Showing 21 - 40 results of 76 for search '"The Hacker"', query time: 0.05s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33

    Uptake and 4-week outcomes of an ‘opt-out’ smoking cessation referral strategy in a London-based lung cancer screening setting by Anthony Edey, Neal Navani, Kitty Chan, Graham Robinson, Janine Zylstra, Paul Robinson, Laura Green, Anand Devaraj, Jane Rowlands, Allan Hackshaw, Carolyn Horst, Arjun Nair, Sam M Janes, Kate Davies, Jeannie Eng, Mamta Ruparel, Samantha L Quaife, Jennifer L Dickson, Magali Taylor, Angshu Bhowmik, Hasti Robbie, Joseph Jacob, Laura Farrelly, Sophie Tisi, Tanya Patrick, Andrew Creamer, Helen Hall, Samanjit Hare, Jon Teague, Samuel M Janes, Esther Arthur-Darkwa, Thea Buchan, Stephen Ellis, Thomas Callender, Rachael Sarpong, John McCabe, Zaheer Mangera, Ethaar El-Emir, Terry O'Shaughnessy, Geoff Bellingan, Nick Screaton, Priyam Verghese, William M Ricketts, Vicky Bowyer, Kylie Gyertson, Fanta Bojang, Claire Levermore, Tania Anastasiadis, Ruth Prendecki, Amyn Bhamani, Malavika Suresh, Judy Airebamen, Alice Cotton, Kaylene Phua, Elodie Murali, Simranjit Mehta, Karen Parry-Billings, Columbus Ife, April Neville, Zahra Hanif, Helen Kiconco, Ricardo McEwen, Dominique Arancon, Nicholas Beech, Derya Ovayolu, Christine Hosein, Sylvia Patricia Enes, Qin April Neville, Aashna Samson, Urja Patel, Fahmida Hoque, Hina Pervez, Sofia Nnorom, Moksud Miah, Julian McKee, Mark Clark, Anant Patel, Sara Lock, Rajesh Banka, Ugo Ekeowa, Charlotte Cash, Tunku Aziz, Alberto Villanueva, Elena Stefan, Charlie Sayer, Navinah Nundlall, Andrew Crossingham, Tanita Limani, Kate Gowers, Andrew Perugia, James Rusius, Anne-Marie Hacker, Monica L Mullin, Evangelos Katsampouris, Chuen R Khaw, Chuen Khaw, Sheetal Karavadra, Alan Shaw, Chris Valerio, Ali Mohammed, Lynsey Gallagher, Mehran Azimbagirad, Burcu Ozaltin, Maureen Browne, Eleanor Hellier, Catherine Nestor

    Published 2025-02-01
    Get full text
    Article
  14. 34

    Life : The science of Biology

    Published 2020
    View in OPAC
    Book
  15. 35

    Entre piratas y fantasmas: ciberespacio y contracultural by Galo Cevallos Rueda

    Published 1999-06-01
    “… El hacker más famosos Kevin Mitnick, logró alterar la información de muchas empresas como : New York Times, Nokia, que tuvieron un gran costo para las autoridades pertinentes. …”
    Get full text
    Article
  16. 36

    A general attack model based on Android system vulnerability by Xihai DENG, Weimiao FENG, Luping MA, Ying LI

    Published 2016-10-01
    “…The experiment result shows that the general model is able to accurately describe the process of hacker attacks using Android system vulnerabilities. …”
    Get full text
    Article
  17. 37

    Data security protection schema of telecom operators under the environment of big data by Shengli ZHOU, Bin CHEN, Lifa WU

    Published 2017-05-01
    “…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
    Get full text
    Article
  18. 38

    INTERNET INFLUENCE ON INTERNATIONAL POLITICS by E. S. Zinovieva

    Published 2013-08-01
    “…New forms of international conflicts, including information war, network wars, hacker attacks etc. are one of the negative results of the fast internet and information technologies development.At the same time development of information technology poses new challenges to international and national security, which can only be reduced through collective efforts of the international community.…”
    Get full text
    Article
  19. 39

    Computer Network Attacks and Modern International Law by A. L. Kozik

    Published 2014-04-01
    “…States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. …”
    Get full text
    Article
  20. 40

    PHILOSOPHICAL-ANTROPOLOGICAL ASPECTS OF A PROBLEM OF SEARCH EXTRA-TERRESTRIAL OF CIVILIZATIONS by A. T. Tshedrin

    Published 2013-09-01
    “…The positive and negative scripts of dialogue with ETAI, problem «of high quality of a signal» and «SETI-hacker», connected with ETAI as by the subject of space dialogue are considered. …”
    Get full text
    Article