Hacker's genius award

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Genius explained

The physician's art is the catalogue of an exhibition of over 100 images and other objects from the collections of four North Carolina medical schools. In a finely-judged Preface, structured around specific examples shown, Martin Kemp points out some of the historical issues involved in the study of medical imagery and artifacts, beginning with the problem of what "realism" means in the context...

متن کامل

Open to Grok. How do Hackers' Practices Produce Hackers?

How do hackers' practices produce hackers' identities? In this paper we argue that the association between science fiction and software programs is rooted in hackers' practices, defining how hackers' knowledge emerge. The mediation is the one of the Heinlein verb “to grok”, part of the Jargon file and of the name of a code browser, OpenGrok, the technology mediating the relationship between Ope...

متن کامل

Hiring Ex-Criminal Hackers

Suppose someone applies for a system administrator job, or, better yet, an open slot on your computer security team. The applicant is eminently qualified for the position, having wizard-like skills on the exact operating systems deployed throughout your organization. You need his skills, big time. However, the candidate poses a bit of a problem. This otherwise-stellar applicant has a bit of a s...

متن کامل

Foiling Quantum Hackers

Quantum cryptography holds promise for communication schemes that are, in theory, perfectly secure. But in the last few years, hackers have exploited security loopholes to crack some of the most sophisticated quantum encryption systems. Fortunately, two new papers in Physical Review Letters, one by Allison Rubenok, at the Institute for Quantum Science & Technology in Calgary, Canada, and collea...

متن کامل

Hackers and Founders

ISO17799 (formerly BS17799) is a standard for heuristic security management in organizations, and ISO20000 (formerly BS15000) is the ITIL reference document. Both of these are high-level, handwaving guidelines about service and business operations. True enough, they pay lip service to configuration management, but the configuration management they refer to is not the same as discussed in ;login...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1990

ISSN: 0028-0836,1476-4687

DOI: 10.1038/346209b0