Hackers: Heroes of the Computer Revolution

Results: 52



#Item
11甀渀琀椀琀氀攀搀

甀渀琀椀琀氀攀搀

Add to Reading List

Source URL: www.nytimes.com

Language: English - Date: 2013-07-14 03:00:58
12© Copyright, Princeton University Press. No part of this book may be distributed, posted, or reproduced in any form by digital or mechanical means without prior written permission of the publisher. INTRODUCTION

© Copyright, Princeton University Press. No part of this book may be distributed, posted, or reproduced in any form by digital or mechanical means without prior written permission of the publisher. INTRODUCTION

Add to Reading List

Source URL: press.princeton.edu

Language: English - Date: 2012-11-19 15:43:51
13Chapter Eight The Antithesis Exercise • • • •

Chapter Eight The Antithesis Exercise • • • •

Add to Reading List

Source URL: www.stevendkrause.com

Language: English - Date: 2007-04-22 19:59:13
14Sponsorship Proposal The Largest Hackathon in Arizona March 6th – 8th+ Hackers 36 Hours

Sponsorship Proposal The Largest Hackathon in Arizona March 6th – 8th+ Hackers 36 Hours

Add to Reading List

Source URL: hackarizona.org

Language: English - Date: 2015-01-03 00:38:19
15The following is a sample of Copy Hackers Book 1: Where Stellar Messages Come From, updated in June 2014 and copyright of Joanna Wiebe. To get this whole ebook and others in the Copy Hackers series – so you can stop mu

The following is a sample of Copy Hackers Book 1: Where Stellar Messages Come From, updated in June 2014 and copyright of Joanna Wiebe. To get this whole ebook and others in the Copy Hackers series – so you can stop mu

Add to Reading List

Source URL: copyhackers.com

Language: English - Date: 2014-06-22 23:01:35
16The following is a sample of Copy Hackers Book 2: Headlines, Subheads and Value Propositions, updated in June 2014 and copyright of Joanna Wiebe. To get this whole ebook and others in the Copy Hackers series – so you c

The following is a sample of Copy Hackers Book 2: Headlines, Subheads and Value Propositions, updated in June 2014 and copyright of Joanna Wiebe. To get this whole ebook and others in the Copy Hackers series – so you c

Add to Reading List

Source URL: copyhackers.com

Language: English - Date: 2014-06-22 23:01:39
17Opening Times Saturday 25 April: 10.00am - 6.00pm Sunday 26 April: 10.00am - 5.00pm YS A

Opening Times Saturday 25 April: 10.00am - 6.00pm Sunday 26 April: 10.00am - 5.00pm YS A

Add to Reading List

Source URL: www.life.org.uk

Language: English - Date: 2015-02-04 04:44:35
18Life Strategies, Part Two

Life Strategies, Part Two

Add to Reading List

Source URL: fs.gallup.unm.edu

Language: English - Date: 2012-07-22 14:16:34
19Information → Knowledge → Wisdom: Progression of Society in the Age of Computer Ralph C. Losey1 The personal computer revolution started by the Hacker elite in the 1970s

Information → Knowledge → Wisdom: Progression of Society in the Age of Computer Ralph C. Losey1 The personal computer revolution started by the Hacker elite in the 1970s

Add to Reading List

Source URL: ralphlosey.files.wordpress.com

Language: English - Date: 2015-04-08 19:26:20
20Computer users face hard choice—pay ransom or lose files

Computer users face hard choice—pay ransom or lose files

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-04-18 10:39:30