Hackers - Heroes of the Computer Revolution

نویسنده

  • Steven Levy
چکیده

It’s a good conceptual basis, and usefully provides the metaphors and explanations you’ll need to communicate this kind of management style to other managers. But it won’t give you the nitty-gritty of how to implement it. persuasive technology: using computers to change what we think and do

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Editorial: introduction to hacking and hacktivism

The activity of hacking constitutes one of the more contested and misunderstood aspects of network culture. Initially the word denoted a kind of obsessive commitment to creative and innovative computer programming, especially the re-engineering of systems that pushed the relatively new technology of the computer in interesting directions which were oftentimes not anticipated or recognized by th...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

The Homeopathic Revolution: Why Famous People and Cultural Heroes Choose Homeopathy

Dana Ullman (ed.). The Homeopathic Revolution. North Atlantic Books, Berkeley, CA, 2007, page 386. This is no ordinary book on homeopathy. The stunning scope of topics, the depth and breadth of knowledge and the abundant historical references throughout make this book a treasure. You will not want to miss a single word. (Caution: Do not skip Dana Ullman’s Notes. All 143 Notes add flavor and zes...

متن کامل

Detecting Active Bot Networks Based on DNS Traffic Analysis

Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010