What the Hack

Results: 26



#Item
11

Unisys Stealth Solution Suite You can’t hack what you can’t see. Changing the Security Paradigm. Introduction Changing the Security Paradigm

Add to Reading List

Source URL: www.prianto.co.uk

Language: English - Date: 2013-03-20 10:50:47
    12National security / Montgomery County /  Pennsylvania / Unisys / Public safety / Computer security / Computer network / Internet security / Virtual LAN / Information security / Computer network security / Security / Crime prevention

    Unisys Stealth Solution Suite You Can’t Hack What You Can’t See Introduction Changing the Security Paradigm

    Add to Reading List

    Source URL: www.prianto.at

    Language: English - Date: 2013-12-03 06:43:40
    13Social media / Image hosting / Pinterest / Web 2.0 / Websites / Copywriting / Twitter / NST / Instagram / World Wide Web / Photo sharing / Digital media

      What  is  The  Travel  Hack?   The  Travel  Hack  is  one  of  the  UK’s  top  10  travel  blogs.  It’s  written  by  me,  Monica   Stott.  I’

    Add to Reading List

    Source URL: thetravelhack.com

    Language: English - Date: 2014-11-11 13:12:58
    14Human spaceflight / Manned spacecraft / Space weapons / Almaz / Venture capital / Hack Day / Hacker / Bähr / Hack / Spaceflight / Space technology / Space stations

    PHDays Сybersecurity Project Competition What: Almaz Capital is seeking startup projects in the cybersecurity space and all things related. Key requirement: projects should have the ambition to become globally competiti

    Add to Reading List

    Source URL: www.almazcapital.com

    Language: English - Date: 2015-04-21 16:50:18
    15Law / Intellectual property law / Methodology / Open data / Metadata / Creative Commons / Copyright / Open content / Copyleft / Computer law

    Unleashed - in association with the national initiative Gov Hack What do I need to do to publish usable open data on the Internet? You want to publish data for the GovHack competition to stimulate the economy, and to enc

    Add to Reading List

    Source URL: uladl.com

    Language: English - Date: 2014-07-24 23:06:24
    16Museology / Museum / Art museum

    Being Social: What Museums Need to Understand for the Future Original article in Museum-iD Magazine by Adam Reed Rozan, Director of Audience Engagement. at the Worcester Art Museum. Summarized by Museum Hack

    Add to Reading List

    Source URL: www.museumhack.com

    Language: English - Date: 2014-10-24 08:24:25
    17Hacker ethic / Hackers: Heroes of the Computer Revolution / Hacker / What the Hack / Information wants to be free / Hacks at the Massachusetts Institute of Technology / Electron / Steven Levy / Hacker Emblem / Computing / Electronics / Hacking

    How Digital Technology Found Utopian Ideology: Lessons From the First Hackers’ Conference Fred Turner Department of Communication Stanford University Forthcoming in David Silver and Adrienne Massanari, eds., Critical C

    Add to Reading List

    Source URL: fredturner.stanford.edu

    Language: English - Date: 2012-08-02 18:55:52
    18PHP programming language / Cross-platform software / Virtual machines / PHP / Scripting languages / Zend Engine / Bitly / Java / Just-in-time compilation / Software / Computing / System software

    What the HACK is HHVM? Leong Hean Hong[removed] @ HackerspaceJB About ●

    Add to Reading List

    Source URL: speakerd.s3.amazonaws.com

    Language: English - Date: 2015-03-09 06:15:15
    19Elements of crime / Negligence / Reasonable person / Criminal negligence / Glaucoma / Law / Tort law / Criminal law

    What Real Estate Owners and Managers Can Learn from Tugboats and Glaucoma By: Jay L. Hack, Esq., partner, Gallet Dreyer & Berkey, LLP This article was adapted from an article published in the Fall 2008 issue of the New Y

    Add to Reading List

    Source URL: www.nyarm.com

    Language: English - Date: 2014-02-20 17:30:58
    20National security / Montgomery County /  Pennsylvania / Unisys / Public safety / Computer security / Computer network / Internet security / Virtual LAN / Information security / Computer network security / Security / Crime prevention

    Unisys Stealth Solution Suite You Can’t Hack What You Can’t See Introduction Changing the Security Paradigm

    Add to Reading List

    Source URL: www.prianto.com

    Language: English - Date: 2013-12-03 06:43:40
    UPDATE