{"id":22172,"date":"2015-12-08T11:50:25","date_gmt":"2015-12-08T10:50:25","guid":{"rendered":"http:\/\/kmim.wm.pwr.edu.pl\/myszka\/?page_id=22172"},"modified":"2021-06-07T12:56:29","modified_gmt":"2021-06-07T10:56:29","slug":"literatura","status":"publish","type":"page","link":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/dydaktyka\/technologie-informacyjne\/slajdy-do-wykladu-wersja-podstawowa\/literatura\/","title":{"rendered":"Literatura"},"content":{"rendered":"<h3 class=\"likesectionHead\"><a id=\"x1-1000\"><\/a>Co czyta\u0107?<\/h3>\n<p><!-- l. 3 --><\/p>\n<p class=\"noindent\">Nie ma jednego, dobrego podr\u0119cznika do tych zaj\u0119\u0107. Poni\u017csza lista zawiera spis wszystkich chyba odsy\u0142aczy, kt\u00f3re pojawiaj\u0105 si\u0119 na slajdach i podczas wyk\u0142adu.<\/p>\n<p><!-- l. 5 --><\/p>\n<p class=\"indent\">Podstawow\u0105 pozycj\u0105 literatury s\u0105 podr\u0119czniki Harella <span class=\"cite\">&nbsp;[<a href=\"#Xharel_computers_2003\">1<\/a>,&nbsp;<a href=\"#XHarel_spolka\">2<\/a>,&nbsp;<a href=\"#XHarel2004\">3<\/a>,&nbsp;<a href=\"#Xharel_rzecz_2008\">4<\/a>]<\/span>. Z&nbsp;punktu widzenia \u201erozwoju osobistego\u201d warto zapozna\u0107 si\u0119 z&nbsp;gruba\u015bn\u0105 ksi\u0105\u017ck\u0105 Gleicka (<span class=\"cite\">&nbsp;[<a href=\"#Xjames_gleick_informacja._2012\">5<\/a>]<\/span>) czy (wszystkimi praktycznie) ksi\u0105\u017ckami wydanymi przez Lawrence Lessiga <span class=\"cite\">&nbsp;[<a href=\"#Xlessig_remiks:_2009\">6<\/a>,&nbsp;<a href=\"#X_lawrence_????\">7<\/a>,&nbsp;<a href=\"#X_remix:_????\">8<\/a>,&nbsp;<a href=\"#Xlessig_wolna_2005\">9<\/a>,&nbsp;<a href=\"#XLessig2004\">10<\/a>]<\/span>.<\/p>\n<p><!-- l. 7 --><\/p>\n<p class=\"indent\">Ta pierwsza, na wiele sposob\u00f3w, przybli\u017ca czym jest informacja (i&nbsp;m\u00f3wi troch\u0119 o jej przetwarzaniu). L.&nbsp;Lessig, wybitny prawnik konstytucjonalista, wsp\u00f3\u0142tw\u00f3rca ameryka\u0144skiej organizacji Creative Commons, opowiada o&nbsp;kulturze (i&nbsp;zmianach jakie generuje Internet) o&nbsp;prawie (i&nbsp;konsekwencjach dla funkcjonowania praw autorskich w Internecie). Lessig kandydowa\u0142 do nominacji Partii Demokratycznej w&nbsp;wyborach prezydenckich 2016.<\/p>\n<p><!-- l. 1 --><\/p>\n<h3 class=\"likesectionHead\"><a id=\"x1-2000\"><\/a>Literatura<\/h3>\n<p><!-- l. 1 --><\/p>\n<div class=\"thebibliography\">\n<p class=\"bibitem\"><span class=\"biblabel\">[1]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xharel_computers_2003\"><\/a>Harel&nbsp;D., Computers Ltd.: What They Really Can\u2019t Do, Oxford University Press, USA 2003.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[2]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XHarel_spolka\"><\/a>Harel&nbsp;D., Komputery-sp\u00f3\u0142ka z&nbsp;o.o.: czego komputery naprawd\u0119 nie umiej\u0105 robi\u0107, Ludzie, Komputery, Informacja, Wydawnictwa Naukowo-Techniczne, Warszawa 2002.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[3]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XHarel2004\"><\/a>Harel&nbsp;D., Feldman&nbsp;Y., Algorithmics: The Spirit of Computing, 3 wyd., Addison-Wesley 2004.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[4]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xharel_rzecz_2008\"><\/a>Harel&nbsp;D., Feldman&nbsp;Y.A., P\u0142oski&nbsp;Z., Rzecz O Istocie Informatyki: Algorytmika, wyd. 4 zm., rozsz wyd., Klasyka Informatyki, Wydawnictwa Naukowo-Techniczne, Warszawa 2008.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[5]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xjames_gleick_informacja._2012\"><\/a>Gleick&nbsp;J., Informacja. Bit, wszech\u015bwiat, rewolucja, Znak 2012, URL <a class=\"url\" href=\"http:\/\/www.znak.com.pl\/kartoteka,ksiazka,3364,Informacja?gclid=COzYjtrqy78CFW3MtAodpksA8Q\"><span class=\"pltt-10\">http:\/\/www.znak.com.pl\/kartoteka,ksiazka,3364,Informacja?gclid=COzYjtrqy78CFW3MtAodpksA8Q<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[6]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xlessig_remiks:_2009\"><\/a>Lessig&nbsp;L., Pr\u00f3chniak&nbsp;R., Remiks: Aby Sztuka I Biznes Rozkwita\u0142y W Hybrydowej Gospodarce, Cyberkultura, Internet, Spo\u0142ecze\u0144stwo, Wydawnictwa Akademickie i Profesjonalne, Warszawa 2009.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[7]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_lawrence_????