Hacker

Results: 1388



#Item
841Andrew Hacker / Education

SUMA K4180 Writing about Global Science for the International Media Instructor : Claudia Dreifus Course Description This is an interdisciplinary workshop for scientists, future NGO workers and journalists seeking skills

Add to Reading List

Source URL: sustainability.ei.columbia.edu

Language: English - Date: 2013-07-31 11:01:05
842Crime prevention / National security / Malware / Identity theft / Password / Computer security / Email / Hacker / Internet / Security / Computing / Technology

Are You Safe On-line? What you don’t know will send your bank details to Russia! Introduction When Apollo 11 made its historic landing on the moon, the total computing power in the landing craft was far less than you h

Add to Reading List

Source URL: netlogx.com

Language: English - Date: 2014-08-31 21:24:21
843Fax / Advertising / The New York Times / Business / Design / Technology / 2600: The Hacker Quarterly / Kevin Mitnick

The New York Times Magazine Color Production 216 Greenfield Road Lancaster, PA[removed]Phone: [removed]or 2397 FAX: [removed]

Add to Reading List

Source URL: nytmediakit.com

Language: English - Date: 2012-05-15 11:06:40
844Classical cipher / Just another Perl hacker / Computer programming / Software engineering / Computing

APPENDIX A. MAP DISPLAYS FOR CENTRAL CALIFORNIA In this appendix, map displays are provided for individual ozone-episode days occurring in central California. The calculations were carried out using the NOy version of t

Add to Reading List

Source URL: narsto.org

Language: English - Date: 2012-10-31 12:15:59
845Academia / New England Small College Athletic Conference / Massachusetts Institute of Technology / Department of Computer Science / The Fletcher School of Law and Diplomacy / Tufts University / Massachusetts / New England Association of Schools and Colleges

Newsletter Issue 3:2 SPRING[removed]Department of computer science Doctoral student Sam Hincks wearing the brain scanning device in the Human-Computer Interaction Lab. (Steffan Hacker/Tufts University)

Add to Reading List

Source URL: www.cs.tufts.edu

Language: English - Date: 2014-05-09 11:13:05
846Just another Perl hacker / Perl / Harrison Pope

Microsoft Word - ARA ICI_.doc

Add to Reading List

Source URL: www.nato.int

Language: English - Date: 2009-10-15 05:56:07
847Computer network security / Security / Computer crimes / Malware / Hacker / Vulnerability / Attack / Cyberwarfare / Hacking / Computer security

Word Work File L_845054805

Add to Reading List

Source URL: www.ncsha.org

Language: English - Date: 2014-12-03 20:16:09
848Paragraph / Typography / Plagiarism / Citation / Hacker / Politics and the English Language / Computing / Bibliography / Writing

CALIFORNIA STATE UNIVERSITY, SACRAMENTO

Add to Reading List

Source URL: www.csus.edu

Language: English - Date: 2012-07-24 14:39:28
849Cyberterrorism / Cyberstalking / Computer fraud / Organized crime / Hacker / Malware / Computer security / Federal Bureau of Investigation / International Cybercrime / Cybercrime / Computer crimes / Crime

International Society for the Reform of Criminal Law 16th Annual Conference Technology and Its Effects on Criminal Responsibility, Security and Criminal Justice (December 6-10, 2002)

Add to Reading List

Source URL: www.isrcl.org

Language: English - Date: 2004-07-09 16:08:01
850Just another Perl hacker / Perl

PDF Document

Add to Reading List

Source URL: www.dep.state.pa.us

Language: English - Date: 2004-12-01 09:23:25
UPDATE