Hacker

Results: 1388



#Item
391

Observatoire du Management Alternatif Alternative Management Observatory __ Fiche de lecture L’éthique hacker

Add to Reading List

Source URL: appli6.hec.fr

Language: French - Date: 2013-05-25 14:31:24
    392Data security / Security / Software testing / Hacking / Information security / Penetration test / Hacker / Email / Vulnerability / Computing / Computer security / Computer network security

    JOB DESCRIPTION 1 Information Security Compliance In-charge 1.1

    Add to Reading List

    Source URL: nisg.org

    Language: English - Date: 2015-02-11 05:02:20
    393Just another Perl hacker / Perl / Obfuscated code / Computer programming / Software engineering / Computing

    Microsoft WordPrisoners.doc

    Add to Reading List

    Source URL: www.crcnsw.org.au

    Language: English - Date: 2011-05-26 20:04:45
    394Cyberwarfare / Computing / National security / Malware / Computer crimes / Hacker / Hacking / Attack / Department of Defense Cyber Crime Center / Computer network security / Security / Computer security

    training.keywcorp.com This two-day course introduces managers to the processes, techniques, and terminology used by cyber professionals to explain, discover, and prevent threats to enterprise networks and sensitive busi

    Add to Reading List

    Source URL: training.keywcorp.com

    Language: English - Date: 2015-02-20 11:19:54
    395Kludge / Software bug / Software development process / Hacker / X Window System / Computing / Software / Software quality

    software construction Editors: Andy Hunt and Dave Thomas ■ The Pragmatic Programmers a n d y @ p r a g m a t i c p r o g r a m m e r. c o m ■ d a v e @ p r a g m a t i c p r o g r a m m e r. c o m Zero-Tolerance Cons

    Add to Reading List

    Source URL: media.pragprog.com

    Language: English - Date: 2007-10-31 17:44:24
    396Annual general meeting / Meetings

    THE ROYAL SCOTTISH COUNTRY DANCE SOCIETY Queensland Branch Incorporated Secretary Bryan Hacker PO Box 178

    Add to Reading List

    Source URL: www.rscds.org.au

    Language: English - Date: 2015-04-02 05:30:35
    397UHY Advisors / UHY Hacker Young

    TAX ALERT TAX ALERT UPDATE ON IRS DEVELOPMENTS CONCERNING THE RECENT TAX COURT DECISION ON IRA ROLLOVERS On January 28, 2014, the Tax Court in Bobrow v.

    Add to Reading List

    Source URL: uhy-us.com

    Language: English - Date: 2014-03-24 16:51:29
    398Cross-platform software / Perl 6 / Procedural programming languages / Formal languages / Rakudo Perl 6 / Perl / Compiler / Code generation / Parse tree / Software / Computing / Compiler construction

    Inside A Compiler Jonathan Worthington Compiler Hacker Rakudo Perl 6 core developer

    Add to Reading List

    Source URL: www.jnthn.net

    Language: English - Date: 2014-10-21 09:51:24
    399Rhetoric / Writing / Academia / Thesis / Hackers: Heroes of the Computer Revolution / Essay / Hacker / Tron / Nothing / Computing / Education / Knowledge

    Chapter Eight The Antithesis Exercise • • • •

    Add to Reading List

    Source URL: www.stevendkrause.com

    Language: English - Date: 2007-04-22 19:59:13
    400Perl / Main function / Printf format string / XS / Just another Perl hacker / CPAN / Regular expression / C / Eval / Computing / Software engineering / Computer programming

    Perl versiondocumentation - perlembed NAME perlembed - how to embed perl in your C program DESCRIPTION

    Add to Reading List

    Source URL: perldoc.perl.org

    Language: English - Date: 2014-10-03 15:41:59
    UPDATE