|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
JSTOROA_on1125459516 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m d |
007 |
cr ||||||||||| |
008 |
160829s2015 xx o 000 0 eng d |
040 |
|
|
|a SFB
|b eng
|c SFB
|d ZCU
|d OCLCF
|d VT2
|d WYU
|d OAPEN
|d DIPCC
|d UKKNU
|d EQF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d JSTOR
|
019 |
|
|
|a 919088645
|a 1136188703
|a 1159394244
|a 1167816394
|a 1180439116
|
020 |
|
|
|a 0692352465
|
020 |
|
|
|a 9780692352465
|
024 |
3 |
|
|a 9780692352465
|
024 |
7 |
|
|a 10.21983/P3.0088.1.00
|2 doi
|
029 |
1 |
|
|a AU@
|b 000065261071
|
029 |
1 |
|
|a AU@
|b 000069153446
|
035 |
|
|
|a (OCoLC)1125459516
|z (OCoLC)919088645
|z (OCoLC)1136188703
|z (OCoLC)1159394244
|z (OCoLC)1167816394
|z (OCoLC)1180439116
|
037 |
|
|
|b 01607001
|
037 |
|
|
|a 22573/cats2330587
|b JSTOR
|
050 |
|
4 |
|a ZA3270
|
072 |
|
7 |
|a JFD
|2 bicssc
|
072 |
|
7 |
|a SOC
|x 052000
|2 bisacsh
|
072 |
|
7 |
|a HIS
|x 037010
|2 bisacsh
|
082 |
0 |
4 |
|a 025.5/23
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kennedy, Kathleen
|e Author.
|
245 |
1 |
0 |
|a Medieval Hackers.
|
264 |
3 |
1 |
|a [Place of publication not identified]
|b Punctum Books
|c 2015
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|
337 |
|
|
|a computer
|b c
|
338 |
|
|
|a online resource
|b cr
|
500 |
|
|
|a Bibliographic Level Mode of Issuance: Monograph.
|
546 |
|
|
|a English.
|
520 |
|
|
|a An open-access monograph examining the commonalities between modern hacker culture and those who sought to translate protected texts in the Middle Ages.
|
505 |
0 |
|
|a Medieval hackers? -- Hacking bread laws -- The first hacker Bible -- Tyndale and the Joye of piracy -- Selling statutes -- Homo hacker? : an epilogue.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Open Access
|
650 |
|
0 |
|a Information commons.
|
650 |
|
0 |
|a Intellectual property.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
6 |
|a Carrefours de l'information et de l'apprentissage.
|
650 |
|
6 |
|a Propriété intellectuelle.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
7 |
|a intellectual property.
|2 aat
|
650 |
|
7 |
|a Media studies.
|2 bicssc
|
650 |
|
7 |
|a Social Science / Media Studies.
|2 bisacsh
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Information commons.
|2 fast
|0 (OCoLC)fst01765206
|
650 |
|
7 |
|a Intellectual property.
|2 fast
|0 (OCoLC)fst00975774
|
653 |
|
|
|a medieval history, information commons, hacktivism, media archeology, intellectual property, media studies, Renaissance history
|
776 |
0 |
8 |
|i Print version:
|z 0692352465
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/jj.2353911
|z Texto completo
|
938 |
|
|
|a Knowledge Unlatched
|b KNOW
|n eb985f00-9506-41aa-9937-367053a42281
|
938 |
|
|
|a OAPEN Foundation
|b OPEN
|n 1004562
|
938 |
|
|
|a DCS UAT TEST 8
|b TEST
|n 1004562
|
994 |
|
|
|a 92
|b IZTAP
|