inf 040
25  Ergebnisse:
?
1

Working in public 

the making and maintenance of open source software 
Eghbal, Nadia - First Edition . , [2020]
Exemplar:  Zentrale:E02 a inf 040/243
 
?
2

Privacy is power 

why and how you should take back control of your data 
Véliz, Carissa , [2020]
Exemplar:  Zentrale:E02 a inf 032/138
 
?
3

Designing for privacy and its legal framework 

data protection by design and default for the internet of t...  Law, governance and technology series ; volume 40;ProQuest Ebook Central
Link: http://ebookcentral.proq..

Exemplar:  BB Nat.-NW1: h jur 103.2 ea/101
 
?
4

The Kish cypher 

the story of KLJN for unconditional security 
Kish, Laszlo B. , [2017]
Exemplar:  Zentrale:E02 a inf 461 e/307
 
?
5

Hacked 

a radical approach to Hacker culture and crime  Alternative criminology series
 
?
7

Coding freedom 

the ethics and aesthetics of hacking 
Exemplar:  Zentrale:E02 a inf 040 e/615
 
?
8

Configuring the networked self 

law, code, and the play of everyday practice 
Cohen, Julie E. , c 2012
Exemplar:  Zentrale:E02 a inf 030 e/466
 
?
9

Configuring the networked self 

law, code, and the play of everyday practice 
 
?
10

Access contested 

security, identity, and resistance in Asian cyberspace  Information revolution and global politics
Exemplar:  Zentrale:E02 a inf 050 m/127
 
?
 
?
12

The net delusion 

the dark side of internet freedom 
Morozov, Evgeny ; Morozov, Evgenij V. - [Paperback ed.], 1. ed. . , 2011
Exemplar:  Zentrale:E02 a inf 031 e/227
 
?
13

A gift of fire 

social, legal, and ethical issues for computing and the int...  Pearson education International
Baase, Sara - 3. ed., Pearson internat. ed. . , 2009
Exemplar:  Zentrale:E02 a inf 040 e/531
 
?
14

The shadow factory 

the ultra-secret NSA from 9/11 to the eavesdropping on Amer... 
Bamford, James - 1. Anchor Books ed. . , 2008
Exemplar:  Zentrale:E02 a inf 040 7ba/402
 
?
15

Open source 

technology and policy 
Deek, Fadi P. - 1. publ. . , 2008
Exemplar:  Zentrale:E02 a inf 040 e/987
 
1-15