\"><\/a>Lessig&nbsp;L., Remix, <a class=\"url\" href=\"https:\/\/www.youtube.com\/watch?v=_yC81QhR_xk\"><span class=\"pltt-10\">https:\/\/www.youtube.com\/watch?v=_yC81QhR_xk<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/www.youtube.com\/watch?v=_yC81QhR_xk\"><span class=\"pltt-10\">http:\/\/www.youtube.com\/watch?v=_yC81QhR_xk<\/span><\/a> 2008.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[8]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_remix:_????\"><\/a>Lessig&nbsp;L., Remix: Making art and commerce thrive in the hybrid economy, <a class=\"url\" href=\"http:\/\/archive.org\/details\/LawrenceLessigRemix\"><span class=\"pltt-10\">http:\/\/archive.org\/details\/LawrenceLessigRemix<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/archive.org\/details\/LawrenceLessigRemix\"><span class=\"pltt-10\">http:\/\/archive.org\/details\/LawrenceLessigRemix<\/span><\/a> 2008.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[9]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xlessig_wolna_2005\"><\/a>Lessig&nbsp;L., Wolna kultura, Wdawnictwa Szkolne i Pedagogiczne, Warszawa 2005, URL <a class=\"url\" href=\"http:\/\/otworzksiazke.pl\/ksiazka\/wolna_kultura\/\"><span class=\"pltt-10\">http:\/\/otworzksiazke.pl\/ksiazka\/wolna_kultura\/<\/span><\/a>, <a class=\"url\" href=\"http:\/\/otworzksiazke.pl\/ksiazka\/wolna_kultura\/\"><span class=\"pltt-10\">http:\/\/otworzksiazke.pl\/ksiazka\/wolna_kultura\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[10]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XLessig2004\"><\/a>Lessig&nbsp;L., Free culture: how big media uses technology and the law to lock down culture and control creativity, Penguin Press, New York 2004, URL <a class=\"url\" href=\"http:\/\/www.free-culture.cc\/freecontent\/\"><span class=\"pltt-10\">http:\/\/www.free-culture.cc\/freecontent\/<\/span><\/a>, <a class=\"url\" href=\"http:\/\/www.free-culture.cc\/freecontent\/\"><span class=\"pltt-10\">http:\/\/www.free-culture.cc\/freecontent\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[11]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xphilippe_aigrain_dzielenie_2012\"><\/a>Aigrain&nbsp;P., Aigrain&nbsp;S., Dzielenie si\u0119. Kultura i gospodarka epoki internetu, Fundacja Nowoczesna Polska 2012, URL <a class=\"url\" href=\"http:\/\/prawokultury.pl\/publikacje\/Dzielenie-sie\/\"><span class=\"pltt-10\">http:\/\/prawokultury.pl\/publikacje\/Dzielenie-sie\/<\/span><\/a>, <a class=\"url\" href=\"http:\/\/prawokultury.pl\/publikacje\/Dzielenie-sie\/\"><span class=\"pltt-10\">http:\/\/prawokultury.pl\/publikacje\/Dzielenie-sie\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[12]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xjohn_bayko_great_2005\"><\/a>Bayko&nbsp;J., Great microprocessors of the past and present (V 13.4.0), <a class=\"url\" href=\"http:\/\/www.cpushack.com\/CPU\/cpu.html\"><span class=\"pltt-10\">http:\/\/www.cpushack.com\/CPU\/cpu.html<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/www.cpushack.com\/CPU\/cpu.html\"><span class=\"pltt-10\">http:\/\/www.cpushack.com\/CPU\/cpu.html<\/span><\/a> 2005.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[13]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XBendyk\"><\/a>Bendyk&nbsp;E., Zlikwidowa\u0107 patenty? 2007, dost\u0119pny w wersji elektronicznej: <a class=\"url\" href=\"http:\/\/bendyk.blog.polityka.pl\/?p=338\"><span class=\"pltt-10\">http:\/\/bendyk.blog.polityka.pl\/?p=338<\/span><\/a>; ostatnio odwiedzane: 4 listopada 2007.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[14]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xbessen_direct_2012\"><\/a>Bessen&nbsp;J.E., Meurer&nbsp;M.J., The direct costs from NPE disputes, SSRN eLibrary, 2012, URL <a class=\"url\" href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2091210\"><span class=\"pltt-10\">http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2091210<\/span><\/a>, <a class=\"url\" href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2091210\"><span class=\"pltt-10\">http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2091210<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[15]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XBiernat\"><\/a>Biernat&nbsp;J., Architektura komputer\u00f3w, Oficyna Wydawnicza Politechniki Wroc\u0142awskiej, Wroc\u0142aw 2005.