Hackers

Results: 356



#Item
21

The User in the Loop Extensibility, Guile, and GNU GNU Hackers Meeting 2011 Andy Wingo Greetings!

Add to Reading List

Source URL: www.gnu.org

- Date: 2011-08-27 06:24:54
    22

    PRODUCT INFORMATION G DATA INTERNET SECURITY VIRUS PROTECTION AND A ROBUST FIREWALL FOR DEFENCE AGAINST HACKERS

    Add to Reading List

    Source URL: file.gdatasoftware.com

    - Date: 2016-09-08 11:42:41
      23

      identityfinder Home Edition Identity thieves can find your personal information! Can you? Computers are frequently under attack from hackers, viruses, and other threats. No matter how strong your defenses, eventually one

      Add to Reading List

      Source URL: www.identityfinder.com

      - Date: 2010-07-09 14:55:04
        24

        Yeshiva University’s Fall 2016 Hackathon OctoberJewish Hackers. 24 Hours. 300 of the world’s most creative and passionate students are coming to Yeshiva University for Invent:YU Israel – 24 hours of hac

        Add to Reading List

        Source URL: s3.amazonaws.com

        - Date: 2016-09-19 22:18:10
          25

          PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

          Add to Reading List

          Source URL: prevoty.com

          - Date: 2016-08-26 19:25:25
            26

            Getting Things Done for Hackers http://gtdfh.branchable.com/ Lars Wirzenius http://liw.fi/

            Add to Reading List

            Source URL: files.liw.fi

            - Date: 2012-05-30 05:34:31
              27

              Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

              Add to Reading List

              Source URL: www.pcisecuritystandards.org

              - Date: 2015-08-24 10:06:28
                28

                A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers!

                Add to Reading List

                Source URL: www.blackhat.com

                - Date: 2015-05-28 15:51:02
                  29

                  Hackers, Snoopers, Data Miners & Medical Records Mistakes: Oh My!!! Barriers to Expanded Data-Sharing and The Tremendous Good It Can Do Francie Grace @franciegrace

                  Add to Reading List

                  Source URL: www.ehcca.com

                  - Date: 2016-05-10 09:50:54
                    30

                    Items Cataloged in October 2014 Title The innovators : how a group of hackers, geniuses, and geeks created the digital revolution The innovators : how a group of hackers, geniuses, and geeks created the digital revolutio

                    Add to Reading List

                    Source URL: www.fortsmithlibrary.org

                    - Date: 2014-11-07 15:02:45
                      UPDATE