Results 281 to 290 of about 205,649 (344)

Locally Reprogramming Tumor-Associated Macrophages with Cytokine-Loaded Injectable Cryogels for Breast Cancer. [PDF]

open access: yesAnn Biomed Eng
Henriques SR   +16 more
europepmc   +1 more source

Infants' empathic concern responses moderate the association between maternal and child depressive symptoms. [PDF]

open access: yesSci Rep
Gordon-Hacker A   +5 more
europepmc   +1 more source

Our feminist hacking contributions

open access: hybrid
Patrícia J. Reis, Stefanie Wuschitz
openalex   +1 more source

Hacker Taggers: A new type of hackers

Information Systems Frontiers, 2009
Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being the work of a hacker however little is known about hacker ...
Matthew Warren
exaly   +2 more sources

Hackers!

XRDS: Crossroads, The ACM Magazine for Students, 2014
From the early 1980s to the present day, the tech industry, the law, and media representations have evolved in tandem, all hypnotized by the myth of "The Hacker"---an ideal coder, stereotyped as an exceptional young white man.
Sarah Jeong, Colin McSwiggen
openaire   +1 more source

Hackers

ACM SIGCAS Computers and Society, 1991
In his book, Hackers: Heroes of the Computer Revolution (Doubleday, 1984), Steven Levy documents the linguistic evolution of the word "hacker." He argues that among computer aficionados the term has been long used to express respect and admiration for another's superior computer programming expertise.
openaire   +1 more source

Hacker States

2020
How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the ...
Luca Follis, Adam Fish
openaire   +2 more sources

Home - About - Disclaimer - Privacy