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[16]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xbutler_information_1998\"><\/a><del>Butler&nbsp;J.G., Information technology history &#8211; outline, <a class=\"url\" href=\"http:\/\/www.tcf.ua.edu\/AZ\/ITHistoryOutline.htm\"><span class=\"pltt-10\">http:\/\/www.tcf.ua.edu\/AZ\/ITHistoryOutline.htm<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/www.tcf.ua.edu\/AZ\/ITHistoryOutline.htm\"><span class=\"pltt-10\">http:\/\/www.tcf.ua.edu\/AZ\/ITHistoryOutline.htm<\/span><\/a> 1998.<\/del><\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[17]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XVetulani\"><\/a>Ciesielski&nbsp;P., Vetulani&nbsp;J., B\u0142ogos\u0142awiona mutacja genu FoxP2, wyborcza.pl, 2011, URL <a class=\"url\" href=\"http:\/\/wyborcza.pl\/1,76842,9801332,Blogoslawiona_mutacja_genu_FoxP2.html\"><span class=\"pltt-10\">http:\/\/wyborcza.pl\/1,76842,9801332,Blogoslawiona_mutacja_genu_FoxP2.html<\/span><\/a>, <a class=\"url\" href=\"http:\/\/wyborcza.pl\/1,76842,9801332,Blogoslawiona_mutacja_genu_FoxP2.html\"><span class=\"pltt-10\">http:\/\/wyborcza.pl\/1,76842,9801332,Blogoslawiona_mutacja_genu_FoxP2.html<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[18]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XCORDIS\"><\/a>Comission&nbsp;E., Innowacje w programach ramowych 2007, strona dost\u0119pna w wersji elektronicznej: <a class=\"url\" href=\"http:\/\/cordis.europa.eu\/innovation\/pl\/fp\/home.html\"><span class=\"pltt-10\">http:\/\/cordis.europa.eu\/innovation\/pl\/fp\/home.html<\/span><\/a>; ostatnio odwiedzane: 4 listopada 2007.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[19]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XCopeland2000\"><\/a>Copeland&nbsp;J., A brief history of computing 2000, URL <a class=\"url\" href=\"http:\/\/www.alanturing.net\/turing_archive\/pages\/Reference\/%20Articles\/BriefHistofComp.html\"><span class=\"pltt-10\">http:\/\/www.alanturing.net\/turing_archive\/pages\/Reference\\%20Articles\/BriefHistofComp.html<\/span><\/a>, <a class=\"url\" href=\"http:\/\/www.alanturing.net\/turing_archive\/pages\/Reference\/%20Articles\/BriefHistofComp.html\"><span class=\"pltt-10\">http:\/\/www.alanturing.net\/turing_archive\/pages\/Reference\\%20Articles\/BriefHistofComp.html<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[20]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XEckert\"><\/a>da&nbsp;Cruz&nbsp;F., Professor Wallace J. Eckert, URL <a class=\"url\" href=\"http:\/\/www.columbia.edu\/cu\/computinghistory\/eckert.html\"><span class=\"pltt-10\">http:\/\/www.columbia.edu\/cu\/computinghistory\/eckert.html<\/span><\/a>, <a class=\"url\" href=\"http:\/\/www.columbia.edu\/cu\/computinghistory\/eckert.html\"><span class=\"pltt-10\">http:\/\/www.columbia.edu\/cu\/computinghistory\/eckert.html<\/span><\/a> 2013.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[21]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XEckert1\"><\/a>da&nbsp;Cruz&nbsp;F., Interconnected punched card equipment, URL <a class=\"url\" href=\"http:\/\/www.columbia.edu\/cu\/computinghistory\/switch.html\"><span class=\"pltt-10\">http:\/\/www.columbia.edu\/cu\/computinghistory\/switch.html<\/span><\/a>, <a class=\"url\" href=\"http:\/\/www.columbia.edu\/cu\/computinghistory\/switch.html\"><span class=\"pltt-10\">http:\/\/www.columbia.edu\/cu\/computinghistory\/switch.html<\/span><\/a> 2004.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[22]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xpiotr_czerniawski_pierwsza_2012\"><\/a>Czerniawski&nbsp;P., Lipszyc&nbsp;J., Wilkowski&nbsp;M., Pierwsza pomoc w prawie autorskim, <a class=\"url\" href=\"http:\/\/prawokultury.pl\/publikacje\/pierwsza-pomoc\/\"><span class=\"pltt-10\">http:\/\/prawokultury.pl\/publikacje\/pierwsza-pomoc\/<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/prawokultury.pl\/publikacje\/pierwsza-pomoc\/\"><span class=\"pltt-10\">http:\/\/prawokultury.pl\/publikacje\/pierwsza-pomoc\/<\/span><\/a> 2012.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[23]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xkuba_danecki_przemysl_2012\"><\/a>Danecki&nbsp;K., Przemys\u0142 praw autorskich: stulecie k\u0142amstwa <span class=\"cmsy-10\">|<\/span> co nas uwiera, <a class=\"url\" href=\"http:\/\/conasuwiera.pl\/?p=1045\"><span class=\"pltt-10\">http:\/\/conasuwiera.pl\/?p=1045<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/conasuwiera.pl\/?p=1045\"><span class=\"pltt-10\">http:\/\/conasuwiera.pl\/?p=1045<\/span><\/a> 2012.