Hacker

Results: 1388



#Item
241Security / Application security / Application firewall / Penetration test / Hacker / Cloud computing / Web application security scanner / Computing / Computer security / Computer network security

5 reasons hackers love your application security strategy February

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:13
242Medicine / Alcoholic beverage / Drug culture / Alcoholism / National Alcohol Beverage Control Association / Alcohol abuse / Legal drinking age / Alcohol advertising / George Hacker / Drinking culture / Alcohol / Household chemicals

Alcohol Policy Research and Alcoholic Beverage Control Systems 3 AN ANNOTATED BIBLIOGRAPHY

Add to Reading List

Source URL: www.nabca.org

Language: English - Date: 2014-06-09 16:27:28
243Biology / Hacking / Biopunk / DIYbio / Hackerspace / Hacker / Crowdsourcing / Collective intelligence / Citizen science / Computing / Science / Social information processing

Ontological Disobedience in the Age of Tinkering: Crowdsourcing Data or Hacking Hardware? POSITION STATEMENT Denisa Kera

Add to Reading List

Source URL: conceptlab.com

Language: English - Date: 2014-06-04 17:01:52
244Advanced Programming in the Unix Environment / Berkeley Software Distribution / Addison-Wesley / W. Richard Stevens / Hacker / TCP/IP Illustrated / USENIX / Inter-process communication / Transmission Control Protocol / Computing / Unix / Pearson PLC

BIBLIOGRAPHY Aho, A.V., Kernighan, B.W., and Weinberger, P. JThe AWK Programming Language. Addison-Wesley, Reading, Massachusetts. Albitz, P., and Liu, CDNS and BIND (5th edition). O’Reilly, Sebastopol

Add to Reading List

Source URL: www.man7.org

Language: English - Date: 2015-05-07 06:42:59
245Internet slang / OpenBSD / Hacker / Computing / Software development / Hackathon

SANOTRON - CONNECT. ACCELERATE. CHANGE First Western Canada digital health hackathon wraps up in Vancouver with a slew of simple, useful and creative solutions for healthcare VANCOUVER, BC – February 28, 2013 – Hack

Add to Reading List

Source URL: old.hackinghealth.ca

Language: English - Date: 2013-03-19 22:24:54
246Hacker / Hacking / Electronics / Computing / Computer programming / Cyberwarfare

The Carol Hacker Award for Outstanding Victim Advocate within the Volunteer Sector The Carol Hacker Award is presented to an Outstanding Victim Advocate in the Volunteer Sector. Selecting one volunteer to receive special

Add to Reading List

Source URL: www.coloradocrimevictims.org

Language: English - Date: 2015-04-03 17:30:42
247Computing / Hacking / Hacker

PDF Document

Add to Reading List

Source URL: hackerslist.com

Language: English - Date: 2015-05-12 09:07:35
248Security / Application security / Application firewall / Penetration test / Hacker / Cloud computing / Web application security scanner / Computing / Computer security / Computer network security

5 reasons hackers love your application security strategy February

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:13
249Political ideologies / Hackerspace / Culture / Economics / Hacker groups / TOG / Bourgeoisie / Capitalism / Socialism / Economic ideologies / Sociology / Economies

---------~~ ~~~ II Hackerspaces 1 II History II

Add to Reading List

Source URL: conceptlab.com

Language: English - Date: 2014-06-04 17:01:50
UPDATE