Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cracker

Examining the Impact of Deep Learning and IoT on Multi-Industry Applications
Represents the individual who is trying to gain access to computer systems without being authorized.
Published in Chapter:
CSAP: Cyber Security Asynchronous Programming With C++20 and C# 8 for Internet of Things and Embedded Software Systems
Marius Iulian Mihailescu (Spiru Haret University, Romania) and Stefania Loredana Nita (University of Bucharest, Romania)
DOI: 10.4018/978-1-7998-7511-6.ch014
Abstract
The current proposal of C++20 features suggests that the coroutines will have dedicated support for the native language. This chapter will provide an analysis that is performed based on a comprehensive survey of coroutines that are used in the development process of the embedded systems and how they are used on dedicated platforms based on their constrained resources. Another important aspect of the work consists of analyzing the performance of designing and implementation of coroutines in software applications related to IoT and embedded devices focusing on the security vulnerabilities of the devices within an IoT ecosystem. The research analysis that forms the basis of the current work is based on metrics, such as software and hardware platform requirements, computation power, scenarios, advantages, and designing user interfaces based on the programming language used. The current work will be completed by adding a comparison with C# 8 programming language and C++20.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
Name of people who create and modify computer software and hardware in order to destroy information and use it for their own advantage, seeking recognition, insider information or even monetary compensations.
Full Text Chapter Download: US $37.50 Add to Cart
RFID Technologies and Applications
Someone who is often more interested in breaking into a server to access data or to subvert the functioning of the server. The cracker may also break into systems for money.
Full Text Chapter Download: US $37.50 Add to Cart
Hackers, Hacking, and Eavesdropping
This was coined by hackers in defence against journalistic misuse of the term “hacker.” The term “cracker” reflects a strong revulsion at the theft and vandalism perpetrated by cracking rings.
Full Text Chapter Download: US $37.50 Add to Cart
Online Privacy Issues
Full Text Chapter Download: US $37.50 Add to Cart
Electronic Mail Security
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR