語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hackathons = from idea to successful...
~
Kohne, Andreas.
FindBook
Google Book
Amazon
博客來
Hackathons = from idea to successful implementation /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Hackathons/ by Andreas Kohne, Volker Wehmeier.
其他題名:
from idea to successful implementation /
作者:
Kohne, Andreas.
其他作者:
Wehmeier, Volker.
出版者:
Cham :Springer International Publishing : : 2020.,
面頁冊數:
xi, 106 p. :ill., digital ;24 cm.
內容註:
1. Basics -- 2. Preparation -- 3. Operation -- 4. Follow-Up -- 5. Participant View -- 6. Criticism -- 7. Summary -- 8. Outlook -- 9. Quotations -- 10. Checklists.
Contained By:
Springer Nature eBook
標題:
Penetration testing (Computer security) - Congresses -
電子資源:
https://doi.org/10.1007/978-3-030-58839-7
ISBN:
9783030588397
Hackathons = from idea to successful implementation /
Kohne, Andreas.
Hackathons
from idea to successful implementation /[electronic resource] :by Andreas Kohne, Volker Wehmeier. - Cham :Springer International Publishing :2020. - xi, 106 p. :ill., digital ;24 cm.
1. Basics -- 2. Preparation -- 3. Operation -- 4. Follow-Up -- 5. Participant View -- 6. Criticism -- 7. Summary -- 8. Outlook -- 9. Quotations -- 10. Checklists.
This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant's perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. The book is structured as follows: At first the basics and the history of hackathons are described in chapter 1. Afterwards the three phases of a hackathon are described in detail. This is started in chapter 2 with the description of the individual measures which are to be accomplished before the actual event. Here not only technical or organizational aspects are described, but also the important legal aspects are discussed. Subsequently, it is shown what is necessary to carry out a hackathon successfully. For this purpose the actual execution with all its steps is described in chapter 3. Next, chapter 4 looks at the follow-ups, which are often neglected or even completely forgotten. Chapter 5 describes from a participant's point of view the reasons for participating in a hackathon and which aspects guarantee a successful participation. In the following chapter 6 the criticism of the format of the hackathons and their execution is also examined in detail. Eventually, the most important points are summarized in chapter 7, before chapter 8 gives a view into the future of hackathons. Subsequently chapter 9 collects statements and opinions of representatives from industry, science and administration on the topic of hackathons. The book is rounded off in chapter 10 with detailed checklists, which can be directly used for the successful planning, operation and follow-up of hackathons. The book is written for everyone with an interest in how hackathons work, how to create them, and how to successfully participate. It especially targets people in industry or young students who want to run or participate in a hackathon.
ISBN: 9783030588397
Standard No.: 10.1007/978-3-030-58839-7doiSubjects--Topical Terms:
3528619
Penetration testing (Computer security)
--Congresses
LC Class. No.: QA76.9.A25 / K6344 2020
Dewey Class. No.: 338.47004
Hackathons = from idea to successful implementation /
LDR
:03180nmm a2200325 a 4500
001
2257468
003
DE-He213
005
20201210210002.0
006
m d
007
cr nn 008maaau
008
220420s2020 sz s 0 eng d
020
$a
9783030588397
$q
(electronic bk.)
020
$a
9783030588380
$q
(paper)
024
7
$a
10.1007/978-3-030-58839-7
$2
doi
035
$a
978-3-030-58839-7
040
$a
GP
$c
GP
041
1
$a
eng
$h
ger
050
4
$a
QA76.9.A25
$b
K6344 2020
072
7
$a
KNTX
$2
bicssc
072
7
$a
BUS070030
$2
bisacsh
072
7
$a
KNTX
$2
thema
082
0 4
$a
338.47004
$2
23
090
$a
QA76.9.A25
$b
K79 2020
100
1
$a
Kohne, Andreas.
$3
3384388
245
1 0
$a
Hackathons
$h
[electronic resource] :
$b
from idea to successful implementation /
$c
by Andreas Kohne, Volker Wehmeier.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xi, 106 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1. Basics -- 2. Preparation -- 3. Operation -- 4. Follow-Up -- 5. Participant View -- 6. Criticism -- 7. Summary -- 8. Outlook -- 9. Quotations -- 10. Checklists.
520
$a
This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant's perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. The book is structured as follows: At first the basics and the history of hackathons are described in chapter 1. Afterwards the three phases of a hackathon are described in detail. This is started in chapter 2 with the description of the individual measures which are to be accomplished before the actual event. Here not only technical or organizational aspects are described, but also the important legal aspects are discussed. Subsequently, it is shown what is necessary to carry out a hackathon successfully. For this purpose the actual execution with all its steps is described in chapter 3. Next, chapter 4 looks at the follow-ups, which are often neglected or even completely forgotten. Chapter 5 describes from a participant's point of view the reasons for participating in a hackathon and which aspects guarantee a successful participation. In the following chapter 6 the criticism of the format of the hackathons and their execution is also examined in detail. Eventually, the most important points are summarized in chapter 7, before chapter 8 gives a view into the future of hackathons. Subsequently chapter 9 collects statements and opinions of representatives from industry, science and administration on the topic of hackathons. The book is rounded off in chapter 10 with detailed checklists, which can be directly used for the successful planning, operation and follow-up of hackathons. The book is written for everyone with an interest in how hackathons work, how to create them, and how to successfully participate. It especially targets people in industry or young students who want to run or participate in a hackathon.
650
0
$a
Penetration testing (Computer security)
$x
Congresses
$x
Planning.
$3
3528619
650
0
$a
Hacking
$x
Congresses
$x
Planning.
$3
3528620
650
1 4
$a
The Computer Industry.
$3
895945
650
2 4
$a
Management of Computing and Information Systems.
$3
892490
650
2 4
$a
Business and Management, general.
$3
2162672
650
2 4
$a
Software Engineering.
$3
890874
650
2 4
$a
IT in Business.
$3
2114922
700
1
$a
Wehmeier, Volker.
$3
3528618
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-58839-7
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9413098
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 K6344 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入