The Trojan Horse

Results: 88



#Item
81New York Yankees / Curse of the Bambino / Baseball / Sports / Boston Red Sox

The 2013 World Series_ A Trojan Horse for Consciousness Studies

Add to Reading List

Source URL: www.thejoyofsoxmovie.com

Language: English - Date: 2014-04-02 20:03:25
82Security / Cyberwarfare / Hacking / Computer network security / Electronic warfare / Malware / Cyberterrorism / Trojan horse / Monoculture / Cybercrime / Computer crimes / Crime

August 10, 2004:9:47 AM Cyber Security: Of Heterogeneity and Autarky Randal C. Picker* The Internet is an almost-organic mix of actors and their machines, an eclectic scheme of government and private-decisionmaking, of

Add to Reading List

Source URL: picker.uchicago.edu

Language: English - Date: 2004-12-16 21:53:13
83Cybercrime / Computer network security / Computer crimes / Social engineering / Denial-of-service attacks / Spam / Malware / Trojan horse / Anti-spam techniques / Computing / Internet / Spamming

Glossary – SIPS & EVEDA – v1.01 A Priori A Predictor of Radical Insurgence; an early warning pilot launched by mi2g in early 2003 for estimating the risk of future militant activity based on patterns of politically m

Add to Reading List

Source URL: www.mi2g.com

Language: English - Date: 2007-08-02 12:54:37
84Poverty / Inclusionary zoning / Massachusetts Comprehensive Permit Act: Chapter 40B / Edward Glaeser / Public housing / Furman Center for Real Estate and Urban Policy / Jerome Lyle Rappaport / HOME Investment Partnerships Program / IZ / Affordable housing / Massachusetts / Housing

March[removed]Silver Bullet or Trojan Horse? The Effects of Inclusionary Zoning on Local Housing Markets in Greater Boston By Jenny Schuetz, Rachel Meltzer, and Vicki Been, Furman Center for Real Estate and Urban Policy, N

Add to Reading List

Source URL: www.hks.harvard.edu

Language: English - Date: 2010-03-24 16:58:40
85Conficker / Computer worm / Computer virus / Rootkit / Spyware / Scareware / Backdoor / Trojan horse / Rogue security software / Malware / System software / Cyberwarfare

Fraudware How it works and how to prevent it from attacking your system A Fast Rhino Presentation to the Vistoso Computer Society November 11, 2012 Before we jump in to Fraudware, we should most likely begin by definin

Add to Reading List

Source URL: www.fastrhino.com

Language: English - Date: 2012-11-16 14:45:27
86Smithfield Foods / Concentrated Animal Feeding Operations / Factory farming / Economy of Mexico / Swine influenza / Perote /  Veracruz / Agriculture / Industrial agriculture / North American Free Trade Agreement

NAFTA’S TROJAN HORSE & THE DEMISE OF THE MEXICAN HOG INDUSTRY Pamela A. Vesilind 1

Add to Reading List

Source URL: www.vermontlaw.edu

Language: English - Date: 2011-10-11 14:51:58
87Pregnancy / Health / Abortion debate / Abortion / Sexual health / Opposition to the legalization of abortion / Support for the legalization of abortion / Crisis pregnancy center / Gonzales v. Carhart / Medicine / Human reproduction / Gynaecology

A 21st-century Trojan horse: the “abortion harms women” anti-choice argument disguises a harmful movement

Add to Reading List

Source URL: spam.arhp.org

Language: English - Date: 2009-02-24 08:30:48
88Philosophy of life / Social alienation / Social philosophy / Philosophy / Heavy metal music / Music / Economic and Philosophical Manuscripts / Black metal / Authenticity / Sociology / Heavy metal subculture / Emotions

“Like a Trojan Horse Among the Average Joes” – Acknowledging, Upholding and Reproducing Alienation and Rebelliousness within the Heavy Metal Subculture

Add to Reading List

Source URL: www.inter-disciplinary.net

Language: English - Date: 2012-04-07 14:43:54
UPDATE