The Hacker

Results: 480



#Item
321

 GNU Radio Intro Day  Hacker Space Filled with the Latest Hardware  Tutorials for New and Experienced Users  Presentations on Advanced Research September 15-19

Add to Reading List

Source URL: www.trondeau.com

- Date: 2014-08-04 14:56:32
    322Classical cipher / Computer programming / Just another Perl hacker

    QuickQuery Fielding Period: April 7-9, 2014 NEFE Weighted To The U.S. General Adult Population - Propensity Page 1

    Add to Reading List

    Source URL: www.nefe.org

    Language: English - Date: 2014-04-29 17:09:02
    323Conservation biology / Environment / Wilderness / The Conservation Fund / Conservation / Knowledge / Federal assistance in the United States / Land and Water Conservation Fund / Biology

    News Release LWCFCoalition.org July 23, 2014 CONTACT: Michael Hacker[removed]or [removed]

    Add to Reading List

    Source URL: www.lwcfcoalition.org

    Language: English - Date: 2014-07-23 15:25:30
    324Anticipatory thinking / Ambient intelligence / Technology assessment / Forecasting / Futures studies / Hacker / Computing / Time / Future

    Forecasting the Future of Ambient Intelligence Technology futures research at IFTF Jason Tester | Research Director

    Add to Reading List

    Source URL: www.fujitsu.com

    Language: English - Date: 2013-06-15 17:56:14
    325Crime / Security / Phishing / Malware / Internet fraud / Identity theft / Hacker / Computer security / Internet security / Cybercrime / Computer network security / Computer crimes

     February 2009 Volume 4, Issue 2 Cyber Security Trends for 2009 The volume and complexity of cyber threats continue to increase. More of our activities—whether at home, school or work—involve computers and the In

    Add to Reading List

    Source URL: www.cio.ca.gov

    Language: English - Date: 2013-06-28 15:18:49
    326Latin alphabets / Classical cipher / Just another Perl hacker

    ... ( UNITED STATES DEPARTMENT OF THE INTERIOR

    Add to Reading List

    Source URL: www.gsa.state.al.us

    Language: English - Date: 2014-07-21 15:56:15
    327Electronic warfare / Hacking / Hacker / Cyber / Identity theft / Cybercrime and countermeasures / Crime / Computer crimes / Cyberwarfare

    CYBER SECURITY NEWSLETTER Problem YOU ARE THE TARGET

    Add to Reading List

    Source URL: www.securingthehuman.org

    Language: English - Date: 2013-05-28 14:37:24
    328Cyberwarfare / Computer network security / Electronic warfare / Cyberterrorism / Hacker / Terrorism / Attack / Zero-day attack / Computer security / Cybercrime / Computer crimes / Hacking

    CHAPTER 19 Cyber Terrorism: Menace or Myth? Irving Lachow CYBER TERRORISM is often portrayed as a major threat to the United States. Articles, books, and reports discussing the subject conjure images of infra- structure

    Add to Reading List

    Source URL: ctnsp.dodlive.mil

    Language: English - Date: 2014-03-31 15:05:00
    329Crime / Malware / Network security / Computer crime / Computer security / Attack / Hacker / Internet security / Identity theft / Computer network security / Security / Cyberwarfare

    Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219

    Add to Reading List

    Source URL: www.ag.virginia.gov

    Language: English - Date: 2014-01-13 09:28:31
    330Grant / New Mexico / Texas / Hacker / Cooperative State Research /  Education /  and Extension Service / United States / Genealogy / States of the United States / David Hacker / 66671 Sfasu

    Microsoft Word - personal_page_template.doc

    Add to Reading List

    Source URL: its.nmhu.edu

    Language: English - Date: 2007-02-12 10:26:57
    UPDATE