|
|
|
|
LEADER |
00000cam a22000004a 4500 |
001 |
musev2_86366 |
003 |
MdBmJHUP |
005 |
20230905052846.0 |
006 |
m o d |
007 |
cr||||||||nn|n |
008 |
010829s2002 mnu o 00 0 eng d |
010 |
|
|
|z 2001005377
|
020 |
|
|
|a 9780816652969
|
020 |
|
|
|z 9780816633463
|
020 |
|
|
|z 0816652961
|
040 |
|
|
|a MdBmJHUP
|c MdBmJHUP
|
100 |
1 |
|
|a Thomas, Douglas,
|d 1966-
|
245 |
1 |
0 |
|a Hacker Culture /
|c Douglas Thomas.
|
264 |
|
1 |
|a Minneapolis :
|b University of Minnesota Press,
|c 2002.
|
264 |
|
3 |
|a Baltimore, Md. :
|b Project MUSE,
|c 0000
|
264 |
|
4 |
|c ©2002.
|
300 |
|
|
|a 1 online resource (296 pages):
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a The evolution of the hacker -- Hacking culture -- Hacking as the performance of technology: reading the "Hacker manifesto" -- Hacking in the 1990s -- Hacking representation -- Representing hacker culture: reading Phrack -- (Not) Hackers: subculture, style, and media incorporation -- Hacking law -- Technology and punishment: the juridical construction of the hacker -- Epilogue: Kevin Mitnick and Chris Lamprecht.
|
520 |
|
|
|a Demonized by governments and the media as criminals, glorified within their own subculture as outlaws, hackers have played a major role in the short history of computers and digital culture-and have continually defied our assumptions about technology and secrecy through both legal and illicit means. In Hacker Culture, Douglas Thomas provides an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Addressing such issues as the commodification of the hacker ethos by Silicon Valley entrepreneurs, the high-profile arrests of prominent hackers, and conflicting self-images among hackers themselves, Thomas finds that popular hacker stereotypes reflect the public's anxieties about the information age far more than they do the reality of hacking.
|
588 |
|
|
|a Description based on print version record.
|
650 |
1 |
7 |
|a Databescherming.
|2 gtt
|
650 |
1 |
7 |
|a Hacking.
|2 gtt
|
650 |
|
7 |
|a Computer programming
|x Moral and ethical aspects.
|2 fast
|0 (OCoLC)fst00872400
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x Popular Culture.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Public Policy
|x Cultural Policy.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x Anthropology
|x Cultural.
|2 bisacsh
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
6 |
|a Programmation (Informatique)
|x Aspect moral.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Computer programming
|x Moral and ethical aspects.
|
655 |
|
0 |
|a Electronic book.
|
655 |
|
7 |
|a Electronic books.
|2 local
|
710 |
2 |
|
|a Project Muse.
|e distributor
|
830 |
|
0 |
|a Book collections on Project MUSE.
|
856 |
4 |
0 |
|z Texto completo
|u https://projectmuse.uam.elogim.com/book/86366/
|
945 |
|
|
|a Project MUSE - Custom Collection
|