The Hacker

Results: 480



#Item
1Computing / Computer security / Internet security / Information Age / Information and communications technology / HackerOne / Computer viruses / Bug bounty program / Hacker culture / Security hacker / Hacker / Katie Moussouris

ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualit

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-08-21 12:07:31
2

THE LINGUISTIC TURN IN ANALYTIC PHILOSOPHY P. M. S. Hacker 1. Terminological clarification The expression ‘the linguistic turn’ was introduced by Gustav Bergmann in his review of Strawson’s Individuals inBer

Add to Reading List

Source URL: info.sjc.ox.ac.uk

Language: English - Date: 2013-11-21 09:18:27
    3

    The Lazy Kernel Hacker and Application Programmer W. Michael Petullo Jon A. Solworth University of Illinois at Chicago

    Add to Reading List

    Source URL: www.ethos-os.org

    Language: English - Date: 2017-04-30 19:19:47
      4

      Tales of a BeOS Refugee From BeOS to OS X (by way of Windows and Linux) Scot Hacker, The story of how a BeOS refugee lost faith in the future of computing, resigned himself to Windows but found himself bored sill

      Add to Reading List

      Source URL: birdhouse.org

      Language: English - Date: 2001-12-13 02:47:02
        5

        Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer. SECURITY

        Add to Reading List

        Source URL: www.cs.jhu.edu

        Language: English - Date: 2004-07-14 23:06:27
          6

          HACKTROPHY BUG BOUNTY PROJECTS ETHICAL HACKER TERMS AND CONDITIONS Welcome to the Hacktrophy Bug Bounty Program (hereinafter only as the “Program”). This Program encourages and rewards contributions (submission of qu

          Add to Reading List

          Source URL: hacktrophy.com

          Language: English - Date: 2018-05-18 04:19:19
            7

            Intentionality and the Harmony between Thought and Reality – A rejoinder to Professor Crane P. M. S. Hacker 1. Misunderstandings and misrepresentations Wittgenstein’s discussion of the subject of intentionality, both

            Add to Reading List

            Source URL: info.sjc.ox.ac.uk

            Language: English - Date: 2013-11-21 09:18:27
              8

              OF KNOWLEDGE AND OF KNOWING THAT SOMEONE IS IN PAIN P.M.S. Hacker 1. First person authority: the received explanation Over a wide range of psychological attributes, a mature speaker seems to enjoy a defeasible form of au

              Add to Reading List

              Source URL: info.sjc.ox.ac.uk

              Language: English - Date: 2008-11-25 03:52:02
                9

                WHY DO U.P.S. DRIVERS NEED TO KNOW PYTHAGOREAN TRIPLES? A Personal Response to a Provocative Question James Tanton On the evening of May 10th, 2016, Dr. Andrew Hacker (author of The MATH

                Add to Reading List

                Source URL: www.jamestanton.com

                Language: English - Date: 2016-06-25 13:40:25
                  10

                  ACSC Community Newsletter February 2017 I have argued in the past that one of the biggest challenges that the security community has to overcome is regaining the connection with our inner hacker. Before we began professi

                  Add to Reading List

                  Source URL: www.acscenter.org

                  Language: English - Date: 2018-03-28 09:43:56
                    UPDATE