Learn Hacker
Study Hacker using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
hackers toefl reading basic
hackers toefl reading basic
By: 지민 김
1st week day 1~31Decks34Flashcards1Learner -
VOCABULARY
VOCABULARY
By: Machunpal Kim
HACKERS VOCAB1Decks85Flashcards1Learner -
Football Hackers: The Science and Art of a Data Revolution
Football Hackers: The Science and Art of a Data Revolution
By: Marko Andreis
Main ideas1Decks30Flashcards1Learner -
Certified Ethical Hacker or Ethical Hacking certification Exam (CEH)
Certified Ethical Hacker or Ethical Hacking certification Exam (CEH)
By: Elevate Elevate
Domain 1: Background, Domain 2: Analysis/Assessment, Domain 3: Security ...6Decks46Flashcards1Learner -
TOEFL
TOEFL
By: Hyung-Chan Cho
Hackers Reading Ch02, Hackers Reading Ch03, Hackers Reading Ch04 ...15Decks1,706Flashcards5Learners -
TOIEC PREP - ETS 2020
TOIEC PREP - ETS 2020
By: Tuyết Vũ
RC 01 (PART 5), RC 01, LC 01 ...14Decks292Flashcards276Learners -
Angličtina
Angličtina
By: Iva Spurná
Harry Potter, Gilmore girls, obecné ...8Decks891Flashcards1Learner -
Listening intermediate
Listening intermediate
By: 예지 방
D.T, Ch1 《test 1~3》, Ch.1 《test 4~5》 ...27Decks550Flashcards1Learner -
cybersecurity
cybersecurity
By: russell Rader
google hacks, Reconnaissance, Sniffing and Evasion ...22Decks560Flashcards29Learners -
SAT Vocabulary
SAT Vocabulary
By: Irene Jung
Hackers New SAT Reading, Hackers New SAT Reading #3, Hackers New SAT Reading #4 ...10Decks853Flashcards2Learners -
ObsGyn
ObsGyn
By: Kevin Stockwell
Hacker and Moore Part 1, Hacker and Moore Part 3 - Gyn, Hacker and Moore Part 2 - Obs ...5Decks561Flashcards6Learners -
Computer Science Concepts
Computer Science Concepts
By: Parker Kelly
Cyber Security and Hacker Terms, KPAW Roles, pt. 12Decks30Flashcards44Learners -
Web Security
Web Security
By: Jason Thompson
Web Hacker Handbook1Decks19Flashcards13Learners -
Ethical Hacking & Countermeasures
Ethical Hacking & Countermeasures
By: Aidora Abdullah
Importance of Security in Today's World, Elements of Security, Various Phases of the Hacking Cycle ...5Decks32Flashcards18Learners -
CompTIA
CompTIA
By: Chris Brown
Certified Ethical Hacker. Ch 1 - 3, CEH Round 22Decks1,065Flashcards9Learners -
Tecnologias Digitales
Tecnologias Digitales
By: andre vega
Ciberseguridad, Hacktivismo, Hackers ...8Decks34Flashcards2Learners -
Vocabulary List
Vocabulary List
By: Elevate Elevate
CompTIA A+ Vocabulary List, CompTIA Network+ Vocabulary List, CompTIA Security+ Vocabulary List ...4Decks400Flashcards5Learners -
Reading intermediate
Reading intermediate
By: 예지 방
Ch.8 hachers test1, Ch.8 hackers test 2, Ch.8 hackers test 3 ...10Decks296Flashcards1Learner -
Books
Books
By: Константин Черкасов
Forrest Gump 1-3, A Hacker's Revenge, Airport Артур Хейли ...4Decks112Flashcards1Learner -
Russian Vocab
Russian Vocab
By: Oli Lane
Christmas Term AS, Russian - Stars & cinema, Russian Film/books ...18Decks566Flashcards5Learners -
GLPH 385
GLPH 385
By: Emma Crawford
Module 1: Introduction to Aging, Biohacking, and Gerontechnology, Module 2: Biohacking and Body Modification, Module 3: Biotechnologies, Bionics and Cyborgs ...6Decks331Flashcards1Learner -
EMPTECH QUIZ
EMPTECH QUIZ
By: Haven Anacan
ICT TOOLS USEFUL IN RESEARCH, ICT SAFETY AND SECURITY AND NETIQUETTE, TYPES OF SYSTEM INTRUDERS AND HACKERS ...4Decks54Flashcards1Learner -
Toefl
Toefl
By: kyungjin Park
Hackers Toefl Day1, Hackers Toefl Day2, Hackers Toefl Day33Decks96Flashcards1Learner -
A&O 1
A&O 1
By: Larissa Puma
5. VL Arbeitszufriedenheit, 6.VL Teams/Gruppen, 7.VL Beanspruchung/Ermüdung/Arbeitszeit ...11Decks290Flashcards2Learners -
Criminalité informatique
Criminalité informatique
By: Alicia Fex
Cours 1 - Introduction, Cours 2 - Usages problématiques et criminels d'Internet, Cours 3 - Intervention policière ...10Decks515Flashcards3Learners -
Computer Security
Computer Security
By: Chuck Bisbee
Chapter 1, Chapter 2, Chapter 3 ...6Decks122Flashcards4Learners -
random vồcạb
random vồcạb
By: Hằng Nguyễn
The Official Guide, Listening Strategies, Hackers Reading ...6Decks156Flashcards1Learner -
Ports and Protocols
Ports and Protocols
By: Nigel Lim
Ports and Protocols, Types of Hackers, Threats to VMS ...13Decks86Flashcards1Learner -
Data Security
Data Security
By: Tatiana Marin
CH-7 Industrial Espionage, CH-6 Techniques Used by Hackers, CH-5 Malware ...5Decks143Flashcards2Learners -
Actors in WP
Actors in WP
By: Iris Wiesenekker
Chapter 2, session #2, Chapter 9 - sovereignty and the nation state ...19Decks400Flashcards4Learners