The Hacker

Results: 480



#Item
141Kludge / Software bug / Software development process / Hacker / X Window System / Computing / Software / Software quality

software construction Editors: Andy Hunt and Dave Thomas ■ The Pragmatic Programmers a n d y @ p r a g m a t i c p r o g r a m m e r. c o m ■ d a v e @ p r a g m a t i c p r o g r a m m e r. c o m Zero-Tolerance Cons

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2007-10-31 17:44:24
142Annual general meeting / Meetings

THE ROYAL SCOTTISH COUNTRY DANCE SOCIETY Queensland Branch Incorporated Secretary Bryan Hacker PO Box 178

Add to Reading List

Source URL: www.rscds.org.au

Language: English - Date: 2015-04-02 05:30:35
143UHY Advisors / UHY Hacker Young

TAX ALERT TAX ALERT UPDATE ON IRS DEVELOPMENTS CONCERNING THE RECENT TAX COURT DECISION ON IRA ROLLOVERS On January 28, 2014, the Tax Court in Bobrow v.

Add to Reading List

Source URL: uhy-us.com

Language: English - Date: 2014-03-24 16:51:29
144Rhetoric / Writing / Academia / Thesis / Hackers: Heroes of the Computer Revolution / Essay / Hacker / Tron / Nothing / Computing / Education / Knowledge

Chapter Eight The Antithesis Exercise • • • •

Add to Reading List

Source URL: www.stevendkrause.com

Language: English - Date: 2007-04-22 19:59:13
145Hacker / Hacking / Categorization / Essay / Thesis / Category of being / Computing / Computer programming / Cyberwarfare

Chapter Nine The Categorization and Evaluation Exercise • • •

Add to Reading List

Source URL: www.stevendkrause.com

Language: English - Date: 2007-04-22 19:59:09
146Server / Technology / Distributed Oceanographic Data Systems / Technical communication / Computer file formats / OPeNDAP

HYCOM and GODAE Product Server Activities at the IPRC: A status report Peter Hacker Asia-Pacific Data-Research Center (APDRC) IPRC, Univ. of Hawaii Outline:

Add to Reading List

Source URL: hycom.org

Language: English - Date: 2009-05-23 20:01:37
147Computing / Terrorism / Technology / Cyberterrorism / Hacktivism / Hacker / Computer insecurity / Computer security / Patriotic hacking / Cyberwarfare / Hacking / Computer crimes

Cyberterrorism How Real Is the Threat?

Add to Reading List

Source URL: www.usip.org

Language: English - Date: 2013-05-14 12:02:03
148Malware / Rootkits / Shellcode / Hypervisor / Hacker / Antivirus software / Backdoor / Joanna Rutkowska / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / System software / Cyberwarfare / Computer security

[Black Hat DCAn Uninvited Guest Black Hat DC 2010 Conference Proceedings An Uninvited Guest (Who Won’t Go Home)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
149Multiplication / Multiplicative inverse / TeX / Function / Mathematics / Abstract algebra / Elementary algebra

ERRORS IN HACKER’S DELIGHT Third printing P. 2: The latest C standard allows //-style comments. Therefore, replace the entire

Add to Reading List

Source URL: www.hackersdelight.org

Language: English - Date: 2012-12-31 16:33:48
150Land management / Water conservation / Sustainable gardening / Agronomy / Drip irrigation / Mulch / Lawn / Leaf scorch / Drought / Irrigation / Agriculture / Environment

The Cemetery Landscape Preparing for and surviving a drought by Michael Trinkley and Debi Hacker he December 2007 Seasonal Drought Outlook produced by

Add to Reading List

Source URL: chicora.org

Language: English - Date: 2008-07-09 17:48:45
UPDATE