_of_computer_criminals
dbr
:MAC_spoofing
dbr
:Metropolitan_Police_role_in_the_news_media_phone_hacking_scandal
dbr
:Black_Hat_Middle_East_and_Africa
dbr
:Bluesnarfing
dbr
:Dennis_L._Montgomery
dbr
:Antisec_Movement
dbr
:Jonathan_James
dbr
:Patriotic_hacking
dbr
:Cyber-arms_industry
dbr
:Cyber-collection
dbr
:Cyber_ShockWave
dbr
:Cyber_spying
dbr
:Cyber_spying_on_universities
dbr
:Cyberstrategy_3.0
dbr
:Cyberwarfare
dbr
:Cyberwarfare_by_China
dbr
:DNSChanger
dbr
:DNS_hijacking
dbr
:DNS_spoofing
dbr
:Decocidio
dbr
:Insecure_direct_object_reference
dbr
:Jan_Krissler
dbr
:List_of_security_hacking_incidents
dbr
:United_States_v._Ancheta
dbr
:Null_session
dbr
:Stakkato
dbr
:Robin_Sage
dbr
:Computer_Fraud_and_Abuse_Act
dbr
:Content_Security_Policy
dbr
:Mathew_Bevan
dbr
:Same-origin_policy
dbr
:RF_monitor_software
dbr
:Tiger_Team_(TV_series)
dbr
:Vulnerability_(computing)
dbr
:Climatic_Research_Unit_documents
dbr
:Great_Hacker_War
dbr
:Mustafa_Al-Bassam
dbr
:Cookiejacking
dbr
:Cross-site_scripting
dbr
:The_Secret_History_of_Hacking
dbr
:Damn_Vulnerable_Web_Application
dbr
:Milw0rm
dbr
:Zone-H
dbr
:1984_Network_Liberty_Alliance
dbr
:Legion_Hacktivist_Group
dbr
:Computer_Misuse_Act_1990
dbr
:Operation_AntiSec
dbr
:Pass_the_hash
dbr
:Market_for_zero-day_exploits
dbr
:Broker_injection
dbr
:Wargame_(hacking)
dbr
:Wicked_Rose
dbr
:Doxing
dbr
:Hack_Forums
dbr
:Hacker
dbr
:Hacker_Croll
dbr
:Hacker_Manifesto
dbr
:Hacker_culture
dbr
:Hackers_for_Charity
dbr
:Hacking_(computer_security)
dbr
:Hacktivism
dbr
:James_Linton_(hacker)
dbr
:Kaspersky_bans_and_allegations_of_Russian_government_ties
dbr
:Network_detector
dbr
:APT40
dbr
:Abbassa_Malik
dbr
:Albert_Gonzalez
dbr
:Cyberwarfare_in_the_United_States
dbr
:Daniel_Domscheit-Berg
dbr
:ELearnSecurity
dbr
:PLA_Unit_61398
dbr
:Capture_the_flag_(cybersecurity)
dbr
:Digital_art_theft
dbr
:Form_grabbing
dbr
:Frame_injection
dbr
:Government_hacking
dbr
:Katiba_des_Narvalos
dbr
:Website_defacement
dbr
:Phone_hacking
dbr
:Security_hacker
dbr
:HTTP_cookie
dbr
:HackThisSite
dbr
:Hackers_Are_People_Too
dbr
:Hackers_Wanted
dbr
:Hackers_in_Wonderland
dbr
:Attack_patterns
dbr
:Jean-Bernard_Condat
dbr
:The_Cuckoo's_Egg_(book)
dbr
:The_Hacker_Wars
dbr
:SamyGO
dbr
:AOHell
dbr
:ARP_spoofing
dbr
:Advanced_persistent_threat
dbr
:Karl_Koch_(hacker)
dbr
:Key_finding_attacks
dbr
:Billboard_hacking
dbr
:Black_hat_(computer_security)
dbr
:BlueHat
dbr
:Bluebugging
dbr
:Systempunkt
dbr
:White_hat_(computer_security)
dbr
:Relay_attack
dbr
:Automotive_hacking
dbr
:Markus_Hess
dbr
:Bug_bounty_program
dbr
:Bug_poaching
dbr
:File_binder
dbr
:Great_Cannon
dbr
:Grey_hat
dbr
:Michael_J._Saylor
dbr
:Network_Crack_Program_Hacker_Group
dbr
:News_International_phone_hacking_scandal
dbr
:Operation_Cybersnare
dbr
:Cameron_Lacroix
dbr
:Camfecting
dbr
:Certified_Ethical_Hacker
dbr
:Loyd_Blankenship
dbr
:Operation_High_Roller
dbr
:Lords_of_Dharmaraja
dbr
:Man-in-the-browser
dbr
:Shoulder_surfing_(computer_security)
dbr
:Web_shell
dbr
:Web_skimming
dbr
:Turla_(malware)
dbr
:Vulnerabilities_Equities_Process
dbr
:Ne0h
dbr
:Network_enumeration
dbr
:News_media_phone_hacking_scandal_reference_lists
dbr
:The_Hacker's_Handbook
dbr
:IP_camera
dbr
:ISP_redirect_page
dbr
:Script_kiddie
dbr
:Offensive_Security_Certified_Professional
dbr
:Old_Red_Cracker
dbr
:Firesheep
dbr
:Telehack
dbr
:National_Cyber_Force
dbr
:Tiger_team
dbr
:Pin_control_attack
dbr
:The_Ransomware_Hunting_Team
dbr
:South_African_hacker_history
dbr
:Structural_vulnerability_(computing)
dbr
:Xiang_Li_(hacker)
is
skos:
broader
of
dbc
:Hacking_video_games
dbc
:Hacker_groups
dbc
:Hackers
dbc
:Hacking_by_decade
dbc
:Hacking_of_Yahoo!
dbc
:Hacker_magazines
dbc
:Phreaking
dbc
:Works_about_computer_hacking
dbc
:Email_hacking
dbc
:Advanced_persistent_threat
dbc
:Hacker_conventions
dbc
:Web_shells
dbc
:White_hat_(computer_security)
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License