Hackers: Heroes of the Computer Revolution

Results: 52



#Item
21Hacker ethic / Hackers: Heroes of the Computer Revolution / Hacker / What the Hack / Information wants to be free / Hacks at the Massachusetts Institute of Technology / Electron / Steven Levy / Hacker Emblem / Computing / Electronics / Hacking

How Digital Technology Found Utopian Ideology: Lessons From the First Hackers’ Conference Fred Turner Department of Communication Stanford University Forthcoming in David Silver and Adrienne Massanari, eds., Critical C

Add to Reading List

Source URL: fredturner.stanford.edu

Language: English - Date: 2012-08-02 18:55:52
22Identity theft / Computing / Sony Pictures Entertainment / Copyright law of the United States / Hackers: Heroes of the Computer Revolution

NB pro seminar on the Sony hack

Add to Reading List

Source URL: www.noticebored.com

Language: English - Date: 2015-03-12 16:50:13
23Turing Award laureates / MIT Computer Science and Artificial Intelligence Laboratory / Massachusetts Institute of Technology / Computational neuroscience / Hackers: Heroes of the Computer Revolution / Marvin Minsky / Time-sharing / TX-0 / John McCarthy / Computing / Science / Lisp programming language

A Marriage of Convenience: THE FOUNDING OF THE MIT ARTIFICIAL INTELLIGENCE LABORATORY Stefanie Chiou Craig Music

Add to Reading List

Source URL: worrydream.com

Language: English - Date: 2013-07-29 17:47:12
24Cyberwarfare / Hacking / Hackers: Heroes of the Computer Revolution / Hacker / Advanced persistent threat / Malware / Trojan horse / Trend Micro / Computing / Cybercrime / Computer crimes

Peter the Great vs Sun Tzu - A Trend Micro Opinion Paper

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2013-03-12 23:50:27
25Cyberwarfare / Password / Spyware / Hackers: Heroes of the Computer Revolution / Hacker / Password manager / Crimeware / Espionage / Computing / Malware

Internet Safety: How to Protect Yourself Against Hackers From the Office of Minnesota Attorney General Lori Swanson With the Internet continuing to grow, some criminals, known as hackers, illegally obtain usernames and p

Add to Reading List

Source URL: www.ag.state.mn.us

Language: English - Date: 2014-12-16 17:19:44
26National security / Meteorology / Intelligence / Computer security / Threat / Human intelligence / Central Intelligence Agency / Hackers: Heroes of the Computer Revolution / Industrial espionage / Security / Computer network security / Wind

TRA-1 Harmonized Threat and Risk Assessment Methodology Appendix C-2 - Threat Listing

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-30 04:29:12
27Dutch diaspora / Mennonite / Simple living / Biology / Hackers: Heroes of the Computer Revolution / Psychology / Hippocampus / Brain / Peace churches / Anatomy / Neuroscience

Living Research 2012 — Volume 3 the adults in their lives. It is one thing to get children interested in eating healthy and being active and then

Add to Reading List

Source URL: 199407300.r.worldcdn.net

Language: English - Date: 2014-08-12 23:39:20
28Bermuda Triangle / Electronic Arts / Hackers: Heroes of the Computer Revolution / Hackers / Computer / Technology / Computing / Video game development / Bermuda

Microsoft Word - EOC_English1_sec0_6250_special.doc

Add to Reading List

Source URL: www.ncpublicschools.org

Language: English - Date: 2009-08-14 09:34:05
29Minicomputers / Lisp programming language / Functional languages / Lisp / Worse is better / PDP-10 / Unix / PDP-11 / Hackers: Heroes of the Computer Revolution / Computing / Software / Classes of computers

Worse is Better is Worse Nickieben Bourbaki1 In June 1991, AI Expert published a paper by my friend Richard Gabriel entitled “Lisp: Good News, Bad News, How to Win Big.” One of the nice things about the article—rea

Add to Reading List

Source URL: www.dreamsongs.com

Language: English - Date: 2012-08-04 16:00:13
30Joe Heller / Hackers: Heroes of the Computer Revolution / Journalism / Editorial cartooning / Association of American Editorial Cartoonists / Steve Breen

How safe are our secrets from hackers? Talking points 1. How does Steve Breen address two different news reports in a single cartoon? 2. Which type of hacking

Add to Reading List

Source URL: www.nieonline.com

Language: English - Date: 2014-09-10 10:15:51
UPDATE