Hacker

Results: 1388



#Item
291Computer network security / Rapid7 / Penetration test / Attack / Hacker / Computing / Software / Computer security

Success Story Rapid7 Conducts a Penetration Test for Eyelock

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-01-21 08:01:42
292Crime / Hacking / Legion of Doom / The Hacker Crackdown / Computer crimes / Cyberspace / Hacker / Craig Neidorf / Phrack / Computing / Cybercrime / Phreaking

LITERARY FREEWARE — Not for Commercial Use by Bruce Sterling <> Sideways PDF version 0.1 by E-Scribe <>

Add to Reading List

Source URL: www.hacker-ethik.de

Language: English - Date: 2014-01-18 06:48:12
293Programmer / Hacker / Object-oriented programming / Recruiter / Computing / Programming paradigms / Computer programming

The Final Triumph of the Junior Programmer Conrad Weisert, Information Disciplines, Inc., Chicago December 12, 2001 A radical terminology shift Growing evidence indicates that there are no longer

Add to Reading List

Source URL: www.idinews.com

Language: English - Date: 2002-06-02 11:57:33
294Michigan / Germany / Kindertransport / United Kingdom / KTA / Email / Westin Hotels / Bibliography of The Holocaust / Holocaust Memorial Center / The Holocaust / Geography of Michigan / Metro Detroit

  KINDERTRANSPORT ASSOCIATION, INC. Executive Committee Melissa Hacker, President Anita Weisbord, Vice-President

Add to Reading List

Source URL: www.kindertransport.org

Language: English - Date: 2015-03-14 14:42:24
295Hackers: Heroes of the Computer Revolution / Hacker / Christian monasticism / Computing / World Heritage Sites in Italy / Matera

Can Monasteries Be a Model for Reclaiming Tech Cultu... http://www.thenation.com/print/articlecan-mo... Published on The Nation (http://www.thenation.com)

Add to Reading List

Source URL: www.therowboat.com

Language: English - Date: 2014-09-02 13:10:52
296Computer network security / Hacking / Computer crimes / Phreaking / Mark Abene / Great Hacker War / Masters of Deception / Hacker / Penetration test / Cybercrime / Computing / Legion of Doom

HITBSecConf2007 - Malaysia

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:52:30
297Software testing / Hacking / Black Hat Briefings / David Litchfield / Vulnerability / Application security / SecurityFocus / Hacker / Security / Computer security / Computing / Cyberwarfare

Visit us at: www.microsoft.com/security security portal SecurityFocus is the leading provider of security intelligence services for business, and a trusted information resource for the security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:14
298Troff / literate programming / Identifier / Keyword / C / Computing / Software engineering / Noweb

The noweb Hacker’s Guide Norman Ramsey∗ Department of Computer Science Princeton University SeptemberRevised August 1994, December 1997)

Add to Reading List

Source URL: www.literateprogramming.com

Language: English - Date: 2007-10-09 02:22:56
299Just another Perl hacker / Perl / Classical cipher / Computer programming / Software engineering / Computing

"!"# "#$ )**"%#& $% &’ !"!

Add to Reading List

Source URL: just.ustc.edu.cn

Language: English - Date: 2009-05-05 05:43:00
300Obfuscated code / Obfuscation / Source code / Just another Perl hacker / Computer programming / Computing / Software engineering

ART lino.printing Printing

Add to Reading List

Source URL: www.bhiec.com.au

Language: English - Date: 2013-04-02 06:47:44
UPDATE