The Hacker

Results: 480



#Item
381Activism / George Hacker / Year of birth missing / Advocacy / Center for Science in the Public Interest / Binge drinking / Alcoholism / United States / Advocacy groups / Alcohol abuse / Drinking culture

Exhibit 5 A Matter of Degree Advocacy Initiative

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2014-01-14 14:29:01
382Metamorphic petrology / Igneous rocks / Granite / Mica / Metamorphic rock / Maine / Pegmatite / Quartz / Petrology / Igneous petrology / Dielectrics

Hacker’s Hill, Casco, ME Maine Geological Survey Geologic Site of the Month February, 2013

Add to Reading List

Source URL: www.maine.gov

Language: English - Date: 2014-01-10 15:59:43
383Technology / Hacking / Electronic warfare / Computer crimes / Rootkits / Hacker / Stuxnet / Computer security / Industrial espionage / Cyberwarfare / Computing / Cybercrime

SPECIAL REPORT CYBER-SECU R I T Y JULY 12th 2014 Defending the digital frontier

Add to Reading List

Source URL: www.economist.com

Language: English - Date: 2014-07-08 11:11:59
384Nutrition / Health / Food and drink / Center for Science in the Public Interest / Health in the United States / Alcohol and Tobacco Tax and Trade Bureau / Alcoholic beverage / Michael F. Jacobson / George Hacker / Consumer organizations / Advocacy groups / Medicine

George Hacker Center for Science in the Public Interest[removed]removed] Chris Waldrop

Add to Reading List

Source URL: www.consumerfed.org

Language: English - Date: 2011-07-12 07:24:34
385Computer security / Botnet / Malware / Attack / Hacker / Internet security / Computer virus / Computer network security / Computing / Cyberwarfare

State of Delaware Cyber Security Incident Reporting Procedure Call[removed]or email at: [removed] Please have the following information available prior to your call:

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2014-08-08 16:19:19
386Hacking / Computer network security / Mitre Corporation / Software testing / Common Vulnerabilities and Exposures / Vulnerability / White hat / Hacker / Social vulnerability / Computer security / Cyberwarfare / Security

The Vulnerabilities of Developing on the NET Robert A. Martin April 2001 Published in

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:52:21
387Health / Advocacy groups / Consumer organizations / Drinking culture / Center for Science in the Public Interest / Alcoholic beverage / Alcohol and Tobacco Tax and Trade Bureau / Alcohol proof / George Hacker / Alcohol / Medicine / Household chemicals

Contact: Katie Christopher Shape Up America! [removed]removed] Carol McKay

Add to Reading List

Source URL: www.shapeup.org

Language: English - Date: 2011-06-01 12:02:06
388Education in the United States / Association of Public and Land-Grant Universities / University of California /  Riverside / University of California

Hispanic National Bar Association Alba Cruz-Hacker is the Chief Operating Officer and Executive Director of the Hispanic National Bar Association (HNBA)—a nonprofit, nonpartisan, national organization which represents

Add to Reading List

Source URL: 198.171.230.232

Language: English - Date: 2014-06-19 14:05:09
389Computer security / International Cybercrime / International Multilateral Partnership Against Cyber Threats / Vulnerability / Hacker / Cyberwarfare / Cyber-security regulation / Computer crimes / Crime / Security

Testimony of Steven R. Chabinsky Jointly before the United States House of Representatives

Add to Reading List

Source URL: democrats.science.house.gov

Language: English - Date: 2014-03-06 09:22:23
390Computing / Internet security / Firewall / Malware / Personal firewall / Hacker / DNS spoofing / Computer worm / Spyware / Computer network security / Computer security / Cyberwarfare

InsighT to Security Newsletter[removed]Idaho Office of the CIO

Add to Reading List

Source URL: cio.idaho.gov

Language: English - Date: 2012-10-09 22:43:05
UPDATE