LEADER 01460nam0 22003251i 450 001 UON00497715 005 20231205105400.461 010 $a22-530-6653-2 100 $a20190918d1994 |0itac50 ba 101 $afre$aFRO 102 $aFR 105 $a|||| ||||| 200 1 $aˆLe ‰mesnagier de Paris$ftexte edite par Georgina E. Brereton et Janet M. Ferrier$gtraduction et notes par Karin Ueltschi 210 $aParis$cLibrairie generale francaise$dc1994 215 $a859 p.$d18 cm. 316 $aDono Prof. Alberto Varvaro.$5IT-UONSI F. Varvaro2830 410 1$1001UON00176648$12001 $aˆLe ‰livre de Poche. Lettres gothiques$1210 $aParis$cLibrairie Générale Française$v4540 606 $aLetteratura francese$xMedioevo$3UONC084640$2FI 620 $aFR$dParis$3UONL002984 676 $a848.108$cSCRITTI MISCELLANEI FRANCESI. ORIGINI-1400. Scritti in prosa$v22 702 1$aBRERETON$bGeorgina E.$3UONV245300 702 1$aFERRIER$bJanet M.$3UONV245301 702 1$aUELTSCHI$bKarin$3UONV245302 712 $aLibrairie Générale Française$3UONV269170$4650 801 $aIT$bSOL$c20250627$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00497715 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI F. Varvaro2830 $eSI 31786 7 Dono Prof. Alberto Varvaro. 996 $aMesnagier de Paris$9565115 997 $aUNIOR LEADER 02340nam 22005174a 450 001 9910964474703321 005 20250716160017.0 010 $a9780816652969 010 $a0816652961 035 $a(CKB)3710000001409227 035 $a(MiAaPQ)EBC310568 035 $a(Au-PeEL)EBL310568 035 $a(CaPaEBR)ebr10151190 035 $a(OCoLC)228143274 035 $a(EXLCZ)993710000001409227 100 $a20010829d2002 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHacker culture /$fDouglas Thomas 205 $a1st ed. 210 $aMinneapolis $cUniversity of Minnesota Press$dc2002 215 $a1 online resource (xxvii, 266 pages) $cillustrations 300 $aDescription based upon print version of record. 311 08$a9780816633456 311 08$a0816633452 311 08$a9780816633463 311 08$a0816633460 320 $aIncludes bibliographical references (p. 239-250) and index. 327 $aIntro -- Contents -- Acknowledgments -- Introduction -- Part I. The Evolution of the Hacker -- 1. Hacking Culture -- 2. Hacking as the Performance of Technology: Reading the "Hacker Manifesto" -- 3. Hacking in the 1990s -- Part II. Hacking Representation -- 4. Representing Hacker Culture: Reading Phrack -- 5. (Not) Hackers: Subculture, Style, and Media Incorporation -- Part III. Hacking Law -- 6. Technology and Punishment: The Juridical Construction of the Hacker -- Epilogue: Kevin Mitnick and Chris Lamprecht -- Notes -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Y -- Z. 330 $aDouglas Thomas provides an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. 606 $aComputer programming$xMoral and ethical aspects 606 $aHackers 615 0$aComputer programming$xMoral and ethical aspects. 615 0$aHackers. 676 $a306.1 700 $aThomas$b Douglas$f1966-$01390701 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910964474703321 996 $aHacker culture$94366356 997 $aUNINA