منابع مشابه
the role of russia in transmission of energy from central asia and caucuses to european union
پس ازفروپاشی شوروی،رشد منابع نفت و گاز، آسیای میانه و قفقاز را در یک بازی ژئوپلتیکی انرژی قرار داده است. با در نظر گرفتن این منابع هیدروکربنی، این منطقه به یک میدانجنگ و رقابت تجاری برای بازی های ژئوپلتیکی قدرت های بزرگ جهانی تبدیل شده است. روسیه منطقه را به عنوان حیات خلوت خود تلقی نموده و علاقمند به حفظ حضورش می باشد تا همانند گذشته گاز طبیعی را به وسیله خط لوله مرکزی دریافت و به عنوان یک واس...
15 صفحه اولOpen to Grok. How do Hackers' Practices Produce Hackers?
How do hackers' practices produce hackers' identities? In this paper we argue that the association between science fiction and software programs is rooted in hackers' practices, defining how hackers' knowledge emerge. The mediation is the one of the Heinlein verb “to grok”, part of the Jargon file and of the name of a code browser, OpenGrok, the technology mediating the relationship between Ope...
متن کاملHiring Ex-Criminal Hackers
Suppose someone applies for a system administrator job, or, better yet, an open slot on your computer security team. The applicant is eminently qualified for the position, having wizard-like skills on the exact operating systems deployed throughout your organization. You need his skills, big time. However, the candidate poses a bit of a problem. This otherwise-stellar applicant has a bit of a s...
متن کاملFoiling Quantum Hackers
Quantum cryptography holds promise for communication schemes that are, in theory, perfectly secure. But in the last few years, hackers have exploited security loopholes to crack some of the most sophisticated quantum encryption systems. Fortunately, two new papers in Physical Review Letters, one by Allison Rubenok, at the Institute for Quantum Science & Technology in Calgary, Canada, and collea...
متن کاملHackers and Founders
ISO17799 (formerly BS17799) is a standard for heuristic security management in organizations, and ISO20000 (formerly BS15000) is the ITIL reference document. Both of these are high-level, handwaving guidelines about service and business operations. True enough, they pay lip service to configuration management, but the configuration management they refer to is not the same as discussed in ;login...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Asian Social Science
سال: 2014
ISSN: 1911-2025,1911-2017
DOI: 10.5539/ass.v10n18p158