Copy Link
Add to Bookmark
Report
MOLE 05
+-------------------------------+
| * Hackers * |
| (a short bibliography) |
| journals/magazines |
| |
| 12/20/92 |
| [MOLE05.TXT] |
+-------------------------------+
Search request: FI TW HACKERS
Search result: 10 citations in the CC article database
1. IGNATIN GR.
LET THE HACKERS HACK - ALLOWING THE REVERSE ENGINEERING OF COPYRIGHTED
COMPUTER PROGRAMS TO ACHIEVE COMPATIBILITY.
UNIVERSITY OF PENNSYLVANIA LAW REVIEW, 1992 MAY, V140 N5:1999-2050.
2. CHARLES D.
INNOCENT HACKERS WANT THEIR COMPUTERS BACK.
Pub type: Editorial.
NEW SCIENTIST, 1992 MAY 9, V134 N1820:9-9.
3. MOSLEY W.
CYBERPUNK - OUTLAWS AND HACKERS ON THE COMPUTER FRONTIER - HAFNER,K,
MARKOFF,J.
Pub type: Book Review.
NEW YORK TIMES BOOK REVIEW, 1991 AUG 11, AUG:15-15.
4. HACKERS FACE STRICTER CONTROLS.
Pub type: Editorial.
ELECTRONICS WORLD & WIRELESS WORLD, 1991 JUL, V97 N1665:545-545.
5. GEAKE E.
VOICE-SPOTTING COMPUTER CATCHES HACKERS.
Pub type: Editorial.
NEW SCIENTIST, 1991 JUN 15, V130 N1773:28-28.
6. SOBCHACK V.
NEW-AGE MUTANT NINJA HACKERS (THE CYBERSPACE OF VIRTUAL-REALITY (VR))
Pub type: Note.
ARTFORUM, 1991 APR, V29 N8:24-26.
7. SPAFFORD E.
ON HIRING HACKERS.
Pub type: Letter.
COMMUNICATIONS OF THE ACM, 1990 OCT, V33 N10:14-14.
8. SHULMAN S.
COMPUTERS - HACKERS GENIUS AWARD.
Pub type: Editorial.
NATURE, 1990 JUL 19, V346 N6281:209-209.
9. DICKMAN S.
COMPUTER SECURITY - KGB HACKERS GET OFF LIGHTLY.
Pub type: Editorial.
NATURE, 1990 MAR 1, V344 N6261:6-6.
10. LINDLEY D.
COMPUTER SECURITY - HACKERS INTENTIONS KEY TO COURT CASE.
Pub type: Editorial.
NATURE, 1989 AUG 3, V340 N6232:329-329.