Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Piratage")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 278

  • Page / 12
Export

Selection :

  • and

Piracy doesn't payMEALEY, M.Civil engineering (New York, NY. 1983). 1999, Vol 69, Num 5, pp 42-43, issn 0885-7024Article

Arrgh!! Piracy!!BUNTROCK, Robert E.Searcher (Medford, N.J). 2011, Vol 19, Num 10, pp 50-52, issn 1070-4795, 3 p.Article

Hackers' accounts: Hacking as a social entertainment : Deviance and the Internet: New Challenges for Social Science = Le hacking comme divertissement social : Déviance et internet: nouveaux défis pour la science socialeTURGEMAN-GOLDSCHMIDT, Orly.Social science computer review. 2005, Vol 23, Num 1, pp 8-23, issn 0894-4393, 16 p.Article

Long John Software and the Digital Jolly RogerGRIER, David Alan.Computer (Long Beach, CA). 2008, Vol 41, Num 3, pp 7-9, issn 0018-9162, 3 p.Article

L'AVENIR DE LA MUSIQUE APRÈS LA RÉVOLUTION NUMÉRIQUE: OPPORTUNITÉS ET CONTRAINTES POUR L'INDUSTRIE DU DISQUEJANOWSKA, Anna Anetta.Sociétés (Paris). 2011, Num 112, pp 87-94, issn 0765-3697, 8 p.Conference Paper

The challenges of regulating Warez trading : Deviance and the Internet: New Challenges for Social Science = Les défis de la régulations du commerce de droit de reproduction : Déviance et internet: nouveaux défis pour la science socialeGOLDMAN, Eric.Social science computer review. 2005, Vol 23, Num 1, pp 24-28, issn 0894-4393, 5 p.Article

Software piracy among academics : an empirical study in Brunei DarussalamMAHBUBUR RAHIM, M; RAHMAN, M. N. A; SEYAL, A. H et al.Information management & computer security. 2000, Vol 8, Num 1, pp 14-26, issn 0968-5227Article

Échec au piratage = Anticopy systemsMARTIN, Gabriel.Recherche (Paris, 1970). 2006, Num 401, pp 80-81, issn 0029-5671, 2 p.Article

Digitale wasserzeichen = Digital watermarkingSTEINEBACH, Martin; DITTMANN, Jana.Information Wissenschaft und Praxis. 2002, Vol 53, Num 5, pp 261-268, issn 1434-4653Article

From Friday to Sunday : the hacker ethic and shifting notions of labour, leisure and intellectual propertyBROWN, James J.Leisure studies. 2008, Vol 27, Num 4, pp 395-409, issn 0261-4367, 15 p.Article

Network security todayLOPEZ, R.Biotechnology information. Workshop. 1996, pp 9-11Conference Paper

CYBERSQUATTING : Gives the Web a Bad Name AgainKOEHLER, Wallace.Searcher (Medford, N.J). 2008, Vol 16, Num 8, issn 1070-4795, 12-15, 61 [5 p.]Article

Exploring influential factors on music piracy across countriesKI, Eyun-Jung; CHANG, Byeng-Hee; KHANG, Hyoungkoo et al.Journal of communication. 2006, Vol 56, Num 2, pp 406-426, issn 0021-9916, 21 p.Article

Practical scenarios for the van trung-martirosyan codesFERNANDEZ, Marcel; SORIANO, Miguel; COTRINA, Josep et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part II, 624-633Conference Paper

Exploring software piracy as a factor of video game console adoptionGOODE, Sigi; KARTAS, Anasthasiou.Behaviour & information technology (Print). 2012, Vol 31, Num 4-6, pp 547-563, issn 0144-929X, 17 p.Article

Ethical hacking: The security justification reduxSMITH, Bryan; YURCIK, William; DOSS, David et al.ISTAS'02 : international symposium on technology and society. 2002, pp 374-379, isbn 0-7803-7284-0, 6 p.Conference Paper

Un «soft» qui peut s'avérer lourd de conséquences = A soft which can have grave consequencesDUPONT-CHAMPION, A. P.La Gazette du Palais. 1993, Num 295-96, pp 9-10, issn 0242-6331Article

Software Pirates PlunderedONWUSAH, B.Computers and Law. 1992, Vol 3, Num 5, pp 7-8Article

The Law of General Average: Possible Consequences of a Resurgence of Acts of PiracyKENDALL, Walter R; BOYKIN, Nancy; HELLER, Nathan A et al.Transportation journal. 2011, Vol 50, Num 2, pp 218-225, issn 0041-1612, 8 p.Article

Where There is a Sea There are Pirates: Response to Jungherr, Jürgens, and SchoenTUMASJAN, Andranik; SPRENGER, Timm O; SANDNER, Philipp G et al.Social science computer review. 2012, Vol 30, Num 2, pp 235-239, issn 0894-4393, 5 p.Article

ENDING PIRACY OF INTEGRIITED CIRCUITSROY, Jarrod A; KOUSHANFAR, Farinaz; MARKOV, Igor L et al.Computer (Long Beach, CA). 2010, Vol 43, Num 10, pp 30-38, issn 0018-9162, 9 p.Article

What do computer science students think about software piracy?KONSTANTAKIS, Nikos I; PALAIGEORGIOU, George E; SIOZOS, Panos D et al.Behaviour & information technology (Print). 2010, Vol 29, Num 3, pp 277-285, issn 0144-929X, 9 p.Article

Lutter contre le piratage de son site = Fight against the piracy of siteVLAEMYNCK, Francoise.Internet professionnel (Mensuel). 2002, Num 62, pp 8-11, issn 1278-5113Article

l'e-administration séduit mais inquiète les FrançaisTEXIER, Bruno.Archimag (Vincennes). 2012, Num 252, issn 0769-0975, p. 4Article

Design and Implementation of Portable, Multi Mode of Operation Embedded FirewallALKHISHALI, Hassan H; EL FARAG, Ahmed Abou; EL BAITH MOHAMED, Abd et al.International Conference on Information Technology Interfaces. 2010, pp 129-134, isbn 978-953-7138-18-9, 1Vol, 6 p.Conference Paper

  • Page / 12