Hack

Results: 958



#Item
931Ubiquitous computing / Wireless / Technology / Automatic identification and data capture / Privacy / Radio-frequency identification

Anatomy of a Subway Hack

Add to Reading List

Source URL: tech.mit.edu

- Date: 2008-08-09 15:30:17
932

7 MARGHERITA HACK Lo sguardo dell’astrofisica

Add to Reading List

Source URL: www.claudiana.it

Language: Italian - Date: 2006-11-16 18:00:00
    933Yu-Gi-Oh! Trading Card Game / Yu-Gi-Oh! / Jaden Yuki / Dungeon Dice Monsters / .hack//Enemy / Collectible card games / Games / Collecting

    RECENT CARD ERRATA LIST Compiled as of November 5, 2010 What does errata mean?

    Add to Reading List

    Source URL: www.yugioh-card.com

    Language: English - Date: 2010-11-15 09:09:10
    934Experimental musical instruments / Electronic musical instruments / Keyboard instruments / Fountains / Hydraulophone / Reedless wind instrument / MIDI / Glass harmonica / Organology / Music / Sound / Visual arts

    INVENTING NEW INSTRUMENTS BASED ON A COMPUTATIONAL “HACK” TO MAKE AN OUT-OF-TUNE OR UNPITCHED INSTRUMENT PLAY IN PERFECT HARMONY

    Add to Reading List

    Source URL: www.wearcam.org

    Language: English - Date: 2007-07-17 02:39:13
    935Hacker / White hat / Penetration test / Grey hat / Hack / Computer ethics / Hacker ethic / South African hacker history / Computing / Hacking / Electronics

    Teaching Students to Hack: Ethical Implications in Teaching Students to Hack at the University Level

    Add to Reading List

    Source URL: cs.potsdam.edu

    Language: English - Date: 2012-04-06 21:26:50
    936Lake Forest /  Illinois / Highland Park /  Illinois / Highwood /  Illinois / Lake Bluff /  Illinois / Fort Sheridan /  Illinois / Sheridan Road / Lake Forest / Forest Lake / Chicago metropolitan area / Geography of Illinois / Illinois

    January 18, 2010 FOR IMMEDIATE RELEASE Janice C. Hack, Executive Director

    Add to Reading List

    Source URL: www.lflbhistory.org

    Language: English - Date: 2012-02-12 15:42:55
    937Computing / Country code top-level domains / Network architecture / Identifiers / Internet governance / Top-level domain / Domain hack / .cm / Sponsored top-level domain / Domain name system / Spamming / Internet

    Mapping the Mal Web The world’s riskiest domains

    Add to Reading List

    Source URL: promos.mcafee.com

    Language: English - Date: 2012-05-14 19:22:53
    938Set theory / Type theory / Model theory / Z notation / Automath / Axiom of choice / Axiom schema of replacement / New Foundations / Axiom / Mathematical logic / Logic / Mathematics

    Is ZF a hack? Comparing the complexity of some (formalist interpretations of )

    Add to Reading List

    Source URL: www.cs.ru.nl

    Language: English - Date: 2008-04-30 04:22:51
    939Hacker / White hat / Hack Day / Hacker ethic / Grey hat / Computing / Hacking / Electronics

    InsighT Hacking Their Way

    Add to Reading List

    Source URL: www.charubahri.com

    Language: English - Date: 2009-03-05 21:34:09
    940Electronic voting / Operating system / Computer architecture / Computing / Disk encryption / Hursti Hack / System partition and boot partition / Booting / BIOS / System software

    330 SW 43rd St Suite K PMB 547 Renton WA[removed]1030 http://www.blackboxvoting.org

    Add to Reading List

    Source URL: www.blackboxvoting.org

    Language: English - Date: 2006-05-11 15:33:07
    UPDATE