Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Piratería")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 109

  • Page / 5
Export

Selection :

  • and

Long John Software and the Digital Jolly RogerGRIER, David Alan.Computer (Long Beach, CA). 2008, Vol 41, Num 3, pp 7-9, issn 0018-9162, 3 p.Article

Échec au piratage = Anticopy systemsMARTIN, Gabriel.Recherche (Paris, 1970). 2006, Num 401, pp 80-81, issn 0029-5671, 2 p.Article

CYBERSQUATTING : Gives the Web a Bad Name AgainKOEHLER, Wallace.Searcher (Medford, N.J). 2008, Vol 16, Num 8, issn 1070-4795, 12-15, 61 [5 p.]Article

Practical scenarios for the van trung-martirosyan codesFERNANDEZ, Marcel; SORIANO, Miguel; COTRINA, Josep et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part II, 624-633Conference Paper

The Law of General Average: Possible Consequences of a Resurgence of Acts of PiracyKENDALL, Walter R; BOYKIN, Nancy; HELLER, Nathan A et al.Transportation journal. 2011, Vol 50, Num 2, pp 218-225, issn 0041-1612, 8 p.Article

Controversial legislation at Guadeloupe regarding trade and piracy, 1797JENKINS, H. J. K.Revue française d'histoire d'outre-mer. 1989, Vol 76, Num 282-283, pp 97-106, issn 0300-9513Article

ENDING PIRACY OF INTEGRIITED CIRCUITSROY, Jarrod A; KOUSHANFAR, Farinaz; MARKOV, Igor L et al.Computer (Long Beach, CA). 2010, Vol 43, Num 10, pp 30-38, issn 0018-9162, 9 p.Article

What do computer science students think about software piracy?KONSTANTAKIS, Nikos I; PALAIGEORGIOU, George E; SIOZOS, Panos D et al.Behaviour & information technology (Print). 2010, Vol 29, Num 3, pp 277-285, issn 0144-929X, 9 p.Article

Un nouveau témoignage sur la « rencontre des Deux Mondes » dans les Petites AntillesMOREAU, J.-P.Revue française d'histoire d'outre-mer. 1991, Vol 78, Num 293, pp 541-545, issn 0300-9513Article

l'e-administration séduit mais inquiète les FrançaisTEXIER, Bruno.Archimag (Vincennes). 2012, Num 252, issn 0769-0975, p. 4Article

Design and Implementation of Portable, Multi Mode of Operation Embedded FirewallALKHISHALI, Hassan H; EL FARAG, Ahmed Abou; EL BAITH MOHAMED, Abd et al.International Conference on Information Technology Interfaces. 2010, pp 129-134, isbn 978-953-7138-18-9, 1Vol, 6 p.Conference Paper

COPYRIGHT PROSECUTION—THE FIJI EXPERIENCEDAUREWA, Joseph.Pacific studies. 2013, Vol 36, Num 1-2, pp 105-112, issn 0275-3596, 8 p.Conference Paper

A nexus of Cyber-Geography and Cyber-Psychology: Topos/Notopia and identity in hackingPAPADIMITRIOU, Fivos.Computers in human behavior. 2009, Vol 25, Num 6, pp 1331-1334, issn 0747-5632, 4 p.Article

A theoretical analysis of spatial/temporal modulation-based systems for prevention of illegal recordings in movie theatersBOURDON, Pascal; THIEBAUD, Sylvain; DOYEN, Didier et al.Proceedings of SPIE, the International Society for Optical Engineering. 2008, pp 68190U.1-68190U.9, issn 0277-786X, isbn 978-0-8194-6991-5Conference Paper

Plagiarism and piracy: a publisher's perspectiveTAYLOR, Kevin.Learned publishing. 2006, Vol 19, Num 4, issn 0953-1513, 259-266 [6 p.]Article

La fabuleuse aventure des corsaires anglaisDUCHEIN, M.L'Histoire. 1990, Num 137, pp 26-33, issn 0182-2411Article

Notes Towards a Complete Taxonomy of Murkiness: Publishing in RussiaKALDER, Daniel.Publishing research quarterly. 2013, Vol 29, Num 2, pp 151-163, issn 1053-8801, 13 p.Article

Digital piracy intention: a comparison of theoretical modelsYOON, Cheolho.Behaviour & information technology (Print). 2012, Vol 31, Num 4-6, pp 565-576, issn 0144-929X, 12 p.Article

Organizational software piracy : an empirical assessmentMISHRA, Alok; AKMAN, Ibrahim; YAZICI, Ali et al.Behaviour & information technology (Print). 2007, Vol 26, Num 5, pp 437-444, issn 0144-929X, 8 p.Article

Tracing traitors by guessing secrets. The q-ary caseFERNANDEZ, Marcel; SORIANO, Miguel; COTRINA, Josep et al.Lecture notes in computer science. 2005, pp 61-73, issn 0302-9743, isbn 3-540-25584-2, 13 p.Conference Paper

Enhanced key management for cable TV serviceLEUNG, Yiu-Wing.IEEE International Conference on multimedia. 2004, isbn 0-7803-8603-5, 3Vol, vol3, 2115-2118Conference Paper

Contrer le piratage d'images: un logiciel précis et rapide = Blocking piracy of images : a fine and rapid softwareAMSALEG, Laurent.Techniques de l'ingénieur. Télécoms. 2007, Vol TEB1, Num RE81, issn 1632-3823, RE81.1-RE81.8Article

It won't happen to me: Promoting secure behaviour among internet usersDAVINSON, Nicola; SILLENCE, Elizabeth.Computers in human behavior. 2010, Vol 26, Num 6, pp 1739-1747, issn 0747-5632, 9 p.Article

Flexible traitor tracing for anonymous attacksHONGXIA JIN; LOTSPIECH, Jeffery.Lecture notes in computer science. 2005, pp 269-270, issn 0302-9743, isbn 3-540-28791-4, 2 p.Conference Paper

The study of perceived adverse effects of digital piracy and involvement: insights from adult computer usersKOKLIC, Mateja Kos; VIDA, Irena; BAJDE, Domen et al.Behaviour & information technology (Print). 2014, Vol 33, Num 1-3, pp 225-236, issn 0144-929X, 12 p.Article

  • Page / 5