Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. The Hacker's Dictionary: A Guide to the World of Computer Wizards by Guy L. Steele, 1983
  2. Philology and Confrontation: Paul Hacker on Traditional and Modern Vedanta
  3. Pocket Style Manual: Updated With 2003 MLA Update by Diana Hacker, 2000
  4. Unauthorized Voices: Essays on Poets and Poetry, 1987-2009 (Poets on Poetry) by Marilyn Hacker, 2010-10-19
  5. A Writer's Reference With Help for Writing in the Disciplines by Diana Hacker, 2010-12
  6. CYBERPUNK: Outlaws and Hackers on the Computer Frontier, Revised by Katie Hafner, 1995-11-01
  7. World Military History Bibliography: Premodern and Nonwestern Military Institutions and Warfare (History of Warfare, 16) by Barton C. Hacker, 2003-06
  8. Wittgenstein: Understanding and Meaning: Volume 1 of an Analytical Commentary on the Philosophical Investigations, Part I: Essays (Pt. 1) by G. P. Baker, P. M. S. Hacker, 2005-02-11
  9. Insight and Illusion: Wittgenstein on Philosophy and the Metaphysics of Experience by P. M. S Hacker, 1975
  10. Doctor Ecco's Cyberpuzzles: 36 Puzzles for Hackers and Other Mathematical Detectives by Dennis E. Shasha, 2004-02
  11. Wittgenstein, Meaning and Understanding (Essays on the Philosophical Investigations, Vol. 1) by Gordon P Baker, P.M.S. Hacker, 1985
  12. Death Is a Two-Stroke Penalty: A Hacker Mystery by James Y. Bartlett, 1991-05
  13. Two Nations : Black and White, Separate, Hostile, Unequal by Andrew Hacker, 2003-05-19
  14. The Costs of Bad Hiring Decisions & How to Avoid Them, Second Edition by Carol Hacker, 1998-05-26

81. The Sun Online - News Noserve: Hackers Fight Terrorists
THE INTERNET has become the latest frontline in the war against terror.
http://www.thesun.co.uk/article/0,,2004600000-2005330747,00.html
window.name = 'mainWindow'; Take Me To Betting Bizarre Bizarre Exposed Competitions Contact Us Credit cards DVD Releases Daily Dosh Dear Deidre Dream Team FC Edit my profile F1 Dream Team Fun Gizmo Gizmo Gaming Home Letters - Dear Sun Life Loans Mobile Money Movies Music Videos Mystic Meg Stars News Page 3 Picture Sales Sassy Shop Sport Sun Drinks Service Sun Money Sun Mortgages Sun Pet Club Sun Phone Offer Sun Services Guide Sun Weekly Email Superbabes Superhunks TV Biz The Sun Says Top 25 viral emails Travel Webchats Wrestling 400 cops feared dead
Hundreds fail to report for duty after hurricane Sam's your England man
50% want him to replace Sven Goran Eriksson
Bowie: I'm Hunky Dory
David's back for first gig since heart attack
...
beauty queen

Brainless blonde is top businesswoman Chic and sleek style from Nokia
Its new silver handset is a collector's piece Stephanie, 20, from N London
See loads more girls on our super cyber site
Win a holiday of a lifetime
Spend four unforgettable days in Vegas
Great credit card deals

Get latest football kits
Page3 Poker - play now Find local tradesmen ... A fitness plan for you NI_AD('Top'); NI_AD('TopRight');

82. CNN - Hackers Tampering With Internet, E-mail Links - February 8, 2000
CNN
http://www.cnn.com/2000/TECH/computing/02/08/email.hacks.idg/index.html

MAIN PAGE
WORLD U.S. LOCAL ... daily almanac
MULTIMEDIA:
video
video archive audio multimedia showcase ... more services
E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address: document.write(' '); Or:
Get a free e-mail account

E-MAIL
DISCUSSION: message boards chat feedback
CNN WEB SITES:
AsiaNow
Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Hackers tampering with Internet, e-mail links
February 8, 2000 Web posted at: 8:35 a.m. EST (1335 GMT) by Diane Frank From... (IDG) Federal and industry security teams are warning agencies about malicious code embedded in Internet links on World Wide Web sites and in e-mails that could allow hackers to capture any information entered by the user. MORE COMPUTING INTELLIGENCE IDG.net home page How to safeguard your personal information, your PCand your children Diary of a hack attack Subscribe to IDG.net's free daily newsletters News Radio Fusion audio primers Computerworld Minute The Computer Emergency Response Team (CERT) Coordination Center, the Defense Department CERT, the DOD Joint Task Force for Computer Network Defense, the Federal Computer Incident Response Capability and the FBI's National Infrastructure Protection Center jointly issued the alert on Wednesday.