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[24]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XDrucker\"><\/a>Drucker&nbsp;P.F., Innovative and Entrepreneurship, Practice and Principles, Harper &amp; Row, Publishers, Inc 1985, cytowane za <a class=\"url\" href=\"https:\/\/www.extension.iastate.edu\/agdm\/wholefarm\/html\/c5-10.html\"><span class=\"pltt-10\">https:\/\/www.extension.iastate.edu\/agdm\/wholefarm\/html\/c5-10.html<\/span><\/a> <span class=\"cite\">&nbsp;[<a href=\"#XHofstrand\">30<\/a>]<\/span>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[25]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xeckert_punched_1984\"><\/a>Eckert&nbsp;W.J., Punched card methods in scientific computation, MIT Pr. [u.a.], Cambridge, Mass. u.a. 1984.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[26]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xemil_gawin_sciaganie_2012\"><\/a>Gawin&nbsp;E., \u015aci\u0105ganie muzyki i film\u00f3w legalne od zawsze, http:\/\/motionfreaks.pl\/teksty\/artykuly\/item\/766-sciaganie-muzyki-i-filmow-legalne-od-zawsze, URL <a class=\"url\" href=\"http:\/\/motionfreaks.pl\/teksty\/artykuly\/item\/766-sciaganie-muzyki-i-filmow-legalne-od-zawsze\"><span class=\"pltt-10\">http:\/\/motionfreaks.pl\/teksty\/artykuly\/item\/766-sciaganie-muzyki-i-filmow-legalne-od-zawsze<\/span><\/a> 2012.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[27]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xgoldberg_what_2000\"><\/a>Goldberg&nbsp;D., What every computer scientist should know about Floating-Point arithmetic, [w:] Numerical Computation Guide, Sun Microsystems, Palo Alto 2000, URL <a class=\"url\" href=\"http:\/\/docs.sun.com\/source\/806-3568\/ncg_goldberg.html#674\"><span class=\"pltt-10\">http:\/\/docs.sun.com\/source\/806-3568\/ncg_goldberg.html#674<\/span><\/a>, dost\u0119pne jako: <a class=\"url\" href=\"http:\/\/docs.sun.com\/source\/806-3568\/ncg_goldberg.html\/#674\"><span class=\"pltt-10\">http:\/\/docs.sun.com\/source\/806-3568\/ncg_goldberg.html\\#674<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[28]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XIA64\"><\/a>Grzywacz&nbsp;A., Kami\u0144ski&nbsp;B., Architektura procesora itanium 2004, URL <a class=\"url\" href=\"http:\/\/binboy.sphere.pl\/index.php?hideshow=download&amp;p0;=1984\"><span class=\"pltt-10\">http:\/\/binboy.sphere.pl\/index.php?hideshow=download&amp;p0=1984<\/span><\/a>, dost\u0119pne jako: <a class=\"url\" href=\"http:\/\/binboy.sphere.pl\/index.php?hideshow=download&amp;p0;=1984\"><span class=\"pltt-10\">http:\/\/binboy.sphere.pl\/index.php?hideshow=download&amp;p0=1984<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[29]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XHarlow\"><\/a>Harlow&nbsp;F.H., Metropolis&nbsp;N., Computing and computers \u2013 weapons simulation leads to the computer era, Los Alamos Science, Winter\/Spring, 7, 1983, 132\u2014141, URL <a class=\"url\" href=\"http:\/\/library.lanl.gov\/cgi-bin\/getfile?07-15.pdf\"><span class=\"pltt-10\">http:\/\/library.lanl.gov\/cgi-bin\/getfile?07-15.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[30]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XHofstrand\"><\/a>Hofstrand&nbsp;D., Peter Drucker and innovation, dost\u0119pne elektronicznie: <a class=\"url\" href=\"https:\/\/www.extension.iastate.edu\/agdm\/wholefarm\/html\/c5-10.html\"><span class=\"pltt-10\">https:\/\/www.extension.iastate.edu\/agdm\/wholefarm\/html\/c5-10.html<\/span><\/a>; ostatnio odwiedzane: 12 pa\u017adziernika 2020.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[31]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XIntel1994\"><\/a>Intel, White paper: Statistical analysis of floating point flaw, <a class=\"url\" href=\"http:\/\/www.intel.com\/support\/processors\/pentium\/fdiv\/wp\/\"><span class=\"pltt-10\">http:\/\/www.intel.com\/support\/processors\/pentium\/fdiv\/wp\/<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/www.intel.com\/support\/processors\/pentium\/fdiv\/wp\/\"><span class=\"pltt-10\">http:\/\/www.intel.com\/support\/processors\/pentium\/fdiv\/wp\/<\/span><\/a> 1994.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[32]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xknuth_art_2011\"><\/a>Knuth&nbsp;D.E., The Art of Computer Programming, Volumes 1-4A Boxed Set, 1 wyd., Addison-Wesley Professional 2011.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[33]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XKnuth01\"><\/a>Knuth&nbsp;D.E., Sztuka programowania, Klasyka Informatyki, WNT, Warszawa 2001, iSBN 83-204-2539-5.