LEADER 01052nam a22002531i 4500 001 991003107129707536 005 20030829151339.0 008 030925s1915 it |||||||||||||||||ita 035 $ab12381093-39ule_inst 035 $aARCHE-042862$9ExL 040 $aBiblioteca Interfacoltà$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a945.51 100 1 $aPoggiolini, Alfredo$0455657 245 10$aGrandezze e miserie fiorentine durante il secolo XVII /$cAlfredo Poggiolini 260 $aFirenze :$bRassegna nazionale,$c1915 300 $a1 v. ;$c25 cm 500 $aEstr. da: Rassegna Nazionale, fasc. 1-16 luglio e 1 agosto (1915) 650 4$aFirenze$xStoria$xSec. 17. 907 $a.b12381093$b02-04-14$c08-10-03 912 $a991003107129707536 945 $aLE002 Misc. I F 8/17 (Fondo Ferretti)$g1$i2002000196460$lle002$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i12786986$z08-10-03 996 $aGrandezze e miserie fiorentine durante il secolo XVII$9169475 997 $aUNISALENTO 998 $ale002$b08-10-03$cm$da $e-$fita$git $h0$i1 LEADER 02824nam 2200637Ia 450 001 996199867703316 005 20240402112350.0 010 $a1-134-67826-6 010 $a1-84442-809-5 010 $a0-203-28730-4 010 $a0-415-18072-4 010 $a1-280-10482-1 035 $a(CKB)1000000000250487 035 $a(EBL)166300 035 $a(OCoLC)647430660 035 $a(SSID)ssj0000376483 035 $a(PQKBManifestationID)11282897 035 $a(PQKBTitleCode)TC0000376483 035 $a(PQKBWorkID)10335334 035 $a(PQKB)11020137 035 $a(MiAaPQ)EBC166300 035 $a(Au-PeEL)EBL166300 035 $a(CaPaEBR)ebr10099098 035 $a(CaONFJC)MIL10482 035 $a(EXLCZ)991000000000250487 100 $a19990219d1999 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHackers$b[electronic resource] $ecrime in the digital sublime /$fPaul A. Taylor 205 $a1st ed. 210 $aLondon ;$aNew York $cRoutledge$d1999 215 $a1 online resource (218 p.) 300 $aDescription based upon print version of record. 311 $a0-203-20150-7 311 $a0-415-18071-6 320 $aIncludes bibliographical references and index. 327 $aCover; Hackers: Crime in the digital sublime; Copyright; Contents; Preface; Acknowledgements; Introduction; 1 Them and us: The hack; 2 Hacking culture; 3 The motivations of hackers; 4 State of the industry; 5 Them and us: The hawks and the doves; 6 The professionalisation process; 7 The construction of computer ethics; 8 Conclusion; Appendix: Additional examples of media hype; Notes; Bibliography; Index 330 $aThe practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.Using a wealth of material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a uniquely revealing and richly sourced account of the debates that surround this controversial practice. By doing so, he reveals the dangers inherent in the extremes of conciliation and antagonism with which society reacts to hacking and argues that a new middl 606 $aComputer crimes$zNetherlands 606 $aComputer hackers$zNetherlands$xAttitudes 606 $aFreedom of information$zNetherlands 615 0$aComputer crimes 615 0$aComputer hackers$xAttitudes. 615 0$aFreedom of information 676 $a364.16/8 700 $aTaylor$b Paul A.$f1967-$0888283 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996199867703316 996 $aHackers$92189338 997 $aUNISA