語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hackathonsfrom idea to successful im...
~
Kohne, Andreas.
Hackathonsfrom idea to successful implementation /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Hackathonsby Andreas Kohne, Volker Wehmeier.
其他題名:
from idea to successful implementation /
作者:
Kohne, Andreas.
其他作者:
Wehmeier, Volker.
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
xi, 106 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Penetration testing (Computer security)Congresses
電子資源:
https://doi.org/10.1007/978-3-030-58839-7
ISBN:
9783030588397$q(electronic bk.)
Hackathonsfrom idea to successful implementation /
Kohne, Andreas.
Hackathons
from idea to successful implementation /[electronic resource] :by Andreas Kohne, Volker Wehmeier. - Cham :Springer International Publishing :2020. - xi, 106 p. :ill., digital ;24 cm.
1. Basics -- 2. Preparation -- 3. Operation -- 4. Follow-Up -- 5. Participant View -- 6. Criticism -- 7. Summary -- 8. Outlook -- 9. Quotations -- 10. Checklists.
This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant's perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. The book is structured as follows: At first the basics and the history of hackathons are described in chapter 1. Afterwards the three phases of a hackathon are described in detail. This is started in chapter 2 with the description of the individual measures which are to be accomplished before the actual event. Here not only technical or organizational aspects are described, but also the important legal aspects are discussed. Subsequently, it is shown what is necessary to carry out a hackathon successfully. For this purpose the actual execution with all its steps is described in chapter 3. Next, chapter 4 looks at the follow-ups, which are often neglected or even completely forgotten. Chapter 5 describes from a participant's point of view the reasons for participating in a hackathon and which aspects guarantee a successful participation. In the following chapter 6 the criticism of the format of the hackathons and their execution is also examined in detail. Eventually, the most important points are summarized in chapter 7, before chapter 8 gives a view into the future of hackathons. Subsequently chapter 9 collects statements and opinions of representatives from industry, science and administration on the topic of hackathons. The book is rounded off in chapter 10 with detailed checklists, which can be directly used for the successful planning, operation and follow-up of hackathons. The book is written for everyone with an interest in how hackathons work, how to create them, and how to successfully participate. It especially targets people in industry or young students who want to run or participate in a hackathon.
ISBN: 9783030588397$q(electronic bk.)
Standard No.: 10.1007/978-3-030-58839-7doiSubjects--Topical Terms:
882868
Penetration testing (Computer security)
--Congresses
LC Class. No.: QA76.9.A25 / K6344 2020
Dewey Class. No.: 338.47004
Hackathonsfrom idea to successful implementation /
LDR
:03180nmm a2200325 a 4500
001
591373
003
DE-He213
005
20201210210002.0
006
m d
007
cr nn 008maaau
008
210629s2020 sz s 0 eng d
020
$a
9783030588397$q(electronic bk.)
020
$a
9783030588380$q(paper)
024
7
$a
10.1007/978-3-030-58839-7
$2
doi
035
$a
978-3-030-58839-7
040
$a
GP
$c
GP
041
1
$a
eng
$h
ger
050
4
$a
QA76.9.A25
$b
K6344 2020
072
7
$a
KNTX
$2
bicssc
072
7
$a
BUS070030
$2
bisacsh
072
7
$a
KNTX
$2
thema
082
0 4
$a
338.47004
$2
23
090
$a
QA76.9.A25
$b
K79 2020
100
1
$a
Kohne, Andreas.
$3
833585
245
1 0
$a
Hackathons
$h
[electronic resource] :
$b
from idea to successful implementation /
$c
by Andreas Kohne, Volker Wehmeier.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xi, 106 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1. Basics -- 2. Preparation -- 3. Operation -- 4. Follow-Up -- 5. Participant View -- 6. Criticism -- 7. Summary -- 8. Outlook -- 9. Quotations -- 10. Checklists.
520
$a
This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant's perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. The book is structured as follows: At first the basics and the history of hackathons are described in chapter 1. Afterwards the three phases of a hackathon are described in detail. This is started in chapter 2 with the description of the individual measures which are to be accomplished before the actual event. Here not only technical or organizational aspects are described, but also the important legal aspects are discussed. Subsequently, it is shown what is necessary to carry out a hackathon successfully. For this purpose the actual execution with all its steps is described in chapter 3. Next, chapter 4 looks at the follow-ups, which are often neglected or even completely forgotten. Chapter 5 describes from a participant's point of view the reasons for participating in a hackathon and which aspects guarantee a successful participation. In the following chapter 6 the criticism of the format of the hackathons and their execution is also examined in detail. Eventually, the most important points are summarized in chapter 7, before chapter 8 gives a view into the future of hackathons. Subsequently chapter 9 collects statements and opinions of representatives from industry, science and administration on the topic of hackathons. The book is rounded off in chapter 10 with detailed checklists, which can be directly used for the successful planning, operation and follow-up of hackathons. The book is written for everyone with an interest in how hackathons work, how to create them, and how to successfully participate. It especially targets people in industry or young students who want to run or participate in a hackathon.
650
0
$a
Penetration testing (Computer security)
$x
Congresses
$x
Planning.
$3
882868
650
0
$a
Hacking
$x
Congresses
$x
Planning.
$3
882869
650
1 4
$a
The Computer Industry.
$3
285768
650
2 4
$a
Management of Computing and Information Systems.
$3
274191
650
2 4
$a
Business and Management, general.
$3
731433
650
2 4
$a
Software Engineering.
$3
274511
650
2 4
$a
IT in Business.
$3
703717
700
1
$a
Wehmeier, Volker.
$3
882867
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-58839-7
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000192382
電子館藏
1圖書
電子書
EB QA76.9.A25 K79 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-58839-7
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入