Hacker

Results: 1388



#Item
271Multimodal interaction / Computer programming / Cyberwarfare / Hacker / Hacking / Interaction design / Ubiquitous computing / Ambient intelligence / DIY ethic / Computing / Electronics / Design

Panel: Design for Hackability Moderator: Anne Galloway Carleton University Dept. of Sociology & Anthropology 1125 Colonel By Drive

Add to Reading List

Source URL: www.purselipsquarejaw.org

Language: English - Date: 2005-05-07 12:04:09
272Data / Data security / Software development process / Information technology management / Needs assessment / Black Hat Briefings / Federal Information Security Management Act / Hacker / Information security / Computer security / Security / Computing

Joseph Klein The Social Engineering Engagement Methodology—A Formal Testing Process of the People and Process The security of an organization is composed of technology, people and processes. In the last few years, many

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
273

When startups are ready to scale, one challenge that often crops up is finding the right person to lead the growth charge. Stage right: the growth hacker. A good growth hacker has a burning desire to connect a target mar

Add to Reading List

Source URL: blog.kissmetrics.com

Language: English - Date: 2015-01-28 19:23:30
    274Norfolk/Pitcairnese alphabet / Latin alphabets / Just another Perl hacker / Perl

              

    Add to Reading List

    Source URL: www.ens-lyon.fr

    Language: English - Date: 2004-09-20 09:16:06
    275Crime prevention / National security / Hacking / Computer network security / Computer security / Hacker / Information security / Hacker ethic / Computing / Electronics / Security

    Microsoft PowerPoint - RecurityLabs_Academia_vs_Hackers_5.ppt

    Add to Reading List

    Source URL: www.recurity-labs.com

    Language: English - Date: 2008-08-18 12:04:47
    276Cyberwarfare / Penetration test / Vulnerability / Network security / Hacker / Attack / Security / Managed security service / HD Moore / Computer network security / Computing / Computer security

    HACK IN THE BOX SECURITY CONFERENCE 2003 BOOTH KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

    Add to Reading List

    Source URL: conference.hitb.org

    Language: English - Date: 2014-10-26 12:44:22
    277Software testing / Qualys / OWASP / Vulnerability / Security / Hacker / Computer security / Cyberwarfare / Computing

    HITB2011AMS  AGENDA  -­‐  CONFERENCE  DAY  1  -­‐  19TH  MAY  2011 TRACK  1 TRACK  2   TRACK  3  /  HITB  LABS

    Add to Reading List

    Source URL: conference.hitb.org

    Language: English - Date: 2014-10-26 13:01:24
    278Computer network security / Hacking / Computer crimes / Phreaking / Mark Abene / Great Hacker War / Masters of Deception / Hacker / Penetration test / Cybercrime / Computing / Legion of Doom

    HITBSecConf2007 - Malaysia

    Add to Reading List

    Source URL: conference.hackinthebox.org

    Language: English - Date: 2014-10-26 12:52:30
    279Just another Perl hacker / Perl / Classical cipher / Computer programming / Software engineering / Computing

              !  "#

    Add to Reading List

    Source URL: rainbow.ldeo.columbia.edu

    Language: English - Date: 2004-07-15 15:09:39
    280Nimda / Thor / Hacker / Singapore / DShield / Spaceflight / Comics / Political geography

    Welcome to Blackhat! Blackhat Security Briefings Singapore, October 4, 2002 Timothy M. Mullen AnchorIS.Com, Inc.

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:23
    UPDATE