83. Hackers (film) - Wikipedia, The Free Encyclopedia
Hackers German Poster Enlarge. Hackers - German Poster. Hackers is a moviereleased in 1995 that follows the misfortunes of young hacker Dade Murphy
http://en.wikipedia.org/wiki/Hackers_(movie)
Hackers (film)
From Wikipedia, the free encyclopedia.
(Redirected from Hackers (movie) Hackers - Poster 1 Hackers - Poster 2 Hackers - German Poster Hackers is a movie released in that follows the misfortunes of young hacker Dade Murphy (aka "Crash Override"/"Zero Cool", played by Jonny Lee Miller ), Kate Libby (aka "Acid Burn", played by Angelina Jolie ) and their friends. It was written by Rafael Moreu and directed by Iain Softley The movie failed to make a profit at the box-office, but has developed a cult following from its video release despite (or, in some cases, because of) the lack of accuracy; metaphorical graphical sequences are used as a substitute for what would normally be hours of boring text screens and typing. It is also known as the first major film to star future Academy Award -winner Angelina Jolie . It also helped launch the career of Matthew Lillard
Contents
edit
Plot summary
Spoiler warning Plot and/or ending details follow. In 1988, Seattle youth Dade "Zero Cool" Murphy ( Jonny Lee Miller ) is arrested and charged, at the age of 11, with crashing 1,507 systems in one day and causing a drop in the

84. CNN.com - Technology - Hackers Are Naughty And Nice At Def Con - August 3, 2000
CNN
http://www.cnn.com/2000/TECH/computing/08/03/defcon.notebook.idg/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
Hackers are naughty and nice at Def Con
From... by Ann Harrison LAS VEGAS (IDG) "We apologize for the delay," said the Def Con press attache. "The CIA is caucusing in the men's room." "Well I'm so glad I left the tape recorder running in there," replied a British reporter calmly pouring scotch. "Would anyone like a drink?"

85. CNN - Hackers Hit Government Web Sites After China Embassy Bombing - May 10, 199
CNN
http://www.cnn.com/TECH/computing/9905/10/hack.attack.02/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Hackers hit government Web sites after China embassy bombing
RELATED VIDEO
CNN's Ann Kellan reports on the increase in Web site protests following the NATO bombing of the Chinese Embassy.
Windows Media
  • Bracing for Cyberwar
  • Hacking Primer
  • Hacking: Two Views
  • Timeline ...
  • Related Sites May 11, 1999 Web posted at: 12:03 a.m. EDT (0403 GMT) WASHINGTON (CNN) Computer hackers protesting NATO's bombing of the Chinese Embassy in Belgrade have attacked three U.S. government Web sites, government officials tell CNN. The main Internet sites for the Energy and Interior departments and the National Park Service were hacked Sunday. The hackers planted messages condemning the bombing, prompting at least one Cabinet site to remain closed all day Monday. Hackers inserted protest messages into the agencies' home pages. The pictures of three Chinese journalists who died in the bombing were briefly posted on the Interior Department Web page.
  • 86. BBC NEWS | Technology | Have Hackers Recruited Your PC?
    Research shows that thousands of home computers have been hijacked by hackersand criminals.
    http://news.bbc.co.uk/1/hi/technology/4354109.stm
    Home
    TV

    Radio

    Talk
    ... Newswatch Last Updated: Thursday, 17 March, 2005, 10:41 GMT E-mail this to a friend Printable version Have hackers recruited your PC? Hackers are in control of many home PCs More than one million computers on the net have been hijacked to attack websites and pump out spam and viruses.
    The huge number was revealed by security researchers who have spent months tracking more than 100 networks of remotely-controlled machines. The largest network of so-called zombie networks spied on by the team was made up of 50,000 hijacked home computers. Data was gathered using machines that looked innocent but which logged everything hackers did to them. Quick attack The detailed look at zombie or 'bot nets of hijacked computers was done by the Honeynet Project - a group of security researchers that gather information using networks of computers that act as "honey pots" to attract hackers and gather information about how they work. While 'bot nets have been known about for some time, estimates of how widespread they are from security firms have varied widely. Even in unskilled hands, it should be obvious that 'bot nets are a loaded and powerful weapon

    87. CNN.com - Hackers Attempted To Breach California Power Grid - June 9, 2001
    CNN
    http://cnn.com/2001/TECH/internet/06/09/california.energy.hackers/index.html
    MAIN PAGE
    WORLD

    U.S.

