The Hacker

Results: 480



#Item
421Computer virus / Hacker

THE BEST AND THE BRIGHTEST JAQUITH—page 3 Janis Jaquith 530 wor

Add to Reading List

Source URL: www.radioessays.com

Language: English - Date: 2005-12-15 14:03:51
422Universal v. Reimerdes / Dickinson v. Zurko / Law / 2600: The Hacker Quarterly / Electronic Frontier Foundation

US Lighting Legal Database Send any corrections, additions to: Robert Wagner - [removed] Bibliography - Human Health impacts to exposure to Light at Night:

Add to Reading List

Source URL: www.trianglealumni.org

Language: English - Date: 2013-02-08 09:36:10
423Free software / Linux / Mm tree / Linux Security Modules / Software / Computer architecture / Linux kernel

The Kernel hacker generations Jan 2007 Andi Kleen, SUSE Labs, Novell [removed] Linux kernel as a long term project

Add to Reading List

Source URL: www.halobates.de

Language: English - Date: 2007-02-20 08:31:44
424Computing / Data types / Adjoint functors / Type theory / Monad / Map / Option type / Functor / Natural transformation / Declarative programming / Software engineering / Functional programming

The Typeclassopedia by Brent Yorgey [removed] The standard Haskell libraries feature a number of type classes with algebraic or category-theoretic underpinnings. Becoming a fluent Haskell hacker requires in

Add to Reading List

Source URL: www.haskell.org

Language: English - Date: 2011-08-16 16:00:20
425Cyberwarfare / Bla Bla Bla / Rootkit / Dropper / Bla Bla / Hacker / Backdoor / BLA / Malware / Espionage / System software

REX vs The Romans fG! @ WhiskeyCon - SyScan’14 (Political) DISCLAIMER! •  Bad guys exist in the world, I am not against

Add to Reading List

Source URL: reverse.put.as

Language: English - Date: 2014-04-08 05:39:29
426Grey hat / Hacking / Computing / Hacker

Hacking Tunisia Some Interesting Sources This paper gives some examples of internet sites by Tunisian hackers demonstrating the diversity of Tunisian electronic culture. Tunisian HaCkeR1 The site simply states: „Tunisi

Add to Reading List

Source URL: arabiacyberia.files.wordpress.com

Language: English - Date: 2014-01-24 14:06:19
427Computer network security / Software testing / Metasploit Project / Rapid7 / Penetration test / Hacker / Software / Computer security / System software

Advanced Threat Tactics with Advanced Threat Tactics teaches a modern penetration testing process using Cobalt Strike and the Metasploit® Framework. Abstract This demonstration and lab-oriented class teaches security pr

Add to Reading List

Source URL: www.advancedpentest.com

Language: English
428Alcohol advertising / Food and drink / Business / Beer / Public house / National Collegiate Athletic Association / Advertising / Alcoholic beverage / Alcohol / Center for Science in the Public Interest / Health in the United States

Take a Kid to a Beer: How the NCAA Recruits Kids for the Beer Market Amy E. Gotwals, Jay Hedlund, and George A. Hacker

Add to Reading List

Source URL: www.cspinet.org

Language: English - Date: 2005-07-27 12:12:06
429Hacker groups / Freepost / Postal system / Anonymous / Tip / Project Chanology / Email / Internet / Cybercrime / Computing

Tip-offs Anonymous Fraud, crime and theft is an increasing problem in South Africa. Too often, it is undetected and goes unreported, resulting in financial losses to organisations, eventually to the detriment of all stak

Add to Reading List

Source URL: www.imperial.co.za

Language: English - Date: 2011-07-08 05:08:13
430Head coach / Coach / Ontario Hockey League / Ron Rolston / Jim Hulton

2014 AHCA CONVENTION in NAPLES: Keynote Speakers Dr. Colleen Hacker (Wednesday evening, 8:00-9:00 p.m., Sunset Terrace) Dr. Colleen Hacker, Ph.D. Professor, Sport & Exercise Psychology, has served as the U.S. Women’s

Add to Reading List

Source URL: www.ahcahockey.com

Language: English - Date: 2014-04-21 16:16:23
UPDATE