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[34]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XKomorowski\"><\/a>Komorowski&nbsp;W., Kr\u00f3tki kurs architektury i&nbsp;organizacji komputer\u00f3w, Mikom, Warszawa 2004.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[35]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xkomorowski_instrumenta_2000\"><\/a>Komorowski&nbsp;W., Instrumenta Computatoria: [wybrane Architektury Komputer\u00f3w], \u201dHelion\u201d, Gliwice 2000.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[36]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xkomorowski_architektura_1987\"><\/a>Komorowski&nbsp;W., Architektura Komputerow: Skrypt, Politechnika Wroc\u0142awska, Wroc\u0142aw 1987.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[37]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xkomorowski_architektura_1986\"><\/a>Komorowski&nbsp;W., Architektura Komputer\u00f3w, Wydawnictwo Politechniki Wroc\u0142awskiej, Warszawa 1986.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[38]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xkomorowski_architektura_1980\"><\/a>Komorowski&nbsp;W., Architektura Minikomputerow, Wydawnictwa Naukowo-Techniczne, Warszawa 1980.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[39]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xedyta_konopczynska_granice_2012\"><\/a>Konopczy\u0144ska&nbsp;E., Granice dozwolonegu u\u017cytku prywatnego, Centrum Cyfrowe Projekt:Polska, Warszawa 2012, URL <a class=\"url\" href=\"http:\/\/conasuwiera.pl\/wp-content\/uploads\/2012\/11\/Granice-dozwolonego-u%C5%BCytku-prywatnego-poprawnione.pdf\"><span class=\"pltt-10\">http:\/\/conasuwiera.pl\/wp-content\/uploads\/2012\/11\/Granice-dozwolonego-u%C5%BCytku-prywatnego-poprawnione.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[40]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XKopalinski\"><\/a>Kopali\u0144ski&nbsp;W., S\u0142ownik wyraz\u00f3w obcych i zwrot\u00f3w obcoj\u0119zycznych, xx wyd., Wiedza Powszechna, Warszawa 1990.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[41]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XArkusze\"><\/a>Kopertowska&nbsp;M., Arkusze kalkulacyjne, Wydawnictwo Naukowe PWN, Mikom, Warszawa 2006, europejski Certyfikat Umiej\u0119tno\u015bci Komputerowych. Poziom Zaawansowany.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[42]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XBazy\"><\/a>Kopertowska&nbsp;M., Bazy danych, Wydawnictwo Naukowe PWN, Mikom, Warszawa 2006, europejski Certyfikat Umiej\u0119tno\u015bci Komputerowych modu\u0142&nbsp;5.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[43]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XGrafika\"><\/a>Kopertowska&nbsp;M., Grafika mened\u017cerska i prezentacyjna, Wydawnictwo Naukowe PWN, Mikom, Warszawa 2006, europejski Certyfikat Umiej\u0119tno\u015bci Komputerowych modu\u0142&nbsp;6.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[44]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XPrzetwarzanie\"><\/a>Kopertowska&nbsp;M., Przetwarzanie tekst\u00f3w, Wydawnictwo Naukowe PWN, Mikom, Warszawa 2006, europejski Certyfikat Umiej\u0119tno\u015bci Komputerowych modu\u0142&nbsp;3.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[45]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xjacek_kowalski_zpav_2012\"><\/a>Kowalski&nbsp;J., ZPAV ostro o kampanii spo\u0142ecznej \u2019Prawo kultury\u2019: To zach\u0119canie do z\u0142odziejstwa, http:\/\/wyborcza.pl\/1,75478,13112726,ZPAV_ostro_o_kampanii_spolecznej__Prawo_kultury__.html, URL <a class=\"url\" href=\"http:\/\/wyborcza.pl\/1,75478,13112726,ZPAV_ostro_o_kampanii_spolecznej__Prawo_kultury__.html\"><span class=\"pltt-10\">http:\/\/wyborcza.pl\/1,75478,13112726,ZPAV_ostro_o_kampanii_spolecznej__Prawo_kultury__.html<\/span><\/a> 2012.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[46]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XKurose\"><\/a>Kurose&nbsp;J.F., Sieci komputerowe: od og\u00f3\u0142u do szczeg\u00f3\u0142u z&nbsp;internetem w&nbsp;tle, Wydawnictwo Helion, Gliwice 2006.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[47]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xkurose_computer_2012\"><\/a>Kurose&nbsp;J.F., Ross&nbsp;K.W., Computer Networking: A Top-Down Approach, 6 wyd., Addison-Wesley 2012.