    WEATHER
    ...
    ABOUT US

    CNN TV what's on
    show transcripts

    CNN Headline News

    CNN International
    ...
    askCNN

    EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Time, Inc. Time.com People Fortune EW
    Hackers attempted to breach California power grid
    From CNN Assignment Editor Megan Clifford LOS ANGELES, California (CNN) As Californians suffered under rolling blackouts last month, computer hackers were trying to breach the computer system at the California Independent System Operator (Cal-ISO), which oversees most of state's power transmission grid, a spokeswoman told CNN. Cal-ISO spokeswoman Lisa Szot said a Cal-ISO computer system in Sacramento was attacked for a brief period of time in late April and early May. Szot said the system wasn't altered or harmed in anyway, but hackers did attempt to do so. IN-DEPTH The energy crunch in California MESSAGE BOARD Energy crunch The attack began in late April and it was not detected until the second week of May. On May 7 and 8, California suffered widespread rolling blackouts, but Szot said there was no connection between the hacking and the lack of power for the state. The hackers' ineffective efforts exposed security weaknesses in the system used by Cal-ISO, which Szot said have since been corrected. An internal group of Cal-ISO staff members are investigating the attack.

    88. BBC NEWS | Technology | Hackers Exploit Windows Patches
    Hackers are relying on Microsoft to help them exploit loopholes in Windows, saysecurity experts.
    http://news.bbc.co.uk/1/hi/technology/3485972.stm
    Home
    TV

    Radio

    Talk
    ... Newswatch Last Updated: Thursday, 26 February, 2004, 10:54 GMT E-mail this to a friend Printable version Hackers exploit Windows patches
    By Mark Ward
    BBC News Online technology correspondent
    Malicious hackers and vandals are lazy and wait for Microsoft to issue patches before they produce tools to work out how to exploit loopholes in Windows, say experts.
    Exploits get written once patches appear Instead of working it out for themselves, malicious hackers are reverse engineering the patches to better understand the vulnerabilities, said David Aucsmith, who is in charge of technology at Microsoft's security business and technology unit. In a keynote speech to the E-Crime Congress organised by Britain's National Hi-Tech Crime Unit, Mr Aucsmith said the tools that hackers were producing were getting better and shrinking the time between patches being issued and exploits being widely known. "We have never had vulnerabilities exploited before the patch was known," he said. Tools of choice A good example of this phenomenon, he said, was the recent ASN1 "critical vulnerability" that Microsoft produced a patch for in early February.

    89. Hackerthreads.com
    Sale of caps, Tshirts and jackets to Hackers not crackers
    http://www.hackerthreads.com
    Enable JavaScript in your Browser to Proceed

    90. Bank Of America Fights The Hackers [Fool.com: Motley Fool Take] July 15, 2005
    In light of recent breaches, Bank of America is rolling out a new security systemfor its website.
    http://www.fool.com/News/mft/2005/mft05071521.htm
    @import "http://www.fool.com/includes/css/hlp/HlpCss.asp?cat=04"; @import "http://www.fool.com/includes/css/centers/centertabs.css"; document.write('');

    91. CNN.com - Technology - Power Grids Could Be Vulnerable To Hackers - March 6, 200
    CNN
    http://cnn.com/2001/TECH/internet/03/06/power.hackers.idg/index.html
    MAIN PAGE
    WORLD

    U.S.

    WEATHER
    ...
    ABOUT US

    CNN TV what's on
    show transcripts

    CNN Headline News

    CNN International
    ...
    askCNN

    EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Spanish Portuguese German Italian Danish Japanese Korean Arabic Time, Inc. Time.com People Fortune EW
    Power grids could be vulnerable to hackers
    From... By Dan Verton (IDG) Nationwide rolling blackouts could have a devastating impact on the economy, but experts also fear that the stress being placed on the nation's power grid could make it more susceptible to disruptions from hackers. In California's Silicon Valley, large Internet data centers have been blamed for stressing the region's power grid beyond what its Korean War-era design can handle. Now, other states, including Oregon, Utah and Washington, are preparing for possible rolling blackouts. "From a cybersecurity perspective, the electric power grids in the West are now more fragile, [and] margins for error are significantly less," said Tim Bass, a longtime information security consultant for the U.S. Air Force and now CEO of The Silk Road Group Ltd., a network security consulting firm in Centerville, Va. "With diminishing margins and power reserves, the probability for cascading catastrophic effects are higher." MESSAGE BOARD Security on the Net The recent power shortages come as the Critical Infrastructure Assurance Office (CIAO) of the U.S. Department of Commerce on Feb. 22 delivered to Congress the first status report on private-sector efforts to bolster cyberdefenses for systems that run critical sectors of the economy. Although progress has been made in improving information sharing, officials acknowledged that they still know very little about how failures in one sector could affect other sectors.

