Computer Security Conference Events
Common activities at hacker conventions may include:
- "Boot camps"- offering training and certification in Information Technology.
- Presentations from keynote speakers, or panels. Common topics include social engineering, lockpicking, penetration testing, and hacking tools.
Read more about this topic: Hacker Con
Famous quotes containing the words computer, security, conference and/or events:
“The analogy between the mind and a computer fails for many reasons. The brain is constructed by principles that assure diversity and degeneracy. Unlike a computer, it has no replicative memory. It is historical and value driven. It forms categories by internal criteria and by constraints acting at many scales, not by means of a syntactically constructed program. The world with which the brain interacts is not unequivocally made up of classical categories.”
—Gerald M. Edelman (b. 1928)
“A well-regulated militia being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.”
—U.S. Constitution, Second Amendment.
“The peace conference must not adjourn without the establishment of some ordered system of international government, backed by power enough to give authority to its decrees. ... Unless a league something like this results at our peace conference, we shall merely drop back into armed hostility and international anarchy. The war will have been fought in vain ...”
—Virginia Crocheron Gildersleeve (18771965)
“The return of the asymmetrical Saturday was one of those small events that were interior, local, almost civic and which, in tranquil lives and closed societies, create a sort of national bond and become the favorite theme of conversation, of jokes and of stories exaggerated with pleasure: it would have been a ready- made seed for a legendary cycle, had any of us leanings toward the epic.”
—Marcel Proust (18711922)