Hackers

Results: 356



#Item
341IHub / Kenya / Innovation

@re:publica 2014 programme The Global Innovation Gathering brings together innovation hub managers, makers, hackers and entrepreneurs from across the world. If you are interested in hearing mirco and ignite talks from th

Add to Reading List

Source URL: re-publica.de

Language: English - Date: 2014-05-05 13:27:19
342Hackers: Heroes of the Computer Revolution / Hacker / Computer crime / Patrick Trueman / Computing / Hacking / Albert Gonzalez

hackers gone wild[removed]

Add to Reading List

Source URL: www.sabrinaerdely.com

Language: English - Date: 2010-10-11 21:04:54
343Education in Gujarat / Gujarat Technological University / GTU

GTU CMAI Workshop on Combating Cyber Crimes and Creating a Safe Web Space; Opportunity to understand, see live hacking and build career as Cyber Warriors- Ethical Hackers 22nd November, 2013 at Gujarat Technological Uni

Add to Reading List

Source URL: www.cmai.asia

Language: English - Date: 2013-11-21 06:35:34
344Grey hat / Hacking / Computing / Hacker

Hacking Tunisia Some Interesting Sources This paper gives some examples of internet sites by Tunisian hackers demonstrating the diversity of Tunisian electronic culture. Tunisian HaCkeR1 The site simply states: „Tunisi

Add to Reading List

Source URL: arabiacyberia.files.wordpress.com

Language: English - Date: 2014-01-24 14:06:19
345Computer law / Credit cards / Data privacy / Payment systems / Software / Malware / Payment Card Industry Data Security Standard / Computer virus / Crimeware / Antivirus software / Computer security / System software

Fact Sheet Understanding Malware Summary Malware is software used by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Hackers introduce malware

Add to Reading List

Source URL: www.mastercard.com

Language: English - Date: 2014-03-18 02:42:15
346Hacking / Hacker groups / Hacktivism / Hackers: Heroes of the Computer Revolution / Hacker / Anonymous / What the Hack / Project Chanology / Enid Gabriella Coleman / Computing / Technology / Cybercrime

E. Gabriella Coleman Wolfe Chair in Scientific and Technological Literacy McGill University (last revised June, 2013) Department of Art History and Communication Studies

Add to Reading List

Source URL: gabriellacoleman.org

Language: English - Date: 2013-06-22 08:22:25
347Software testing / Hacking / Cyberwarfare / Crime prevention / National security / Vulnerability / Social vulnerability / Penetration test / System administrator / Computer security / Security / Computer network security

Ethical Hackers Wanted For Outpost24 March, 2014 Outpost24, a world leading IT Security company within Vulnerability Management with local Sales Representatives/Partners in more than 30 countries and headquarters in Karl

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2014-03-11 05:50:23
348SQL / Relational database management systems / SQL*Plus / Oracle Database / Oracle Corporation / Transparent Data Encryption / Alexander Kornbrust / Password / SQL injection / Software / Computing / Data management

Hackers to Hackers Conference 4th. Ed. Hacking Hardened Oracle Databases Alexander Kornbrust 08-Nov-2007

Add to Reading List

Source URL: www.red-database-security.com

Language: English - Date: 2009-05-07 07:53:44
349Computer architecture / CPU cache / MESI protocol / Cache / Central processing unit / MSI protocol / Write-once / Computing / Cache coherency / Computer hardware

Memory Barriers: a Hardware View for Software Hackers Paul E. McKenney Linux Technology Center

Add to Reading List

Source URL: www.rdrop.com

Language: English - Date: 2010-06-07 19:36:09
350

THE HACKER CRACKDOWN (LA CAZA DE HACKERS) Ley y Desorden en la Frontera Electrónica

Add to Reading List

Source URL: www.uned.es

Language: Spanish - Date: 2006-02-22 09:33:55
    UPDATE