    92. P2p-hackers Info Page
    The Hackers in the name of this list has the word s original meaning, which weencourage Subscribe to p2pHackers by filling out the following form.
    http://zgp.org/mailman/listinfo/p2p-hackers
    p2p-hackers Peer-to-peer development. About p2p-hackers English (USA) software engineering, design and implementation of emergent networks To see the collection of prior postings to the list, visit the p2p-hackers Archives Using p2p-hackers To post a message to all the list members, send email to p2p-hackers@zgp.org You can subscribe to the list, or change your existing subscription, in the sections below. These aren't the "hackers" you're looking for The "hackers" in the name of this list has the word's original meaning, which we encourage you to look up. This list is not the place to ask for help in finding out other people's passwords. Subscribing to p2p-hackers Subscribe to p2p-hackers by filling out the following form. You will be sent email requesting confirmation, to prevent others from gratuitously subscribing you. Once confirmation is received, your request will be held for approval by the list moderator. You will be notified of the moderator's decision by email. This is also a private list, which means that the list of members is not available to non-members.
      Your email address: Your name (optional): You may enter a privacy password below. This provides only mild security, but should prevent others from messing with your subscription.

    93. Wired News: Adobe Hackers: We're Immune
    The Russian company that created software to circumvent Adobe's ebook format argued on Monday that its conduct which caused the arrest and detainment of programmer Dmitri Sklyarov in a high-profile case last summer was not illegal. By Farhad Manjoo and Michelle Delio. Wired
    http://www.wired.com/news/politics/0,1283,50797,00.html
    Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
    Wired News Wired Magazine HotBot (the Web)
    Adobe Hackers: We're Immune
    Page 1 of 1
    By Michelle Delio and Farhad Manjoo Also by this reporter 06:14 AM Mar. 04, 2002 PT SAN JOSE The Russian company that created software to circumvent Adobe's e-book format argued on Monday that its conduct which caused the arrest and detainment of programmer Dmitri Sklyarov in a high-profile case last summer was not illegal.
    See also
    Today's Top 5 Stories
    Breaking News
    Special Partner Promotion Find local technology jobs Joseph Burton, Elcomsoft's attorney, told U.S. District Judge Ronald Whyte that Elcomsoft's actions "occurred in Russia or on the Internet, and we take the position that the Internet is a place" outside of U.S. jurisdiction. Burton said the company was not specifically "targeting" the software to Americans, but that the software was instead available to anyone on the Internet, regardless of residence.

    94. PHP: Hackers Paradise
    PHP Hackers Paradise. by Nathan Wallace (March 10th, 2000). RTF Version Note There is a follow up talk to this one called PHP Hackers Paradise
    http://www.e-gineer.com/articles/php-hackers-paradise.phtml
    PHP: Hackers Paradise
    by Nathan Wallace (March 10, 2000)
    Note: There is a follow up talk to this one called PHP: Hackers Paradise Revisited . It has some changes and extra information, but makes a lot of references to this article.
    1 Introduction
    PHP ( http://www.php.net ) is a powerful server side web scripting solution. It has quickly grown in popularity and according to the 2000 January Netcraft Web Server Survey PHP is installed on 12.8% of all web sites. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. Being a good PHP hacker isn't just about writing single line solutions to complex problems. For example, web gurus know that speed of coding is much more important than speed of code. In this article we'll look at techniques that can help you become a better PHP hacker. We'll assume that you have a basic knowledge of PHP and databases. If nothing else, you should leave here with the 3 key ideals for PHP hackers:

    95. HackHull?
    Group of Hackers in the United Kingdom. Information about meetings, projects, and links to personal pages.
    http://www.hackhull.com/

    Meets
    On Tour Projects Conferences ... Links Use this graphic (left) to put a link to the hackHull? site on your Web page!
    Website by Gremlin Cap'n B hackHull? at bubble@hackhull.com shite last updated: 28/07/2004

    96. PHP: Hackers Paradise Revisited
    PHP Hackers Paradise Revisited. by Nathan Wallace (April 4th, 2001). Note.This is an improvement / follow up to PHP Hackers Paradise.
    http://www.e-gineer.com/articles/php-hackers-paradise-revisited.phtml
    PHP: Hackers Paradise Revisited
    by Nathan Wallace (April 4, 2001)
    Note
    This is an improvement / follow up to PHP: Hackers Paradise . You might like to read it first, or refer to it at various times since I choose to repeat myself as little as possible.
    Introduction
    PHP ( http://www.php.net ) is a powerful server side web scripting solution. It has quickly grown in popularity and according to the February 2001 usage stats PHP is installed on 19.8% of all web sites (up 7% from when I gave a similar talk last year). Much of its syntax is borrowed from C, Java and Perl with some unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. Being a good PHP hacker isn't just about writing single line solutions to complex problems. For example, web gurus know that speed of coding is much more important than speed of code. In this article we'll look at techniques that can help you become a better PHP hacker. We'll assume that you have a basic knowledge of PHP and databases. The main topics that I want to cover today are:
    • Laziness is a Virtue
    • PHP First Principles
    • Chameleon Coding
    • Speed of Coding, Not Speed of Code

