Книга: Code 2.0
Оглавление книги
- Preface To The Second Edition
- Preface To The First Edition
- Chapter 1. Code Is Law
- Chapter 2. Four Puzzles From Cyberspace
- Part One. “Regulability”
- Chapter 3. Is-ism
- Chapter 4. Architectures Of Control
- Who did What, Where?
- Identity and Authentication: Real Space
- Identity and Authentication: Cyberspace
- Identity and Authentication: Regulability
- Architectures of Identification
- Who Did What, Where?
- Who Did What, Where?
- Results
- Chapter 5. Regulating Code
- Part Two - Regulation By Code
- Chapter 6. Cyberspaces
- The Values of a Space
- Cyber-places
- How Architectures Matter and Spaces Differ
- Regulating Code to Regulate Better
- Chapter 7. What Things Regulate
- Chapter8. The Limits In Open Code
- Part Three - Latent Ambiguities
- Chapter 9. Translation
- Chapter 10. Intellectual Property
- On the Reports of Copyright’s Demise
- Law to the Rescue
- The Promise for Intellectual Property in Cyberspace
- The Limits on the Protection of Property
- Private Substitutes for Public Law
- The Anonymity That Imperfection Allows
- Permission Culture vs. Free
- The Problems That Perfection Makes
- Choices
- Chapter 11. Privacy
- Privacy in Private
- Privacy in Public: Surveillance
- Privacy in Public: Data
- Solutions
- Surveillance
- Control of Data
- (1) Limits on Choice
- (2) The Process to Protect Privacy
- (3) Rules to Enable Choice About Privacy
- Privacy Compared
- Chapter 12. Free Speech
- The Regulators of Speech: Publication
- Regulations of Speech: Spam and Porn
- Real-Space Regulations: Spam and Porn
- Cyberspace Regulations: Spam and Porn
- Regulating Net-Porn
- Regulating Spam
- The Regulations of Speech: Free Culture
- The Regulators of Speech: Distribution
- Speech Lessons
- Chapter 13. Interlude
- Part Four - Competing Sovereigns
- Part Five - Responses
- Appendix
- Сноски из книги
- Содержание книги
- Популярные страницы
Оглавление статьи/книги
- Preface To The Second Edition
- Preface To The First Edition
- Chapter 1. Code Is Law
- Chapter 2. Four Puzzles From Cyberspace
- Part One. “Regulability”
- Part Two - Regulation By Code
- Part Three - Latent Ambiguities
- Part Four - Competing Sovereigns
- Part Five - Responses
- Appendix
- Сноски из книги
- Содержание книги
- Популярные страницы
Похожие страницы
- Системные переменные ROWS_AFFECTED, GDSCODE, SQLCODE, TRANSACTIONJD, CONNECTIONJD
- Appendix J. Example scripts code-base
- Test Driver Code
- Regulating Code to Regulate Better
- Part Two - Regulation By Code
- 6. Лекция: Обработка текстов. Регулярные выражения. Unicode.
- Переопределение System.Object.GetHashCode()
- Using the autoconf Utility to Configure Code
- 14.3.2. Debugging Optimized Kernel Code
- Where to Get the Code
- Code and Text Editor
- Code Snippets