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[48]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xlamport\"><\/a>Lamport&nbsp;L., How (la)tex changed the face of mathematics, Mitteilungen der Deutschen Mathematiker-Vereinigung, 2000, 49\u201351, URL <a class=\"url\" href=\"http:\/\/research.microsoft.com\/users\/lamport\/pubs\/lamport-latex-interview.pdf\"><span class=\"pltt-10\">http:\/\/research.microsoft.com\/users\/lamport\/pubs\/lamport-latex-interview.pdf<\/span><\/a>, <a class=\"url\" href=\"http:\/\/research.microsoft.com\/users\/lamport\/pubs\/lamport-latex-interview.pdf\"><span class=\"pltt-10\">http:\/\/research.microsoft.com\/users\/lamport\/pubs\/lamport-latex-interview.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[49]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xpresent\"><\/a>Lamport&nbsp;L., How to present a paper 1979, URL <a class=\"url\" href=\"http:\/\/research.microsoft.com\/users\/lamport\/pubs\/howto.txt\"><span class=\"pltt-10\">http:\/\/research.microsoft.com\/users\/lamport\/pubs\/howto.txt<\/span><\/a>, <a class=\"url\" href=\"http:\/\/research.microsoft.com\/users\/lamport\/pubs\/howto.txt\"><span class=\"pltt-10\">http:\/\/research.microsoft.com\/users\/lamport\/pubs\/howto.txt<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[50]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xtimothy_b._lee_judge_????\"><\/a>Lee&nbsp;T.B., Judge decries \u201cexcessive\u201d copyright and software patent protections, <a class=\"url\" href=\"http:\/\/arstechnica.com\/tech-policy\/2012\/10\/judge-decries-excessive-copyright-and-software-patent-protections\/\"><span class=\"pltt-10\">http:\/\/arstechnica.com\/tech-policy\/2012\/10\/judge-decries-excessive-copyright-and-software-patent-protections\/<\/span><\/a>s, URL <a class=\"url\" href=\"http:\/\/arstechnica.com\/tech-policy\/2012\/10\/judge-decries-excessive-copyright-and-software-patent-protections\/\"><span class=\"pltt-10\">http:\/\/arstechnica.com\/tech-policy\/2012\/10\/judge-decries-excessive-copyright-and-software-patent-protections\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[51]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xlem\"><\/a>Lem&nbsp;S., Cyberiada, Verba, Chotom\u00f3w 1991.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[52]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XLang_Hist\"><\/a>L\u00e9v\u00e9nez&nbsp;\u00c9., Computer languages history 2012, URL <a class=\"url\" href=\"http:\/\/www.levenez.com\/lang\/\"><span class=\"pltt-10\">http:\/\/www.levenez.com\/lang\/<\/span><\/a>, <a class=\"url\" href=\"http:\/\/www.levenez.com\/lang\/\"><span class=\"pltt-10\">http:\/\/www.levenez.com\/lang\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[53]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XUnix_Hist\"><\/a>L\u00e9v\u00e9nez&nbsp;\u00c9., Unix history 2012, <a class=\"url\" href=\"http:\/\/www.levenez.com\/unix\/\"><span class=\"pltt-10\">http:\/\/www.levenez.com\/unix\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[54]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XWindows_Hist\"><\/a>L\u00e9v\u00e9nez&nbsp;\u00c9., Windows history 2012, <a class=\"url\" href=\"http:\/\/www.levenez.com\/windows\/\"><span class=\"pltt-10\">http:\/\/www.levenez.com\/windows\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[55]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_bogdan_????\"><\/a>Mi\u015b&nbsp;B., Matematycy i maszyny, <a class=\"url\" href=\"http:\/\/studioopinii.pl\/archiwa\/20566\"><span class=\"pltt-10\">http:\/\/studioopinii.pl\/archiwa\/20566<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/www.mt.com.pl\/matematycy-i-maszyny\"><span class=\"pltt-10\">http:\/\/www.mt.com.pl\/matematycy-i-maszyny<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[56]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xmi_trzydzieci_2011\"><\/a>Mi\u015b&nbsp;B., Trzydzie\u015bci lat min\u0119\u0142o\u2026?, <a class=\"url\" href=\"http:\/\/studioopinii.pl\/bogdan-mis-trzydziesci-lat-minelo\/\"><span class=\"pltt-10\">http:\/\/studioopinii.pl\/bogdan-mis-trzydziesci-lat-minelo\/<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/studioopinii.pl\/bogdan-mis-trzydziesci-lat-minelo\/\"><span class=\"pltt-10\">http:\/\/studioopinii.pl\/bogdan-mis-trzydziesci-lat-minelo\/<\/span><\/a> 2011.