A Sociology of Hackers
暂无分享,去创建一个
[1] A. Lent,et al. Storming the Millennium: The New Politics of Change , 1999 .
[2] M. Castells. The Information Age: Economy, Society and Culture , 1999 .
[3] P. Taylor. Hackers : a case-study of the social shaping of computing , 1998 .
[4] D. Sim. The Rise of the Network Society (The Information Age: Economy, Society and Culture, Volume 1) , 1998 .
[5] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[6] Philip L. Shiman. Credits for the Information Highway. (Book Reviews: Transforming Computer Technology. Information Processing for the Pentagon, 1962-1986.; Where Wizards Stay Up Late. The Origins of the Internet.) , 1996 .
[7] Jonathan Littman. The Fugitive Game: Online with Kevin Mitnick: The Inside Story of the Great Cyberchase , 1996 .
[8] Cherny Werse. Wired Women: Gender and New Realities in Cyberspace , 1996 .
[9] Lynn Cherny,et al. Wired Women: Gender and New Realities in Cyberspace , 1996 .
[10] T. Jordan. The Unity of Social Movements , 1995 .
[11] M. Slatalla. Masters of Deception: The Gang That Ruled Cyberspace , 1995 .
[12] Linda M. Harasim,et al. Book Reviews : Global Networks: Computers and International Communication Linda M. Harasim (Ed.) Publisher: MIT Press, Cambridge, MA 92142 Year of Publication: 1993 Length: 410 pages Price: $29.95 , 1994 .
[13] Bernard Zajac. The Hacker Crackdown—Law and disorder on the electronic frontier : Author:Bruce Sterling ISBN: 0-553-56370-X Publisher: Bantam Books Price: £16.99 (UK Hardback); $5.99 (US paperback) , 1994 .
[14] Linda M. Harasim. The Global Matrix of Minds , 1993 .
[15] Bruce Sterling,et al. The Hacker Crackdown: Law and Disorder on the Electronic Frontier , 1992 .
[16] M. Diani. The Concept of Social Movement , 1992 .
[17] Clive Davidson,et al. Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .
[18] Eugene H. Spafford,et al. Are computer hacker break-ins ethical? , 1992, J. Syst. Softw..
[19] Bryan Clough,et al. Approaching zero: Data crime and the computer underworld , 1992 .
[20] Peter J. Denning,et al. Computers under attack: intruders, worms, and viruses , 1991 .
[21] Ellen Spertus. Why are there so few female computer scientists , 1991 .
[22] Katie Hafner,et al. Cyberpunk: Outlaws and Hackers on the Computer Frontier , 1991 .
[23] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[24] John S. Quarterman,et al. The Matrix: Computer Networks and Conferencing Systems Worldwide , 1989 .
[25] V. Jupp. Methods of criminological research , 1989 .
[26] Vincent Mosco,et al. The political economy of information , 1988 .
[27] Suzanne K. Damarin,et al. The second self: Computers and the human spirit , 1985 .
[28] Steven Levy,et al. Hackers: Heroes of the Computer Revolution , 1984 .
[29] Sherry Turkle,et al. The second self: computers and the human spirit , 1984 .