20:, defined as the work of a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. This include the work of
336:
346:
47:
Gao, Xing (2015). "Information security investment for competitive firms with hacker behavior and security requirements".
256:
85:
115:
25:
317:
200:
217:
232:
190:
132:
341:
285:
244:
227:
149:
280:
64:
295:
195:
56:
33:
161:
110:
21:
290:
178:
330:
173:
68:
312:
127:
222:
205:
60:
144:
98:
29:
268:
17:
307:
84:
The following 28 pages are in this category, out of 28 total.
24:, who explore methods for breaching defenses and
81:Pages in category "Films about computer hacking"
8:
86:This list may not reflect recent changes
39:
7:
90:
78:
14:
1:
337:Films about computer security
49:Annals of Operations Research
347:Works about computer hacking
257:Overdrawn at the Memory Bank
116:The Bourne Ultimatum (film)
363:
318:Turbulence 3: Heavy Metal
201:Irumbu Thirai (2018 film)
61:10.1007/s10479-015-1925-2
218:Masking Threshold (film)
233:The Matrix Revolutions
191:I Did It My Way (film)
133:Cyberbully (2015 film)
286:Sneakers (1992 film)
245:The Net (1995 film)
228:The Matrix Reloaded
150:The Den (2013 film)
281:Sarap Mong Patayin
354:
296:Swordfish (film)
196:Interface (film)
73:
72:
44:
28:weaknesses in a
22:security hackers
18:computer hacking
362:
361:
357:
356:
355:
353:
352:
351:
327:
326:
325:
324:
323:
322:
300:
273:
261:
249:
237:
210:
183:
166:
162:The Emoji Movie
154:
137:
120:
111:Blackhat (film)
103:
77:
76:
46:
45:
41:
30:computer system
12:
11:
5:
360:
358:
350:
349:
344:
339:
329:
328:
321:
320:
315:
310:
304:
301:
299:
298:
293:
291:Snowden (film)
288:
283:
277:
274:
272:
271:
265:
262:
260:
259:
253:
250:
248:
247:
241:
238:
236:
235:
230:
225:
220:
214:
211:
209:
208:
203:
198:
193:
187:
184:
182:
181:
179:Hackers (film)
176:
170:
167:
165:
164:
158:
155:
153:
152:
147:
141:
138:
136:
135:
130:
124:
121:
119:
118:
113:
107:
104:
102:
101:
95:
92:
91:
82:
79:
75:
74:
38:
13:
10:
9:
6:
4:
3:
2:
359:
348:
345:
343:
340:
338:
335:
334:
332:
319:
316:
314:
311:
309:
306:
305:
302:
297:
294:
292:
289:
287:
284:
282:
279:
278:
275:
270:
267:
266:
263:
258:
255:
254:
251:
246:
243:
242:
239:
234:
231:
229:
226:
224:
221:
219:
216:
215:
212:
207:
204:
202:
199:
197:
194:
192:
189:
188:
185:
180:
177:
175:
174:Hacked (film)
172:
171:
168:
163:
160:
159:
156:
151:
148:
146:
143:
142:
139:
134:
131:
129:
126:
125:
122:
117:
114:
112:
109:
108:
105:
100:
97:
96:
93:
89:
87:
80:
70:
66:
62:
58:
54:
50:
43:
40:
37:
35:
31:
27:
23:
19:
342:Techno films
313:Tron: Legacy
83:
52:
48:
42:
16:Films about
15:
128:Cyber Heist
55:: 277–300.
331:Categories
223:The Matrix
206:Ism (film)
26:exploiting
145:Death Spa
99:23 (film)
69:207085416
34:network
269:Ra.One
67:
65:S2CID
308:Tron
94:0–9
57:doi
53:235
36:.
32:or
333::
88:.
63:.
51:.
303:T
276:S
264:R
252:O
240:N
213:M
186:I
169:H
157:E
140:D
123:C
106:B
71:.
59::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.