Hackers

Results: 356



#Item
51Cyberwarfare / Computer network security / Hacker culture / Hacking / Cybercrime / Security hacker / Computer security / Rootkit / Hackers: Heroes of the Computer Revolution / Internet security / Firewall / Hacker

Teaching the Principles of the Hacker Curriculum to Undergraduates Sergey Bratus Anna Shubina

Add to Reading List

Source URL: www.ists.dartmouth.edu

Language: English - Date: 2010-01-25 17:05:27
52Hardware virtualization / Virtualization / Sandbox / X86 virtualization

secuBT  – Hacking the Hackers with User­Space  Virtualization Mathias Payer <>

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
53Computing / Memory management / Computer architecture / Software / Virtual memory / Inter-process communication / Page table / Mmap / Page fault / Shared memory / Pointer / Page

OLS 2003 Impressions Put 500 kernel hackers together, and what do you get? Muli Ben-Yehuda

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:09
54

PRODUCT POSITIONING DOCUMENT – TEMPLATE This worksheet appears in Copy Hackers Book 1: Where Stellar Messages Come From. Feature

Add to Reading List

Source URL: copyhackers.com

- Date: 2012-05-17 16:13:13
    55

    SWISS CYBER STORM Communiqué de presse Les meilleurs jeunes hackers suisses ont été sélectionnés La pression n’était pas des moindres pour les 17 meilleurs jeunes «cyber-talents», le week-end dernier: dans

    Add to Reading List

    Source URL: www.satw.ch

    Language: French - Date: 2015-09-15 05:28:32
      56

      foto CC-BY Luca Serazzi Een gezinsvriendelijk zomerkamp voor hackers, makers en diy’ers. FRI3D CAMP

      Add to Reading List

      Source URL: fri3d.be

      - Date: 2016-06-16 17:51:12
        57

        SWISS CYBER STORM Communiqué de presse Les meilleurs jeunes hackers de Suisse : une cible de choix pour les recruteurs en informatique

        Add to Reading List

        Source URL: www.satw.ch

        Language: French - Date: 2015-08-03 03:42:51
          58

          MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK

          Add to Reading List

          Source URL: macsphere.mcmaster.ca

          Language: English - Date: 2016-04-20 15:58:34
            59

            COVER FEATURE Cognitive Hacking: A Battle for the Mind Cognitive hackers manipulate a user’s perception and rely on his changed

            Add to Reading List

            Source URL: www.ists.dartmouth.edu

            Language: English - Date: 2008-09-11 13:37:41
              60

              TRAVEL GRANT REQUESTS The FreeBSD Foundation Travel Policy Travel grants are available to FreeBSD developers (kernel hackers, documentation authors, bugbusters, system administrators, etc), who need assistance with trave

              Add to Reading List

              Source URL: www.freebsdfoundation.org

              Language: English - Date: 2016-01-18 19:31:20
                UPDATE