PREVIOUS   CONTENTS   SUMMARY   ISSUE   HOME 

Bibliography

4am 2016 Apple II Library: The 4am Collection https://archive.org/details/apple_ii_library_4am [Last accessed: 3 September 2016].

Aho, A.V., Lam, M.S., Sethi, R. and Ullman, J.D. 2007 Compilers: Principles, Techniques & Tools 2nd edition, Boston: Pearson.

Altice, N. 2015 I am Error: The Nintendo Family Computer/Entertainment System Platform, Cambridge: MIT Press.

Apple II Crack Screens n.d. Apple II Crack Screens http://artscene.textfiles.com/intros/APPLEII/ [Last accessed: 3 September 2016].

Aycock, J. 2015 'Stringlish: improved English string searching in binary files', Software: Practice & Experience 45(11), 1591-1595. https://doi.org/10.1002/spe.2327

Aycock, J. 2016 Retrogame Archeology: Exploring Old Computer Games, New York: Springer. https://doi.org/10.1007/978-3-319-30004-7

BBC 2007 'How the Spectrum began a revolution', BBC News, 23 April 2007 http://news.bbc.co.uk/2/hi/technology/6572711.stm [Last accessed: 3 September 2016].

Burton, R. 1984 'Great game, but...', Big K 4, 26.

Carroll, M. 2014 'Retroinspection: Sinclair ZX Spectrum' in ZX Spectrum: The Complete Manual, Bournemouth, UK: Imagine Publishing. 4-7.

Digital Media Law Project n.d. 'Linking to copyrighted materials' http://www.dmlp.org/legal-guide/linking-copyrighted-materials [Last accessed: 4 September 2016].

Donovan, T. 2010 Replay: The History of Video Games, Lewes, UK: Yellow Ant.

Electronic Frontier Foundation n.d. 'Copyright: infringement issues', wiki. https://ilt.eff.org/index.php?title=Copyright:_Infringement_Issues&oldid=3858 [Last accessed: 4 September 2016].

Ernst, W. 2011 'Media archaeogeography: method and machine versus history of narrative media' in E. Huhtamo and J. Parikka (eds) Media Archaeology: Approaches, Applications, and Implications, Los Angeles: University of California Press. 239–55.

Ferrie, P. 2016 'A brief description of some popular copy-protection techniques on the Apple ][ Platform', PoC||GTFO, no. 0x10.

Genette, G. 1997 Paratexts: Thresholds of Interpretation [trans. J.E. Lewin. Original work published 1987] Cambridge: Cambridge University Press.

Goldberg, D. and Larrson, L. 2015 'Introduction: post-escapism: a new discourse on video game culture' in D. Goldberg and L. Larsson (eds) The State of Play: Creators and Critics on Video Game Culture, New York: Seven Stories Press. 7–14.

Hadnagy C. 2011 Social Engineering: The Art of Human Hacking, Indianapolis: Wiley.

Harston, J.G. 2004 Jet Set Willy JSW48 Game Engine Source http://mdfs.net/Software/JSW/JGH/Docs/jsw48.asm [Last accessed: 3 September 2016].

Hodder, I. 2012 Entangled: The Archaeology of the Relationships between Humans and Things, London: Wiley-Blackwell. https://doi.org/10.1002/9781118241912

Juul, J. 2010 A Casual Revolution: Reinventing Video Games and Their Players, Cambridge: MIT Press.

Kendle, T. 1984 'Hacker's dream', Popular Computing Weekly 3(33), 36.

Knoblauch, W. 2015 'Game over? A Cold War kid reflects on apocalyptic video games', in D. Goldberg and L. Larsson (eds) The State of Play: Creators and Critics on Video Game Culture, New York: Seven Stories Press. 183–210.

Maton, A. 1987 Security against copying recorded media, UK Patent GB2144247B (filed 30 July 1984).

Newzoo 2016 '2016 Global Games Market Report, June 2016'. https://newzoo.com/insights/articles/global-games-market-reaches-99-6-billion-2016-mobile-generating-37/ [Last accessed: 4 September 2016].

Parkin, S, Stanton, R. and Stuart, K. 2014 'The 30 greatest British video games', The Guardian, 3 June. https://www.theguardian.com/technology/2014/jun/03/30-greatest-british-video-games [Last accessed: 3 September 2016].

Pennell, A. 1984 'JSW - A hacker's guide', Your Spectrum 4, 62-65.

Pias, C. 2011 'The game player's duty: the user as the Gestalt of the parts' in E. Huhtamo and J. Parikka (eds) Media Archaeology: Approaches, Applications, and Implications. Los Angeles: University of California Press. 164–83.

Reinhard, A. forthcoming Archaeogaming: The Archaeology in and of Video Games, New York: Berghahn.

Sanderson, M. 1984a 'Getting in', Your Computer 4(6), 42-43.

Sanderson, M. 1984b 'Jet set error', Your Computer 4(9), 33.

Schneier, B. 1996 Applied Cryptography, 2nd edition. New York: Wiley.

Software Projects 1983 Jet Set Willy, Documentation, ZX Spectrum version.

Sotamaa, O. 2014 'Artifact' in M.J.P. Wolf and B. Perron (eds) The Routledge Companion to Video Game Studies, New York: Routledge. 3–9.

Stachniak, Z. 2015 'Red clones: the Soviet computer hobby movement of the 1980s', IEEE Annals of the History of Computing 37(1), 12-23. https://doi.org/10.1109/MAHC.2015.11

Wingfield, N. and Isaac M. 2016 'Pokémon Go brings augmented reality to a mass audience', The New York Times, 11 July 2016. http://www.nytimes.com/2016/07/12/technology/pokemon-go-brings-augmented-reality-to-a-mass-audience.html?_r=0 [Last accessed: 4 September 2016].


 PREVIOUS   CONTENTS   SUMMARY   ISSUE   HOME 

Internet Archaeology is an open access journal. Except where otherwise noted, content from this work may be used under the terms of the Creative Commons Attribution 3.0 (CC BY) Unported licence, which permits unrestricted use, distribution, and reproduction in any medium, provided that attribution to the author(s), the title of the work, the Internet Archaeology journal and the relevant URL/DOI are given.

University of York legal statements