Hacker

Results: 1388



#Item
331Spamming / Internet ethics / Social engineering / Computer crimes / Phishing / Identity theft / Hacker / Malware / Email spam / Computing / Internet / Cybercrime

Poster: Computer security information in stories, news articles, and education documents Katie Hoban, Emilee Rader, Rick Wash, Kami Vaniea Department of Media and Information Michigan State University {hobankat, emilee,

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-07-06 08:47:40
332Human spaceflight / Manned spacecraft / Space weapons / Almaz / Venture capital / Hack Day / Hacker / Bähr / Hack / Spaceflight / Space technology / Space stations

PHDays Сybersecurity Project Competition What: Almaz Capital is seeking startup projects in the cybersecurity space and all things related. Key requirement: projects should have the ambition to become globally competiti

Add to Reading List

Source URL: www.almazcapital.com

Language: English - Date: 2015-04-21 16:50:18
333DIY culture / Knowledge / Science / Educational psychology / Hacker groups / Obsolescence / Likert scale / Electronic waste / TOG / Market research / Psychometrics / Hackerspace

Grassroots Innovation and the Circular Economy A Global Survey of Repair Cafés and Hackerspaces Professor Martin Charter & Scott Keiller The Centre for Sustainable Design® University for the Creative Arts

Add to Reading List

Source URL: cfsd.org.uk

Language: English - Date: 2014-07-05 12:59:20
334Computer security / Data breach / Data security / Secure communication / Hacker / Identity theft / Computing / Computer network security / Cyberwarfare

BLOG from Advent Resources DATA BREACHES AND THE NEW CAR DEALERSHIP Feb 17 Private data breaches are nothing new and could even be considered common place in today’s digitally connected world. We’ve all heard about

Add to Reading List

Source URL: automotivedigest.com

Language: English - Date: 2015-02-24 14:09:20
335Communication / Architectural design / Literacy / Hacker ethic / Hacker / Architectural design values / Information and communication technologies in education / Digital literacy / Digital electronics / Computing / Technology / Electronics

Designing Digital Technology and Materials for Digital Fabrication in Schools: a Hackerism Perspective Kasper Skov Christensen Abstract

Add to Reading List

Source URL: fablearn.eu

Language: English - Date: 2014-05-22 13:51:40
336Hacking / Cyberwarfare / Hacker / Lamp / Do it yourself / Computing / IKEA / Jardine Matheson Group

Learning from IKEA Hacking: “Iʼm Not One to Decoupage a Tabletop and Call It a Day.” Daniela Rosner School of Information University of California, Berkeley Berkeley, CAUSA

Add to Reading List

Source URL: faculty.washington.edu

Language: English - Date: 2014-09-29 22:49:31
337Hacker ethic / Richard Stallman / Free software movement / Typeface / Hacker / Copyleft / Free software / Free culture movement / Free and open source software / Computing / Social movements / Software licenses

THE FREE FONT MOVEMENT david crossland Dissertation submitted in partial fulfilment of the requirements for the MA Typeface Design, University of Reading, 2008

Add to Reading List

Source URL: understandingfonts.com

Language: English - Date: 2015-03-01 19:54:28
338Hacking / Military technology / Security / War / Crime / Computer security / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Electronic warfare / Computer crimes

deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
339Computer network security / Hacking / Computing / Vulnerability / Network security / Penetration test / Hacker / Malware / Attack / Computer security / Cyberwarfare / Software testing

BLACK HAT USA 2011 TRAINING CLASS CHANGE REQUEST FORM INSTRUCTIONS Please use one form per registrant. This form is for those who have an existing USA 2011 Training registration and have an existing Confirmation Number.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:00
340Cloud computing / Computer security / Hacker / Internet privacy / Antivirus software / International Cybercrime / Wireless security / Computing / Computer network security / Security

Microsoft Word - 70444994_article critiqe-good

Add to Reading List

Source URL: www.bestessays.com

Language: English - Date: 2014-01-14 10:26:30
UPDATE