Hackers: Heroes of the Computer Revolution

Results: 52



#Item
21How Digital Technology Found Utopian Ideology: Lessons From the First Hackers’ Conference Fred Turner Department of Communication Stanford University Forthcoming in David Silver and Adrienne Massanari, eds., Critical C

How Digital Technology Found Utopian Ideology: Lessons From the First Hackers’ Conference Fred Turner Department of Communication Stanford University Forthcoming in David Silver and Adrienne Massanari, eds., Critical C

Add to Reading List

Source URL: fredturner.stanford.edu

Language: English - Date: 2012-08-02 18:55:52
22NB pro seminar on the Sony hack

NB pro seminar on the Sony hack

Add to Reading List

Source URL: www.noticebored.com

Language: English - Date: 2015-03-12 16:50:13
23A Marriage of Convenience: THE FOUNDING OF THE MIT ARTIFICIAL INTELLIGENCE LABORATORY Stefanie Chiou Craig Music

A Marriage of Convenience: THE FOUNDING OF THE MIT ARTIFICIAL INTELLIGENCE LABORATORY Stefanie Chiou Craig Music

Add to Reading List

Source URL: worrydream.com

Language: English - Date: 2013-07-29 17:47:12
24Peter the Great vs Sun Tzu - A Trend Micro Opinion Paper

Peter the Great vs Sun Tzu - A Trend Micro Opinion Paper

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2013-03-12 23:50:27
25Internet Safety: How to Protect Yourself Against Hackers From the Office of Minnesota Attorney General Lori Swanson With the Internet continuing to grow, some criminals, known as hackers, illegally obtain usernames and p

Internet Safety: How to Protect Yourself Against Hackers From the Office of Minnesota Attorney General Lori Swanson With the Internet continuing to grow, some criminals, known as hackers, illegally obtain usernames and p

Add to Reading List

Source URL: www.ag.state.mn.us

Language: English - Date: 2014-12-16 17:19:44
26National security / Meteorology / Intelligence / Computer security / Threat / Human intelligence / Central Intelligence Agency / Hackers: Heroes of the Computer Revolution / Industrial espionage / Security / Computer network security / Wind

TRA-1 Harmonized Threat and Risk Assessment Methodology Appendix C-2 - Threat Listing

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-30 04:29:12
27Living Research 2012 — Volume 3 the adults in their lives. It is one thing to get children interested in eating healthy and being active and then

Living Research 2012 — Volume 3 the adults in their lives. It is one thing to get children interested in eating healthy and being active and then

Add to Reading List

Source URL: 199407300.r.worldcdn.net

Language: English - Date: 2014-08-12 23:39:20
28Microsoft Word - EOC_English1_sec0_6250_special.doc

Microsoft Word - EOC_English1_sec0_6250_special.doc

Add to Reading List

Source URL: www.ncpublicschools.org

Language: English - Date: 2009-08-14 09:34:05
29Worse is Better is Worse Nickieben Bourbaki1 In June 1991, AI Expert published a paper by my friend Richard Gabriel entitled “Lisp: Good News, Bad News, How to Win Big.” One of the nice things about the article—rea

Worse is Better is Worse Nickieben Bourbaki1 In June 1991, AI Expert published a paper by my friend Richard Gabriel entitled “Lisp: Good News, Bad News, How to Win Big.” One of the nice things about the article—rea

Add to Reading List

Source URL: www.dreamsongs.com

Language: English - Date: 2012-08-04 16:00:13
30How safe are our secrets from hackers? Talking points 1. How does Steve Breen address two different news reports in a single cartoon? 2. Which type of hacking

How safe are our secrets from hackers? Talking points 1. How does Steve Breen address two different news reports in a single cartoon? 2. Which type of hacking

Add to Reading List

Source URL: www.nieonline.com

Language: English - Date: 2014-09-10 10:15:51