Hacking - Computers (certified, ethical): Difference between revisions

Content added Content deleted
No edit summary
No edit summary
Line 103: Line 103:


Coleman, E. Gabriella. 2012. [http://press.princeton.edu/titles/9883.html Coding Freedom: The Ethics and Aesthetics of Hacking]. Princeton, NJ: Princeton University Press.
Coleman, E. Gabriella. 2012. [http://press.princeton.edu/titles/9883.html Coding Freedom: The Ethics and Aesthetics of Hacking]. Princeton, NJ: Princeton University Press.

Himanen, Pekka, Linus Torvalds (introduction), Manuel Castells (epilogue). 2001. [http://ge.tt/6pi9TKO/v/7A The Hacker Ethic and the Spirit of the Information Age]. New York, NY: Random House.


Raymond, Eric Steven. 2001. [http://www.catb.org/~esr/faqs/hacker-howto.html How To Become A Hacker]. Thyrsus Enterprises.
Raymond, Eric Steven. 2001. [http://www.catb.org/~esr/faqs/hacker-howto.html How To Become A Hacker]. Thyrsus Enterprises.
Line 237: Line 239:


hessian. 2012. [http://hardware.slashdot.org/story/12/08/12/1732248/msft-reaches-out-to-hackers-do-epic- MSFT Reaches Out To Hackers: 'Do Epic $#!+']. August 12. hardware.slashdot.org/.
hessian. 2012. [http://hardware.slashdot.org/story/12/08/12/1732248/msft-reaches-out-to-hackers-do-epic- MSFT Reaches Out To Hackers: 'Do Epic $#!+']. August 12. hardware.slashdot.org/.

Himanen, Pekka, Linus Torvalds (introduction), Manuel Castells (epilogue). 2001. The Hacker Ethic and the Spirit of the Information Age. New York, NY: Random House.


Hurricane Hackers. 2012. [http://www.linkedin.com/today/post/article/20121101085048-1391-hurricane-hackers Hurricane Hackers]. November 1. LinkedIn.
Hurricane Hackers. 2012. [http://www.linkedin.com/today/post/article/20121101085048-1391-hurricane-hackers Hurricane Hackers]. November 1. LinkedIn.
Line 256: Line 256:
O'Dell, Jolie. 2011. [http://mashable.com/2011/02/21/kinect-sdk Xbox Kinect Vs. Sony PS3: How 2 Companies Handle Hacking]. February 21. Mashable.com
O'Dell, Jolie. 2011. [http://mashable.com/2011/02/21/kinect-sdk Xbox Kinect Vs. Sony PS3: How 2 Companies Handle Hacking]. February 21. Mashable.com


Pazzanese, Christina. 2013. [http://news.harvard.edu/gazette/story/2013/08/hack-attacks-explained/ Hack attacks, explained: Berkman Center’s Zittrain sees lessons in computer assaults on media]. August 29. Cambridge, MA: Harvard Gazette.
Pazzanese, Christina. 2013. [http://news.harvard.edu/gazette/story/2013/08/hack-attacks-explained/ Hack attacks, explained: Berkman Center’s Zittrain sees lessons in computer assaults on media]. August 29. Cambridge, MA: Harvard Gazette.


Phobos. 2011. [https://blog.torproject.org/blog/hackfest-thanks Hackfest Thanks]. Cambridge, MA: Tor Project.
Phobos. 2011. [https://blog.torproject.org/blog/hackfest-thanks Hackfest Thanks]. Cambridge, MA: Tor Project.
Line 394: Line 394:


Design Patterns. 2012. [http://hackerspaces.org/wiki/Design_Patterns Design Patterns]. hackerspaces.org.
Design Patterns. 2012. [http://hackerspaces.org/wiki/Design_Patterns Design Patterns]. hackerspaces.org.


===Subjects' Social Networking Sites===


===Tutoring===




Line 433: Line 439:


World University Law School: http://worlduniversity.wikia.com/wiki/World_University_Law_School
World University Law School: http://worlduniversity.wikia.com/wiki/World_University_Law_School