Results 281 to 290 of about 205,649 (344)
Locally Reprogramming Tumor-Associated Macrophages with Cytokine-Loaded Injectable Cryogels for Breast Cancer. [PDF]
Henriques SR +16 more
europepmc +1 more source
Infants' empathic concern responses moderate the association between maternal and child depressive symptoms. [PDF]
Gordon-Hacker A +5 more
europepmc +1 more source
A disposable, passive microfluidic cartridge for point-of-care detection of antibodies in total capillary blood based on hemagglutination and machine-learning assisted interpretation. [PDF]
Jawad M +5 more
europepmc +1 more source
Hacking Suburbia: An Architect's Reconsideration of the Home
Lillian Candela
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Hacker Taggers: A new type of hackers
Information Systems Frontiers, 2009Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being the work of a hacker however little is known about hacker ...
Matthew Warren
exaly +2 more sources
XRDS: Crossroads, The ACM Magazine for Students, 2014
From the early 1980s to the present day, the tech industry, the law, and media representations have evolved in tandem, all hypnotized by the myth of "The Hacker"---an ideal coder, stereotyped as an exceptional young white man.
Sarah Jeong, Colin McSwiggen
openaire +1 more source
From the early 1980s to the present day, the tech industry, the law, and media representations have evolved in tandem, all hypnotized by the myth of "The Hacker"---an ideal coder, stereotyped as an exceptional young white man.
Sarah Jeong, Colin McSwiggen
openaire +1 more source
ACM SIGCAS Computers and Society, 1991
In his book, Hackers: Heroes of the Computer Revolution (Doubleday, 1984), Steven Levy documents the linguistic evolution of the word "hacker." He argues that among computer aficionados the term has been long used to express respect and admiration for another's superior computer programming expertise.
openaire +1 more source
In his book, Hackers: Heroes of the Computer Revolution (Doubleday, 1984), Steven Levy documents the linguistic evolution of the word "hacker." He argues that among computer aficionados the term has been long used to express respect and admiration for another's superior computer programming expertise.
openaire +1 more source
2020
How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the ...
Luca Follis, Adam Fish
openaire +2 more sources
How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the ...
Luca Follis, Adam Fish
openaire +2 more sources

