Computer Security Conference Events
Common activities at hacker conventions may include:
- "Boot camps"- offering training and certification in Information Technology.
- Presentations from keynote speakers, or panels. Common topics include social engineering, lockpicking, penetration testing, and hacking tools.
Read more about this topic: Hacker Con
Famous quotes containing the words computer, security, conference and/or events:
“The analogy between the mind and a computer fails for many reasons. The brain is constructed by principles that assure diversity and degeneracy. Unlike a computer, it has no replicative memory. It is historical and value driven. It forms categories by internal criteria and by constraints acting at many scales, not by means of a syntactically constructed program. The world with which the brain interacts is not unequivocally made up of classical categories.”
—Gerald M. Edelman (b. 1928)
“If we could have any security against moods! If the profoundest prophet could be holden to his words, and the hearer who is ready to sell all and join the crusade, could have any certificate that to-morrow his prophet shall not unsay his testimony!”
—Ralph Waldo Emerson (18031882)
“Politics is still the mans game. The women are allowed to do the chores, the dirty work, and now and thenbut only occasionallyone is present at some secret conference or other. But its not the rule. They can go out and get the vote, if they can and will; they can collect money, they can be grateful for being permitted to work. But that is all.”
—Mary Roberts Rinehart (18761958)
“If there is a case for mental events and mental states, it must be that the positing of them, like the positing of molecules, has some indirect systematic efficacy in the development of theory.”
—Willard Van Orman Quine (b. 1908)