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[57]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XMyszka2010\"><\/a>Myszka&nbsp;W., Laboratorium 4: Arytmetyka zmiennoprzecinkowa komputer\u00f3w 2010, URL <a class=\"url\" href=\"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/dydaktyka\/metody-numeryczne\/instrukcje-laboratoryjne\/laboratorium-4\/l\"><span class=\"pltt-10\">https:\/\/kmim.wm.pwr.edu.pl\/myszka\/dydaktyka\/metody-numeryczne\/instrukcje-laboratoryjne\/laboratorium-4\/l<\/span><\/a>, instrukcja laboratoryjna dost\u0119pna: <a class=\"url\" href=\"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/dydaktyka\/metody-numeryczne\/instrukcje-laboratoryjne\/laboratorium-4\/\"><span class=\"pltt-10\">https:\/\/kmim.wm.pwr.edu.pl\/myszka\/dydaktyka\/metody-numeryczne\/instrukcje-laboratoryjne\/laboratorium-4\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[58]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xkod\"><\/a>Myszka&nbsp;W., Przyk\u0142adowe programiki pokazuj\u0105ce problemy numeryczne 2008, dost\u0119pne pod adresem <a class=\"url\" href=\"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-content\/uploads\/sites\/2\/2020\/10\/kod.pdf\"><span class=\"pltt-10\">https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-content\/uploads\/sites\/2\/2020\/10\/kod.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[59]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XRegstratWM\"><\/a>Myszka&nbsp;W., Szybki wywiad technologiczny: narz\u0119dzia i&nbsp;analiza wynik\u00f3w, [w:] Materia\u0142y seminarium programu REGSTRAT, Publikacje DCSR, Wroc\u0142aw 2007, w przygotowaniu.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[60]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XNicely2008\"><\/a>Nicely&nbsp;T.R., Pentium FDIV flaw FAQ, <a class=\"url\" href=\"https:\/\/faculty.lynchburg.edu\/~nicely\/pentbug\/pentbug.html\"><span class=\"pltt-10\">https:\/\/faculty.lynchburg.edu\/~nicely\/pentbug\/pentbug.html<\/span><\/a>, URL <a class=\"url\" href=\"https:\/\/faculty.lynchburg.edu\/~nicely\/pentbug\/pentbug.html\"><span class=\"pltt-10\">https:\/\/faculty.lynchburg.edu\/~nicely\/pentbug\/pentbug.html<\/span><\/a> 2008.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[61]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XUzytkowanie\"><\/a>Nowakowski&nbsp;Z., U\u017cytkowanie komputer\u00f3w, Wydawnictwo Naukowe PWN, Mikom, Warszawa 2006, europejski Certyfikat Umiej\u0119tno\u015bci Komputerowych modu\u0142&nbsp;2.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[62]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xnull_essentials_2010\"><\/a>Null&nbsp;L., Lobur&nbsp;J., Essentials of Computer Organization and Architecture, 3 wyd., Jones &amp; Bartlett Learning 2010.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[63]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XNull2007\"><\/a>Null&nbsp;L., Lobur&nbsp;J., Marie simulator software 2007, URL <a class=\"url\" href=\"https:\/\/web.archive.org\/web\/20210303051629\/http:\/\/computerscience.jbpub.com\/ecoa\/2e\/student_resources.cfm\"><span class=\"pltt-10\">http:\/\/computerscience.jbpub.com\/ecoa\/2e\/student_resources.cfm<\/span><\/a>, <a class=\"url\" href=\"https:\/\/web.archive.org\/web\/20210303051629\/http:\/\/computerscience.jbpub.com\/ecoa\/2e\/student_resources.cfm\"><span class=\"pltt-10\">http:\/\/computerscience.jbpub.com\/ecoa\/2e\/student_resources.cfm<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[64]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xlinda_null_essentials_2006\"><\/a>Null&nbsp;L., Lobur&nbsp;J., The essentials of computer organization and architecture, Jones and Bartlett Publishers, Sudbury, Mass. 2006.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[65]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xlinda_null_marie:_2006\"><\/a>Null&nbsp;L., Lobur&nbsp;J., MARIE: an introduction to a simple computer, [w:] The essentials of computer organization and architecture 2006, URL <a class=\"url\" href=\"http:\/\/cs.mwsu.edu\/~simpson\/wordpress\/wp-content\/uploads\/2012\/12\/MarieGuide.pdf\"><span class=\"pltt-10\">http:\/\/cs.mwsu.edu\/~simpson\/wordpress\/wp-content\/uploads\/2012\/12\/MarieGuide.pdf<\/span><\/a>, <a class=\"url\" href=\"http:\/\/cs.mwsu.edu\/~simpson\/wordpress\/wp-content\/uploads\/2012\/12\/MarieGuide.pdf\"><span class=\"pltt-10\">http:\/\/cs.mwsu.edu\/~simpson\/wordpress\/wp-content\/uploads\/2012\/12\/MarieGuide.