-
3
-
-
0041450577
-
Crime and puzzlement
-
Fall 1990
-
Barlow, J.P., (1990), 'Crime and Puzzlement', Whole Earth Review, Fall 1990, 44-57.
-
(1990)
Whole Earth Review
, pp. 44-57
-
-
Barlow, J.P.1
-
7
-
-
0004168689
-
-
London: HarperCollins
-
Coupland, D., (1995), Microserfs, London: HarperCollins.
-
(1995)
Microserfs
-
-
Coupland, D.1
-
8
-
-
85033893830
-
IP-spoofing demystified
-
deamon9/route/infinity
-
deamon9/route/infinity, (1996), 'IP-Spoofing Demystified', Phrack, 1 (48), also available at http://www.geocities.com/CapeCanaveral/3498/.
-
(1996)
Phrack
, vol.1
, Issue.48
-
-
-
10
-
-
8644261043
-
-
London: Duke University Press
-
Dery, M., (ed.), (1993), Flame Wars, London: Duke University Press.
-
(1993)
Flame Wars
-
-
Dery, M.1
-
11
-
-
84982710882
-
The concept of a social movement
-
Diani, M., (1992), 'The Concept of a Social Movement', The Sociological Review, 40 (1): 1-25.
-
(1992)
The Sociological Review
, vol.40
, Issue.1
, pp. 1-25
-
-
Diani, M.1
-
13
-
-
0011192576
-
Web-Spoofing: An internet con game
-
Department of Computer Science, Princeton University
-
Felten, E., Balfanz, D., Dean, D. and Wallack, D., (1996), 'Web-Spoofing: an Internet con game', Technical Report 540-96, Department of Computer Science, Princeton University, also at http://www.cs.princeton.edu/sip.
-
(1996)
Technical Report 540-96
-
-
Felten, E.1
Balfanz, D.2
Dean, D.3
Wallack, D.4
-
14
-
-
11344279136
-
-
Cherny, L. and Weise, E. (eds), (1996)
-
Gilboa, N., (1996), 'Elites, Lamers, Narcs and Whores: exploring the computer underground', in Cherny, L. and Weise, E. (eds), (1996), 98-113.
-
(1996)
Elites, Lamers, Narcs and Whores: Exploring the Computer Underground
, pp. 98-113
-
-
Gilboa, N.1
-
15
-
-
85033882029
-
Hacker testimony to house sub-committee largely unheard
-
5.43
-
Goldstein, E., (1993), 'Hacker Testimony to House Sub-committee Largely Unheard', Computer Underground Digest, 5.43.
-
(1993)
Computer Underground Digest
-
-
Goldstein, E.1
-
17
-
-
0042452680
-
Surfing superhighwaymen
-
7/12/1996
-
Gow, D. and Norton-Taylor, R., (1996), 'Surfing Superhighwaymen', The Guardian newspaper, 7/12/1996, 28.
-
(1996)
The Guardian Newspaper
, pp. 28
-
-
Gow, D.1
Norton-Taylor, R.2
-
21
-
-
0042452677
-
Whitehall attempts to foil net hackers
-
26 April
-
Hencke, D., (1998), 'Whitehall Attempts to Foil Net Hackers', Guardian Weekly, 26 April, 8.
-
(1998)
Guardian Weekly
, pp. 8
-
-
Hencke, D.1
-
22
-
-
85033902122
-
-
unpublished PhD dissertation, Carnegie Mellon University
-
Howard, J., (1997), 'Information Security', unpublished PhD dissertation, Carnegie Mellon University, available at http://www.cert.org.
-
(1997)
Information Security
-
-
Howard, J.1
-
23
-
-
84982743626
-
The unity of social movements
-
Jordan, T., (1995), 'The Unity of Social Movements', The Sociological Review, 43 (4): 675-692.
-
(1995)
The Sociological Review
, vol.43
, Issue.4
, pp. 675-692
-
-
Jordan, T.1
-
25
-
-
0042953621
-
-
Jordan, T. and Lent, A. (eds), (1998)
-
Jordan, T., (1998b), 'New Space? New Politics: cyberpolitics and the Electronic Frontier Foundation', in Jordan, T. and Lent, A. (eds), (1998).
-
(1998)
New Space? New Politics: Cyberpolitics and the Electronic Frontier Foundation
-
-
Jordan, T.1
-
28
-
-
4043180590
-
Machismo and the hacker mentality: Some personal observations and speculations
-
Keller, L., (1988), 'Machismo and the Hacker Mentality: some personal observations and speculations', paper presented to WiC (Women in Computing) Conference.
-
(1988)
WiC (Women in Computing) Conference
-
-
Keller, L.1
-
32
-
-
85033889384
-
-
National Computing Centre
-
NCC, (1991), 'Survey of Security Breaches', National Computing Centre.
-
(1991)
Survey of Security Breaches
-
-
-
33
-
-
0041450556
-
The baudy world of the byte: A post-modernist interpretation of the computer underground
-
Reno, November 1989
-
Meyer, G. and Thomas, J., (1989), 'The Baudy World of the Byte: a post-modernist interpretation of the Computer Underground', paper presented at the American Society of Criminology annual meeting, Reno, November 1989.
-
(1989)
American Society of Criminology Annual Meeting
-
-
Meyer, G.1
Thomas, J.2
-
34
-
-
85033883349
-
Hacker takes over labour's cyberspace
-
10/12/1996
-
Miller, S., (1996), 'Hacker takes over Labour's cyberspace', The Guardian newspaper, 10/12/1996, 1.
-
(1996)
The Guardian Newspaper
, pp. 1
-
-
Miller, S.1
-
37
-
-
0345911244
-
-
Harasim, L. (ed.), 1993
-
Quarterman, J., (1993), 'The Global Matrix of Minds', in Harasim, L. (ed.), 1993, 35-56.
-
(1993)
The Global Matrix of Minds
, pp. 35-56
-
-
Quarterman, J.1
-
40
-
-
53149096948
-
-
honours thesis. Sociology and Anthropology, Concordia University, Montreal
-
Rosteck, T., (1994), 'Computer Hackers: rebels with a cause', honours thesis. Sociology and Anthropology, Concordia University, Montreal, also at http://www. geocities.com/CapeCanaveral/3498/.
-
(1994)
Computer Hackers: Rebels with a Cause
-
-
Rosteck, T.1
-
50
-
-
84866809218
-
-
WarRoom Research, LLC
-
WarRoom, (1996), '1996 Information Systems Security Survey', WarRoom Research, LLC, available at http://www.infowar.com/.
-
(1996)
1996 Information Systems Security Survey
-
-
|