Hacker

Results: 1388



#Item
731Just another Perl hacker / Perl / Classical cipher

PDF Document

Add to Reading List

Source URL: www.prapatti.com

Language: English - Date: 2004-05-01 12:12:40
732Socioeconomics / Habitat for Humanity / Homelessness / Affordable housing / Public housing / Personal life / Global Hunger Index / Development / GHI / Development charities

GLOBAL HOUSING INDICATORS: Evidence for action STEFFAN HACKER

Add to Reading List

Source URL: www.globalurban.org

Language: English - Date: 2014-01-14 16:50:37
733Security / OWASP / Software testing / Web application security / Application security / Vulnerability / Imperva / Computer network security / Computer security / Cyberwarfare

Don’t Bring A Knife To A Gun Fight: The Hacker Intelligence Initiative Robert Rachwald

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:52
734Oscillator semigroup / Physics / Just another Perl hacker / Perl

PDF Document

Add to Reading List

Source URL: www.prapatti.com

Language: English - Date: 2004-10-30 06:58:25
735Engineering / Science / Ethology / United States Army Corps of Engineers / United States Department of Defense / Geotechnical engineering

Welcome to the Diversify your Portfolio with the Nation’s Infrastructure Projects Roundtable Discussion Moderator: Jackie Hacker, Small Business Program Director, HDR Inc. Subject Matter Experts: Linda Morrison, Senior

Add to Reading List

Source URL: www.same.org

Language: English - Date: 2013-11-20 15:36:08
736Just another Perl hacker / Perl / Classical cipher / Computer programming / Computing / Software engineering

PDF Document

Add to Reading List

Source URL: www.prapatti.com

Language: English - Date: 2004-05-31 17:47:27
737Computer security / Hacking / Malware / Rootkit / Windows NT / Windows Server / Hacker / Microsoft SQL Server / Application security / Computing / Software / Microsoft Windows

Hacking / Hacking Exposed Windows: Windows Security Secrets and Solutions, Third Edition / Scambray, Andrews[removed]X AT A GLANCE ▼ ▼ ▼

Add to Reading List

Source URL: www.mhprofessional.com

Language: English - Date: 2008-02-25 10:40:32
738Cyberwarfare / Software testing / Relational database management systems / SQL / SQL injection / Imperva / Vulnerability / Web application security / Penetration test / Computing / Computer security / Computer network security

January 2013 Hacker Intelligence Initiative, Monthly Trend Report #15 Lessons Learned From the Yahoo! Hack How SQL Injection Vulnerabilities in Third-Party Code Can Make for Security Cloudy 1. Executive Summary

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2013-01-28 14:35:53
739Public safety / Computer security / Electronic commerce / Theft / Information security / Hacker / Password / Malware / Identity theft / Security / Crime prevention / National security

University of North Texas

Add to Reading List

Source URL: www.epcc.edu

Language: English - Date: 2011-08-22 14:31:40
740Numerical analysis / Vladimir Rokhlin /  Jr. / Vladimir Rokhlin / Fast multipole method / Randomized algorithm / New York University / Courant Institute of Mathematical Sciences / Mathematics / Theoretical computer science / Applied mathematics

Mark Tygert [removed] http://tygert.com Facebook, 1 Hacker Way, Menlo Park, CA[removed]Coleman Ave., Apt. N, Menlo Park, CA 94025

Add to Reading List

Source URL: tygert.com

Language: English - Date: 2014-06-17 17:29:56
UPDATE