The Hacker

Results: 480



#Item
111Hacking / Cyberwarfare / Software testing / Emirates Telecommunications Corporation / Penetration test / Hacker / Network security / Oracle Corporation / Telecommunications Regulatory Authority / Computer network security / Computing / Computer security

HITBSecConf2008 – Dubai Conference Kit Supported & Endorsed by Hack In The Box Security ConferenceDubai

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:53:31
112Hacker / Defacement / Patriotic hacking / Hacking / Computing / Hacktivism

Computer Networks as a Battle Ground in the Middle East and Beyond Kenneth Geers, NCIS Dr. Peter Feaver, Duke University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:35
113Gynaecology / Medicine / Gynecologic oncology / Royal Hospital for Women

Media Release 3 August, 2013 INTERNATIONAL GYNAECOLOGICAL CANCER EXPERT FROM ‘THE ROYAL’ RECEIVES PREMIER’S AWARD Professor Neville Hacker, Director of Gynaecological Oncology at the Royal Hospital for Women, has

Add to Reading List

Source URL: www.seslhd.health.nsw.gov.au

Language: English - Date: 2013-09-04 21:15:11
114Software testing / Security / Hacking / Penetration test / Vulnerability / Hacker / Attack / Network security / HD Moore / Computer network security / Computer security / Cyberwarfare

HACK IN THE BOX SECURITY CONFERENCE 2003 SPONSORSHIP KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:44:22
115DIY culture / Hacker groups / TOG / Electronic waste / Upcycling / Obsolescence / Maintenance /  repair /  and operations / Sustainable design / Sustainability / Environment / Hackerspace

Research Summary: Global Surveys of Repair Cafés and Hackerspaces The Centre for Sustainable Design® at UCA, UK - July, 2014 This short paper is a summary of some of the findings of research undertaken by Professor Mar

Add to Reading List

Source URL: cfsd.org.uk

Language: English - Date: 2014-07-24 18:04:00
116Human spaceflight / Manned spacecraft / Space weapons / Almaz / Venture capital / Hack Day / Hacker / Bähr / Hack / Spaceflight / Space technology / Space stations

PHDays Сybersecurity Project Competition What: Almaz Capital is seeking startup projects in the cybersecurity space and all things related. Key requirement: projects should have the ambition to become globally competiti

Add to Reading List

Source URL: www.almazcapital.com

Language: English - Date: 2015-04-21 16:50:18
117DIY culture / Knowledge / Science / Educational psychology / Hacker groups / Obsolescence / Likert scale / Electronic waste / TOG / Market research / Psychometrics / Hackerspace

Grassroots Innovation and the Circular Economy A Global Survey of Repair Cafés and Hackerspaces Professor Martin Charter & Scott Keiller The Centre for Sustainable Design® University for the Creative Arts

Add to Reading List

Source URL: cfsd.org.uk

Language: English - Date: 2014-07-05 12:59:20
118Computer security / Data breach / Data security / Secure communication / Hacker / Identity theft / Computing / Computer network security / Cyberwarfare

BLOG from Advent Resources DATA BREACHES AND THE NEW CAR DEALERSHIP Feb 17 Private data breaches are nothing new and could even be considered common place in today’s digitally connected world. We’ve all heard about

Add to Reading List

Source URL: automotivedigest.com

Language: English - Date: 2015-02-24 14:09:20
119Hacker ethic / Richard Stallman / Free software movement / Typeface / Hacker / Copyleft / Free software / Free culture movement / Free and open source software / Computing / Social movements / Software licenses

THE FREE FONT MOVEMENT david crossland Dissertation submitted in partial fulfilment of the requirements for the MA Typeface Design, University of Reading, 2008

Add to Reading List

Source URL: understandingfonts.com

Language: English - Date: 2015-03-01 19:54:28
120Hacking / Military technology / Security / War / Crime / Computer security / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Electronic warfare / Computer crimes

deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
UPDATE