Results 251 to 260 of about 152,602 (275)
Some of the next articles are maybe not open access.
Nursing Standard, 1988
The new book on occupational health for nurses called Nurses At Risk written by [illegible word] Salvage, former Nursing Standard journalist and Rosemary Rogers, currently our Clinical News Editor, received widespread press coverage.
openaire +2 more sources
The new book on occupational health for nurses called Nurses At Risk written by [illegible word] Salvage, former Nursing Standard journalist and Rosemary Rogers, currently our Clinical News Editor, received widespread press coverage.
openaire +2 more sources
2004
CUMINCAD - An CUMulative INdex of papers on CAD - was created in 1998 and since then hundreds of users working in the field of CAAD have been taken advantage of this Digital Library. The number of recorded entries is currently over 6.600, from which a substantial part also provide a full paper in PDF-format. The effort is part of a portal solution: for
openaire +1 more source
CUMINCAD - An CUMulative INdex of papers on CAD - was created in 1998 and since then hundreds of users working in the field of CAAD have been taken advantage of this Digital Library. The number of recorded entries is currently over 6.600, from which a substantial part also provide a full paper in PDF-format. The effort is part of a portal solution: for
openaire +1 more source
2012
Hacking is an activity which has long been tied with ethical and legal complications. The term has evolved to have both ethical and unethical connotations, which can be confusing to the uninitiated. Hacker subculture has a myriad of terminology, sometimes with subtle variations, and this chapter identifies the main subcategories of hackers. The methods
GrĂ¡inne Kirwan, Andrew Power
openaire +1 more source
Hacking is an activity which has long been tied with ethical and legal complications. The term has evolved to have both ethical and unethical connotations, which can be confusing to the uninitiated. Hacker subculture has a myriad of terminology, sometimes with subtle variations, and this chapter identifies the main subcategories of hackers. The methods
GrĂ¡inne Kirwan, Andrew Power
openaire +1 more source
Scientific American, 2015
The article reports that a team of doctoral students developed a method by which information can be obtained from an air-gapped computer (AGC) using signals encoded into the heat given off by its processors. It states AGC is a security method by which secure computers are disconnected from the Internet and other computer networks.
openaire +2 more sources
The article reports that a team of doctoral students developed a method by which information can be obtained from an air-gapped computer (AGC) using signals encoded into the heat given off by its processors. It states AGC is a security method by which secure computers are disconnected from the Internet and other computer networks.
openaire +2 more sources

