搜索结果: 1-6 共查到“计算机科学技术 Hackers”相关记录6条 . 查询时间(0.046 秒)
Reliability measures of electrical grid has risen to a new norm as it involves physical security and cybersecurity. Threats to either can trigger instability, leading to blackouts and economic losses....
If you're a hacker, you gather as much data as you can on your targets, in search of something valuable.If you're researcher Hsinchun Chen, you gather as much data as you can on the hackers.Chen, a...
Watch Out:If you’ve got a smart watch,hackers could get your data
Watch Out you’ve got a smart watch hackers could get your data
2015/9/18
They’re the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at the University of Illinois at Urbana-Champaign.Using a ...
The aim of the paper is to look at the way hackers act and ways in which society can protect itself. The paper will show the current views and attitudes of hackers in an Australian context. The paper ...
Virtuous Hackers: developing ethical sensitivity in a community of practice
Virtuous Hackers ethical sensitivity
2009/12/7
It is estimated that losses due to computer break-ins by malicious 'crackers' (who might be external intruders or disgruntled employees intent on personal gain or revenge) are costing companies billio...
《Hackers,Heroes of the Computer Revolution》(图)
Hackers,Heroes of the Computer Revolution Steven Levy
2009/5/31
ng of the word "any."
Dick Sunderland Chalk-complexioned MBA who believed that firm managerial bureaucracy was a worth goal, but as president of Sierra On-Line found that hackers didn't think that ...