Hacking - Computers (certified, ethical): Difference between revisions
Content added Content deleted
No edit summary |
No edit summary |
||
Line 103: | Line 103: | ||
Coleman, E. Gabriella. 2012. [http://press.princeton.edu/titles/9883.html Coding Freedom: The Ethics and Aesthetics of Hacking]. Princeton, NJ: Princeton University Press. |
Coleman, E. Gabriella. 2012. [http://press.princeton.edu/titles/9883.html Coding Freedom: The Ethics and Aesthetics of Hacking]. Princeton, NJ: Princeton University Press. |
||
⚫ | |||
Raymond, Eric Steven. 2001. [http://www.catb.org/~esr/faqs/hacker-howto.html How To Become A Hacker]. Thyrsus Enterprises. |
Raymond, Eric Steven. 2001. [http://www.catb.org/~esr/faqs/hacker-howto.html How To Become A Hacker]. Thyrsus Enterprises. |
||
Line 237: | Line 239: | ||
hessian. 2012. [http://hardware.slashdot.org/story/12/08/12/1732248/msft-reaches-out-to-hackers-do-epic- MSFT Reaches Out To Hackers: 'Do Epic $#!+']. August 12. hardware.slashdot.org/. |
hessian. 2012. [http://hardware.slashdot.org/story/12/08/12/1732248/msft-reaches-out-to-hackers-do-epic- MSFT Reaches Out To Hackers: 'Do Epic $#!+']. August 12. hardware.slashdot.org/. |
||
⚫ | |||
Hurricane Hackers. 2012. [http://www.linkedin.com/today/post/article/20121101085048-1391-hurricane-hackers Hurricane Hackers]. November 1. LinkedIn. |
Hurricane Hackers. 2012. [http://www.linkedin.com/today/post/article/20121101085048-1391-hurricane-hackers Hurricane Hackers]. November 1. LinkedIn. |
||
Line 256: | Line 256: | ||
O'Dell, Jolie. 2011. [http://mashable.com/2011/02/21/kinect-sdk Xbox Kinect Vs. Sony PS3: How 2 Companies Handle Hacking]. February 21. Mashable.com |
O'Dell, Jolie. 2011. [http://mashable.com/2011/02/21/kinect-sdk Xbox Kinect Vs. Sony PS3: How 2 Companies Handle Hacking]. February 21. Mashable.com |
||
Pazzanese, Christina. 2013. [http://news.harvard.edu/gazette/story/2013/08/hack-attacks-explained/ Hack attacks, explained: Berkman Center’s Zittrain sees lessons in computer assaults on media]. August 29. Cambridge, MA: Harvard Gazette. |
Pazzanese, Christina. 2013. [http://news.harvard.edu/gazette/story/2013/08/hack-attacks-explained/ Hack attacks, explained: Berkman Center’s Zittrain sees lessons in computer assaults on media]. August 29. Cambridge, MA: Harvard Gazette. |
||
Phobos. 2011. [https://blog.torproject.org/blog/hackfest-thanks Hackfest Thanks]. Cambridge, MA: Tor Project. |
Phobos. 2011. [https://blog.torproject.org/blog/hackfest-thanks Hackfest Thanks]. Cambridge, MA: Tor Project. |
||
Line 394: | Line 394: | ||
Design Patterns. 2012. [http://hackerspaces.org/wiki/Design_Patterns Design Patterns]. hackerspaces.org. |
Design Patterns. 2012. [http://hackerspaces.org/wiki/Design_Patterns Design Patterns]. hackerspaces.org. |
||
===Subjects' Social Networking Sites=== |
|||
===Tutoring=== |
|||
Line 433: | Line 439: | ||
World University Law School: http://worlduniversity.wikia.com/wiki/World_University_Law_School |
World University Law School: http://worlduniversity.wikia.com/wiki/World_University_Law_School |
||