?
1
Working in public
the making and maintenance of open source software
Exemplar:
Zentrale:E02 a inf 040/243
?
2
Privacy is power
why and how you should take back control of your data
Exemplar:
Zentrale:E02 a inf 032/138
?
3
Designing for privacy and its legal framework
data protection by design and default for the internet of t...
Law, governance and technology series ; volume 40;ProQuest Ebook Central
?
4
The Kish cypher
the story of KLJN for unconditional security
Exemplar:
Zentrale:E02 a inf 461 e/307
?
8
Configuring the networked self
law, code, and the play of everyday practice
Exemplar:
Zentrale:E02 a inf 030 e/466
?
10
Access contested
security, identity, and resistance in Asian cyberspace
Information revolution and global politics
Exemplar:
Zentrale:E02 a inf 050 m/127
?
13
A gift of fire
social, legal, and ethical issues for computing and the int...
Pearson education International
Exemplar:
Zentrale:E02 a inf 040 e/531
?
14
The shadow factory
the ultra-secret NSA from 9/11 to the eavesdropping on Amer...
Exemplar:
Zentrale:E02 a inf 040 7ba/402