Hackers

Results: 356



#Item
101

TECHNOLOGIE Wees hackers te slim af JE FAVORIETE INTERNETCAFÉ ZOU ZOMAAR EEN DIGITALE PLAATS DELICT KUNNEN ZIJN Vijf jaar geleden waren er 1500 WiFi hotspots te vinden in Nederland. Tegenwoordig zijn dat er al 1000

Add to Reading List

Source URL: www.emaildokter.nl

Language: Dutch - Date: 2010-03-15 08:43:16
    102Internet privacy / Hacker / Identity theft / Privacy / Trojan horse / Computing / Ethics / Internet ethics

    Is It Safe? We’ve all heard the horror stories: viruses, crashes, power outages, hackers, fraud, eyestrain, aching wrists and all the other unwanted side effects of the Information Age. Face it:

    Add to Reading List

    Source URL: www.untechnicalpress.com

    Language: English - Date: 2001-12-10 17:57:44
    103

    First Line of Defense against Hackers: Secure, Trusted Identity Credentials under a Federation Trust Framework In the wake of seemingly daily news articles about the theft of personal identity, financial, and proprietary

    Add to Reading List

    Source URL: www.tscp.org

    Language: English - Date: 2015-05-27 06:50:02
      104Cross-site scripting / SQL injection / Plug-in / JavaScript / Application security / Cloud computing / Cross-site request forgery / ArcSight / Computing / Cyberwarfare / Computer security

      PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

      Add to Reading List

      Source URL: www.prevoty.com

      Language: English - Date: 2015-06-04 23:45:18
      105Cross-site scripting / SQL injection / Plug-in / JavaScript / Application security / Cloud computing / Cross-site request forgery / ArcSight / Computing / Cyberwarfare / Computer security

      PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

      Add to Reading List

      Source URL: prevoty.com

      Language: English - Date: 2015-06-04 23:45:18
      106

      Statuts de l’Association
 «Hackers at EPFL»" ! I. Nom, siège, durée et but" Art. 1 : Nom"

      Add to Reading List

      Source URL: hackersatepfl.com

      Language: French - Date: 2015-01-14 09:49:57
        107Misfit / DC Comics

        THE MISFIT ECONOMY is an exploration of the fringe side of innovation. It is about the gangsters on the corners of rough New York City neighborhoods, the young hackers on the digital frontlines, the pirates of the 18th c

        Add to Reading List

        Source URL: www.misfiteconomy.com

        Language: English - Date: 2015-05-27 23:01:32
        108Conspiracy theories / Intergovernmental Panel on Climate Change / United Nations Environment Programme / World Meteorological Organization / Global warming controversy / Climatic Research Unit email controversy / IPCC Summary for Policymakers / Criticism of the IPCC Fourth Assessment Report / Climate change / Global warming / Environmental skepticism

        Climate Science: The World Is Its Jury1 Sheila Jasanoff Harvard University In November 2009, computer hackers struck what seemed to be a blow for transparency in science. Hundreds of private e-mails and thousands of docu

        Add to Reading List

        Source URL: graphics8.nytimes.com

        Language: English - Date: 2010-03-03 11:09:50
        109DaimlerChrysler / Microcars / Smart / IPad / Apple Inc. / Terminology / Smart city / Intelligent city / Transport / Böblingen / Daimler AG

        Book  Review  for  Built  Environment     Anthony  M.  Townsend:  Smart   Cities:   Big   Data,   Civic   Hackers,   and   the   Quest   for   a   New   Uto

        Add to Reading List

        Source URL: www.spatialcomplexity.info

        Language: English - Date: 2015-05-21 07:27:54
        110Security / Application security / Application firewall / Penetration test / Hacker / Cloud computing / Web application security scanner / Computing / Computer security / Computer network security

        5 reasons hackers love your application security strategy February

        Add to Reading List

        Source URL: www.prevoty.com

        Language: English - Date: 2015-06-04 23:45:13
        UPDATE