Hacker

Results: 1388



#Item
211

FOR IMMEDIATE RELEASE Crossed Genres Publications, 2 Century St, Somerville, MASalsa Nocturna: Stories by Daniel José Older A 300 year-old story collector enlists the help of the computer hacker next door to sav

Add to Reading List

Source URL: crossedgenres.com

Language: English - Date: 2012-04-03 09:04:23
    212

    Pt-free Direct Ethanol Fuell Cells Viktor HACKER, Astrid HOFER, Merit BODNER, Christoph GRIMMER, Alexander SCHENK 8th A3PS Conference Eco-Mobility 2013 Strategies, R&D-Funding Programs and Projects of Industry, Research

    Add to Reading List

    Source URL: www.a3ps.at

    Language: English - Date: 2013-10-11 06:09:54
      213

        KINDERTRANSPORT ASSOCIATION, INC. Executive Committee Melissa Hacker, President Anita Weisbord, Vice-President

      Add to Reading List

      Source URL: kindertransport.org

      Language: English - Date: 2015-03-14 14:42:24
        214

        Microsoft PowerPoint - ag_pruefgrundlagen_hacker.ppt

        Add to Reading List

        Source URL: docs.kwf-online.org

        Language: German - Date: 2009-07-16 05:59:54
          215

          Joachim Griesbaum, Thomas Mandl, Christa Womser-Hacker (Hrsg.) Information und Wissen: global, sozial und frei? Proceedings des 12. Internationalen Symposiums

          Add to Reading List

          Source URL: www.vwh-verlag.de

          Language: German - Date: 2011-03-11 11:35:13
            216Unemployment / Recession / Macroeconomics / Economics / Jacob Hacker / Socioeconomics

            PDF Document

            Add to Reading List

            Source URL: nw-assets.s3.amazonaws.com

            Language: English - Date: 2010-07-21 18:46:43
            217Hackathon / Internet slang / OpenBSD / Random Hacks of Kindness / Political corruption / Hacker / Jakarta / Information and communication technologies in education / Computing / Software development / Technology

            Term  of  References   Hacks  Against  Corruption  –  Jakarta      

            Add to Reading List

            Source URL: www.ti.or.id

            Language: English - Date: 2013-10-12 16:16:56
            218Cyberwarfare / Computer security / Ifconfig / Password / Hacker / Network security / Rootkits / Trojan horses / System software / Computing / Malware

            Intruders and UNIX Matt Bishop Department of Computer Science University of California Davis, CAphone: (

            Add to Reading List

            Source URL: seclab.cs.ucdavis.edu

            Language: English - Date: 2004-06-21 18:55:43
            219Computing / International Obfuscated C Code Contest / Just another Perl hacker / Berkeley sockets / Network socket / Computer programming

            SCTP Christian Grothoff Socket Programming Christian Grothoff

            Add to Reading List

            Source URL: grothoff.org

            Language: English - Date: 2012-11-13 04:33:58
            220Internet privacy / Hacker / Identity theft / Privacy / Trojan horse / Computing / Ethics / Internet ethics

            Is It Safe? We’ve all heard the horror stories: viruses, crashes, power outages, hackers, fraud, eyestrain, aching wrists and all the other unwanted side effects of the Information Age. Face it:

            Add to Reading List

            Source URL: www.untechnicalpress.com

            Language: English - Date: 2001-12-10 17:57:44
            UPDATE