Skip to Content
Hackers
book

Hackers

by Steven Levy
May 2010
Beginner
520 pages
15h 13m
English
O'Reilly Media, Inc.
Content preview from Hackers

Part Two

Chapter 8 Benway’s message and other electronic missives on the system were found in Community Memory’s extensive scrap-books kept on the project.

Chapter 8 Felsenstein’s quote from his four-page “Biographical Background Information,” dated Jan. 29, 1983.

Chapter 8 Robert A. Heinlein, Revolt in 2100 (New York: Signet, 1954).

Chapter 8 A first-person account of Albrecht’s activities in the early 1960s is found in "A Modern-Day Medicine Show,” Datamation, July 1963.

Chapter 8 “. . . the possibility of millions . . .” See John Kemeny, Man and the Computer (New York: Scribners, 1972), quoted in Robert A. Kahn, “Creative Play with the Computer: A Course for Children,” unpublished paper written for the Lawrence Hall of Science. Berkeley, California.

Chapter 8 “. . . dymaxion . . .” See Hugh Kenner, Bucky: A Guided Tour of Buckminster Fuller (New York: Morrow, 1973).

Chapter 8 Back issues of PCC, generously provided by Bob Albrecht, were particularly helpful for information about early seventies Bay Area hacking.

Chapter 8 Ted Nelson, Computer Lib/Dream Machines (self-published, distributed by The Distributors, South Bend, Ind., 1974).

Chapter 8 Brautigan’s poem is in The Pill Versus the Springhill Mine Disaster (New York: Dell, Laurel, 1973). Reprinted with permission.

Chapter 8 “. . . a manipulator . . .” William Burroughs in Naked Lunch (New York: Grove Press. 1959).

Chapter 9 Ivan Illich, Tools for Conviviality (New York: Harper Colophon Books, 1973).

Chapter 9 “. . .in honor of the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hacking the Hacker

Hacking the Hacker

Roger A. Grimes
Tribe of Hackers

Tribe of Hackers

Marcus J. Carey, Jennifer Jin
Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781449390259Errata Page