Come vincere nella lotta con la Bestia. Istruzioni per un uso razionale del computer |
Umberto Eco [LA BUSTINA DI MINERVA - Espresso 02 12 99] |
 |
 |
 |
Creative Commons in Italia - Il "volto umano" del copyright |
Matteo Tonelli [la Repubblica.it] |
 |
 |
 |
Copyright? No, copyleft |
Alessandro Gilioli [Espresso OnLine] |
 |
 |
 |
IT's foot soldier |
ANAND SANKAR [The Hindu] |
 |
 |
 |
Hackers re-invent political protests |
Clark Boyd [BBC NEWS - World Edition] |
 |
 |
 |
Hackers: Methods of Attack and Defense |
Jeremy Quittner [TLC] |
 |
 |
 |
Hacker Hoaxes |
TLC |
 |
 |
 |
The Insider Threat to Information Systems. The Psychology of the Dangerous Insider [Security Awareness Bulletin, No. 2-98] |
Eric Shaw, Ph.D., Keven G. Ruby, M.A. and Jerrold M. Post, M.D. |
 |
 |
 |
Hacker Psych 101 |
Jeremy Quittner [TLC] |
 |
 |
 |
1995-2001 - Gli hacker nella rete di massa |
Raoul Chiesa [MyTech] |
 |
 |
 |