Hacker

Results: 1388



#Item
341Economy of the European Union / Economics / Fiscal policy / Eurozone / Euro / Austerity / Greece / Stability and Growth Pact / European Union / European sovereign debt crisis / Europe

PERSPECTIVE Europe: Sink or Swim? The German Approach to the Crisis May Prove to Be Economic and Political Dynamite for the EU BJÖRN HACKER

Add to Reading List

Source URL: www.fesdc.org

Language: English - Date: 2011-07-01 11:56:14
342Hackathon / Internet slang / OpenBSD / Hacker / Sponsor / Computing / Software development / Electronics

Sponsor Information http://pennapps.com January 16-18, 2015

Add to Reading List

Source URL: 2015s.pennapps.com

Language: English - Date: 2015-04-01 12:59:38
343Native American history / Paleo-Indians / Recent single origin hypothesis / David G. Anderson / J&J Hunt Submerged Archaeological Site / Americas / History of North America / Archaic period in the Americas

A PRELIMINARY ARCHAEOLOGICAL CONTEXT FOR GREENVILLE COUNTY, SOUTH CAROLINA Michael Trinkley, Ph.D., Debi Hacker, and Natalie Adams Introduction This section presents information about the archaeology that has been done i

Add to Reading List

Source URL: chicora.org

Language: English - Date: 2008-07-09 16:34:05
344Computer crime / Convention on Cybercrime / Computer fraud / Cyberterrorism / Hacker / Organized crime / Cyberstalking / Computer security / International Cybercrime / Cybercrime / Computer crimes / Crime

A Critical Look at the Regulation of Cybercrime ___________________________________________

Add to Reading List

Source URL: www.crime-research.org

Language: English - Date: 2005-09-13 11:14:47
345Road transport / Vehicle inspection / Inspection / MOT test / Animal testing / Ofsted / Home inspection / Transport / Land transport / Car safety

CERTIFIED ETHICAL HACKER, v8 Days: 5 Description: This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive envi

Add to Reading List

Source URL: www.lantecctc.com

Language: English - Date: 2013-09-26 11:37:14
346Cyberwarfare / Crime / Computer law / Electronics / Computer Misuse Act / Legal aspects of computing / Hacker / Cyberterrorism / Computer security / Computer crimes / Computing / Hacking

black hat briefings Cyber-crime Assoc Professor Harry SK Tan Director, CAPTEL

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
347Elementary algebra / Multiplication / Multiplicative inverse / Elliptic curve cryptography / Elliptic curves / Mathematics / Algebra / Abstract algebra

ERRORS IN HACKER’S DELIGHT Sixth and later printings P. 4 line 14: Append a semicolon in the “code” font, so that the line is

Add to Reading List

Source URL: www.hackersdelight.org

Language: English - Date: 2012-12-31 16:33:54
348Honeypot / Spamming / Hacker / Computing / Hacking / Computer network security

Publication in “Pro[ek]taseis”, special issue of Naftemporiki Newspaper, December 2006

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-04-27 06:39:18
349Malware / Cyberwarfare / Hacking / Hacker / Computer virus / Antivirus software / Virus / Computer security / Trojan horse / Computing / Espionage / Computer network security

Folk Models of Home Computer Security Rick Wash Michigan State University East Lansing, MI

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-06-12 17:19:52
350Donald Knuth / TeX / Typesetting / Application software / Publishing / Typography / Desktop publishing software / Digital typography

ERRORS IN HACKER’S DELIGHT First, second, fourth, and fifth printings P. 2: The latest C standard allows //-style comments. Therefore, replace the entire

Add to Reading List

Source URL: www.hackersdelight.org

Language: English - Date: 2012-12-31 16:33:36
UPDATE