    97. Hackers Advised Against Crime At Def Con
    CNN
    http://cnn.com/2001/TECH/internet/07/16/hacker.convention.reut/index.html

    98. WPI Hackers Of The '70's
    I want to have email addresses and Web page links to the Hackers of WPI fromthe 70 s, the golden age of WPI hacking (at least I like to think so).
    http://www.wpi.edu/~trb/hacker70s.html
    WPI Hackers of the '70's
    "Back in the days of wooden computers and iron programmers..."
    -Professor Norman Sondak I want to have email addresses and Web page links to the hackers of WPI from the '70's, the golden age of WPI hacking (at least I like to think so). I only want links to folks who were at WPI between 1974 and 1978 (a span of about 10 years, really). So you say that the logo isn't the right color? I scanned it right off my decsystem10 assembly language handbook , second edition, 1972, that I bought off Marc Ramsey for $5 way back when. You might prefer the KL color scheme, but when I was at WPI, we had the KA, so I'm sticking with the colors of the good old assembler handbook, which in those days, we all did associate with the 10. If you send me your PPN, I'll add it in. WPI Alumni can get alum.wpi.edu email addresses from the WPI Alumni Gateway. You can put up a web page there, and even get WPI to serve up your secondary DNS. The WPI Alum Gateway rocks, aej is my hero, he should be yours too. Please send additions and corrections to Do not send unsolicited mail to people on this list.

    99. Jesux
    Jesux (pronounced Haysooks) is a new Linux distribution for Christian Hackers, schools, families, and churches. There is already a core distribution being prepared, based on RedHat's distribution. Please note - this is strictly a satire!
    http://www.geocities.com/ResearchTriangle/Node/4081/
    Welcome to the Jesux home page
    The distribution that will not lead you into temptation
    What is Jesux
    Jesux (pronounced Hay-sooks) is a new Linux distribution for Christian hackers, schools, families, and churches. There is already a core distribution being prepared, based on RedHat's distribution. Jesux will aim to be an environment that is pleasant for Christians to work in, with all the amenities a Christian might expect, and when possible, free from worldly influences.
    What is different about Jesux?
    Below is a short list. As we get more information, we will put it here. Send more suggestions to jesux@pobox.com . Send your suggestions for content in the bookmark, fortune, and .newsrc files, too, and we will start posting some of this stuff.
    • default fortune file contains quotes from the scriptures, Augustine, C.S. Lewis, Chuck Swindoll, etc. Christian Enlightenment themes featuring Jesus, the cross, and other Christian icons Login screen has full text to Lord's Prayer and Pledge of Allegiance, with Christian and American symbols
      • Provide alternate screens for non-Americans, perhaps

    100. IT Conversations: Paul Graham - Great Hackers
    Here s what others have written about Paul Graham Great Hackers. ยป Paul Graham sGreat Hackers Talk (from technoLAHgy v0.15 Monitoring Malaysian
    http://www.itconversations.com/shows/detail188.html
    Listener-supported audio programs,
    interviews and important events. Search
    Descriptions and transcripts
    Paul Graham Great Hackers
    Paul Graham
    Listen: Help Link to it: Permalink Clip How to create one [runtime: 00:30:50, 10.6 mb, recorded 2004-07-27] We caught this gem by accident while testing our audio link to the O'Reilly Open Source Convention (2004). In one of the most entertaining presentations [clip] from OSCON 2004, Paul answers the questions, what motivates great hackers? [clip] What do they need to do their jobs? How do you recognize them? [clip] How do you get them to come and work for you? [clip] And how can you become one? Here's Paul's written version of the presenentation. This presentation was recorded at the Open Source Convention (OSCON) 2004 in Portland, Oregon. See our list of other OSCON presentations
    Purchasing books from Amazon.com by clicking below helps us deliver IT Conversations for free
    Hackers and Painters: Big Ideas from the Computer Age by Paul Graham
    List Price: Amazon Price: You Save: Average Customer Rating:
    Amazon.com Customer Comment:

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 5     81-100 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20

    free hit counter