The Hacker

Results: 480



#Item
121Economy of the European Union / Economics / Fiscal policy / Eurozone / Euro / Austerity / Greece / Stability and Growth Pact / European Union / European sovereign debt crisis / Europe

PERSPECTIVE Europe: Sink or Swim? The German Approach to the Crisis May Prove to Be Economic and Political Dynamite for the EU BJÖRN HACKER

Add to Reading List

Source URL: www.fesdc.org

Language: English - Date: 2011-07-01 11:56:14
122Native American history / Paleo-Indians / Recent single origin hypothesis / David G. Anderson / J&J Hunt Submerged Archaeological Site / Americas / History of North America / Archaic period in the Americas

A PRELIMINARY ARCHAEOLOGICAL CONTEXT FOR GREENVILLE COUNTY, SOUTH CAROLINA Michael Trinkley, Ph.D., Debi Hacker, and Natalie Adams Introduction This section presents information about the archaeology that has been done i

Add to Reading List

Source URL: chicora.org

Language: English - Date: 2008-07-09 16:34:05
123Computer crime / Convention on Cybercrime / Computer fraud / Cyberterrorism / Hacker / Organized crime / Cyberstalking / Computer security / International Cybercrime / Cybercrime / Computer crimes / Crime

A Critical Look at the Regulation of Cybercrime ___________________________________________

Add to Reading List

Source URL: www.crime-research.org

Language: English - Date: 2005-09-13 11:14:47
124Road transport / Vehicle inspection / Inspection / MOT test / Animal testing / Ofsted / Home inspection / Transport / Land transport / Car safety

CERTIFIED ETHICAL HACKER, v8 Days: 5 Description: This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive envi

Add to Reading List

Source URL: www.lantecctc.com

Language: English - Date: 2013-09-26 11:37:14
125Elementary algebra / Multiplication / Multiplicative inverse / Elliptic curve cryptography / Elliptic curves / Mathematics / Algebra / Abstract algebra

ERRORS IN HACKER’S DELIGHT Sixth and later printings P. 4 line 14: Append a semicolon in the “code” font, so that the line is

Add to Reading List

Source URL: www.hackersdelight.org

Language: English - Date: 2012-12-31 16:33:54
126Donald Knuth / TeX / Typesetting / Application software / Publishing / Typography / Desktop publishing software / Digital typography

ERRORS IN HACKER’S DELIGHT First, second, fourth, and fifth printings P. 2: The latest C standard allows //-style comments. Therefore, replace the entire

Add to Reading List

Source URL: www.hackersdelight.org

Language: English - Date: 2012-12-31 16:33:36
127Computing / Computer network security / Hacking / Penetration test / Phishing / Metasploit Project / Social engineering / Hacker / Cross-site scripting / Software testing / Computer security / Cyberwarfare

Hack Yourself First A Beginner’s Guide to Penetration Testing   Copyright © 2013 by LCI Technology Group, LLC This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0

Add to Reading List

Source URL: averagesecurityguy.files.wordpress.com

Language: English - Date: 2015-01-07 13:03:36
128Economics / Business / UHY Hacker Young / UHY Advisors / International economics / Foreign direct investment

MEDIA RELEASENEW STUDY REVEALS AUSTRALIA BELOW GLOBAL AVERAGE IN ATTRACTING FDI A new 33 country comparison study released yesterday revealed Australia sits below the global average in attracting Foreign Direct

Add to Reading List

Source URL: www.uhyhnbrisbane.com.au

Language: English - Date: 2014-03-31 21:42:33
129Function / Boolean algebra / Canonical form / FO / Mutual information / Μ operator / Mathematics / Mathematical logic / Algebraic logic

REVISIONS These pages are revisions, mostly new material, for Hacker’s Delight. This material is relative to the sixth printing. --Page 4, insert this new paragraph just before Section 1–2:

Add to Reading List

Source URL: www.hackersdelight.org

Language: English - Date: 2012-03-29 17:07:13
130Internet radio / Internet television / Streaming / Webcast / Web conferencing / Hacker / Malware / Black hat / Internet / Internet culture / Computing / Hacking

Sponsorship Opportunities Black Hat Webcast Series Reach A Passionate Audience Black Hat Webcasts focus on the most relevant and intriguing issues facing today’s security

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:13
UPDATE