Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Piratage")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 197

  • Page / 8
Export

Selection :

  • and

Piracy doesn't payMEALEY, M.Civil engineering (New York, NY. 1983). 1999, Vol 69, Num 5, pp 42-43, issn 0885-7024Article

Hackers' accounts: Hacking as a social entertainment : Deviance and the Internet: New Challenges for Social Science = Le hacking comme divertissement social : Déviance et internet: nouveaux défis pour la science socialeTURGEMAN-GOLDSCHMIDT, Orly.Social science computer review. 2005, Vol 23, Num 1, pp 8-23, issn 0894-4393, 16 p.Article

Long John Software and the Digital Jolly RogerGRIER, David Alan.Computer (Long Beach, CA). 2008, Vol 41, Num 3, pp 7-9, issn 0018-9162, 3 p.Article

Échec au piratage = Anticopy systemsMARTIN, Gabriel.Recherche (Paris, 1970). 2006, Num 401, pp 80-81, issn 0029-5671, 2 p.Article

Digitale wasserzeichen = Digital watermarkingSTEINEBACH, Martin; DITTMANN, Jana.Information Wissenschaft und Praxis. 2002, Vol 53, Num 5, pp 261-268, issn 1434-4653Article

From Friday to Sunday : the hacker ethic and shifting notions of labour, leisure and intellectual propertyBROWN, James J.Leisure studies. 2008, Vol 27, Num 4, pp 395-409, issn 0261-4367, 15 p.Article

Network security todayLOPEZ, R.Biotechnology information. Workshop. 1996, pp 9-11Conference Paper

CYBERSQUATTING : Gives the Web a Bad Name AgainKOEHLER, Wallace.Searcher (Medford, N.J). 2008, Vol 16, Num 8, issn 1070-4795, 12-15, 61 [5 p.]Article

Exploring influential factors on music piracy across countriesKI, Eyun-Jung; CHANG, Byeng-Hee; KHANG, Hyoungkoo et al.Journal of communication. 2006, Vol 56, Num 2, pp 406-426, issn 0021-9916, 21 p.Article

Practical scenarios for the van trung-martirosyan codesFERNANDEZ, Marcel; SORIANO, Miguel; COTRINA, Josep et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part II, 624-633Conference Paper

The Law of General Average: Possible Consequences of a Resurgence of Acts of PiracyKENDALL, Walter R; BOYKIN, Nancy; HELLER, Nathan A et al.Transportation journal. 2011, Vol 50, Num 2, pp 218-225, issn 0041-1612, 8 p.Article

Where There is a Sea There are Pirates: Response to Jungherr, Jürgens, and SchoenTUMASJAN, Andranik; SPRENGER, Timm O; SANDNER, Philipp G et al.Social science computer review. 2012, Vol 30, Num 2, pp 235-239, issn 0894-4393, 5 p.Article

ENDING PIRACY OF INTEGRIITED CIRCUITSROY, Jarrod A; KOUSHANFAR, Farinaz; MARKOV, Igor L et al.Computer (Long Beach, CA). 2010, Vol 43, Num 10, pp 30-38, issn 0018-9162, 9 p.Article

What do computer science students think about software piracy?KONSTANTAKIS, Nikos I; PALAIGEORGIOU, George E; SIOZOS, Panos D et al.Behaviour & information technology (Print). 2010, Vol 29, Num 3, pp 277-285, issn 0144-929X, 9 p.Article

Lutter contre le piratage de son site = Fight against the piracy of siteVLAEMYNCK, Francoise.Internet professionnel (Mensuel). 2002, Num 62, pp 8-11, issn 1278-5113Article

l'e-administration séduit mais inquiète les FrançaisTEXIER, Bruno.Archimag (Vincennes). 2012, Num 252, issn 0769-0975, p. 4Article

Design and Implementation of Portable, Multi Mode of Operation Embedded FirewallALKHISHALI, Hassan H; EL FARAG, Ahmed Abou; EL BAITH MOHAMED, Abd et al.International Conference on Information Technology Interfaces. 2010, pp 129-134, isbn 978-953-7138-18-9, 1Vol, 6 p.Conference Paper

Jugement du tribunal de grande instance de Paris du 26 septembre 1991: affaire Micro Application1992, pp 155-158Book

Dynamic path-based software watermarkingCOLLBERG, C; CARTER, E; DEBRAY, S et al.ACM SIGPLAN notices. 2004, Vol 39, Num 6, pp 107-118, issn 1523-2867, 12 p.Conference Paper

Counterfeiting as corporate externality: intellectual property crime and global insecurityMACKENZIE, Simon.Crime, law and social change. 2010, Vol 54, Num 1, pp 21-38, issn 0925-4994, 18 p.Article

La loi relative au Droit d'auteur et aux droits voisins dans la société de l'information (Dadvsi) : conséquences prévisibles sur le fonctionnement des établissements scolairesRENAUD, Patrice.La Nouvelle revue de l'adaptation et de la scolarisation. 2006, Num 35, pp 165-176, issn 1957-0341, 12 p.Article

Internet : les pirates mènent la partie = Internet: Hackers lead the gameLABOURDETTE, Christophe.Recherche (Paris, 1970). 2003, Num 362, pp 54-57, issn 0029-5671, 4 p.Article

Collaring the cybercrook : an investiqator's viewICOVE, D. J.IEEE spectrum. 1997, Vol 34, Num 6, pp 31-36, issn 0018-9235Article

COPYRIGHT PROSECUTION—THE FIJI EXPERIENCEDAUREWA, Joseph.Pacific studies. 2013, Vol 36, Num 1-2, pp 105-112, issn 0275-3596, 8 p.Conference Paper

Indépendance éditoriale et défense de la bibliodiversité en Amérique latine : L'INDEPENDANCE EDITORIALE: APPROCHES INTERNATIONALES = Editorial independence and the struggle for bibliodiversity in Latin America : EDITORIAL INDEPENDENCE: INTERNATIONAL APPROACHESPINHAS, Luc.Communication et langages. 2011, Num 170, issn 0336-1500, 47-62, 127-129, 131-132 [21 p.]Article

  • Page / 8