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[66]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XNull2003\"><\/a>Null&nbsp;L., Lobur&nbsp;J., A guide to the MARIE machine simulator environment 2003, URL <a class=\"url\" href=\"http:\/\/cs.mwsu.edu\/~simpson\/wordpress\/wp-content\/uploads\/2012\/12\/MarieGuide.pdf\"><span class=\"pltt-10\">http:\/\/cs.mwsu.edu\/~simpson\/wordpress\/wp-content\/uploads\/2012\/12\/MarieGuide.pdf<\/span><\/a>, <a class=\"url\" href=\"https:\/\/cs.msutexas.edu\/~simpson\/wordpress\/wp-content\/uploads\/2012\/12\/MarieGuide.pdf\"><span class=\"pltt-10\">https:\/\/cs.msutexas.edu\/~simpson\/wordpress\/wp-content\/uploads\/2012\/12\/MarieGuide.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[67]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span> <a id=\"Xorlinski_ho_2011\"><\/a>Orli\u0144ski&nbsp;W., Ho ho ho, kiszka!, <a class=\"url\" href=\"http:\/\/wo.blox.pl\/2011\/12\/Ho-ho-ho-kiszka.html\"><span class=\"pltt-10\">http:\/\/wo.blox.pl\/2011\/12\/Ho-ho-ho-kiszka.html<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/wo.blox.pl\/2011\/12\/Ho-ho-ho-kiszka.html\"><span class=\"pltt-10\">http:\/\/wo.blox.pl\/2011\/12\/Ho-ho-ho-kiszka.html<\/span><\/a> 2011.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[68]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xpascalina\"><\/a>Pascal&nbsp;B., Rozprawy i my\u015bli, rozdz. Machina Arytmetyczna, Instytut Wydawniczy PAX, Warszawa 1962, 1\u201313, dost\u0119pne jako <a class=\"url\" href=\"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-content\/uploads\/sites\/2\/2020\/10\/pascalina.pdf\"><span class=\"pltt-10\">https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-content\/uploads\/sites\/2\/2020\/10\/pascalina.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[69]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xpigott_encyclopedia_2006\"><\/a>Pigott&nbsp;D., Axtens&nbsp;B.M., Online historical encyclopaedia of programming languages, <a class=\"url\" href=\"https:\/\/web.archive.org\/web\/20210301031609\/http:\/\/hopl.info\/\"><span class=\"pltt-10\">https:\/\/hopl.info\/<\/span><\/a>, URL <a class=\"url\" href=\"https:\/\/web.archive.org\/web\/20210301031609\/http:\/\/hopl.info\/\"><span class=\"pltt-10\">https:\/\/hopl.info\/<\/span><\/a> 2020.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[70]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XPodstawy_Technik\"><\/a>Sikorski&nbsp;W., Podstawy technik informatycznych, Wydawnictwo Naukowe PWN, Mikom, Warszawa 2006, europejski Certyfikat Umiej\u0119tno\u015bci Komputerowych modu\u0142&nbsp;1.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[71]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XSilberschatz\"><\/a>Silberschatz&nbsp;A., Podstawy system\u00f3w operacyjnych, Wydawnictwa Naukowo-Techniczne, Warszawa 2006.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[72]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xsilberschatz_operating_2008\"><\/a>Silberschatz&nbsp;A., Galvin&nbsp;P.B., Gagne&nbsp;G., Operating System Concepts, 8 wyd., Wiley 2008.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[73]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xsinclair_french_1978\"><\/a>Sinclair&nbsp;P., Malinowski&nbsp;R., French cooking, Weathervane Books, [New York] 1978.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[74]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xde_smit_mathematical_2003\"><\/a>de&nbsp;Smit&nbsp;B., Lenstra&nbsp;Jr&nbsp;H.W., The mathematical structure of escher\u2019s print gallery, Notices of the AMS, &nbsp;50, 4, 2003, 446\u2013451.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[75]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xandrzej_solecki_co_2009\"><\/a>Solecki&nbsp;A., Co ta kaczka da\u0142a Europie?, <a class=\"url\" href=\"http:\/\/andsol.blox.pl\/2009\/02\/Co-ta-kaczka-dala-Europie.html\"><span class=\"pltt-10\">http:\/\/andsol.blox.pl\/2009\/02\/Co-ta-kaczka-dala-Europie.html<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/andsol.blox.pl\/2009\/02\/Co-ta-kaczka-dala-Europie.html\"><span class=\"pltt-10\">http:\/\/andsol.blox.pl\/2009\/02\/Co-ta-kaczka-dala-Europie.html<\/span><\/a> 2009.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[76]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xstallings_operating_2011\"><\/a>Stallings&nbsp;W., Operating Systems: Internals and Design Principles, 7 wyd., Prentice Hall 2011.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[77]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XStallings\"><\/a>Stallings&nbsp;W., Systemy operacyjne: struktura i&nbsp;zasady budowy, Wydawnictwo Naukowe PWN, Warszawa 2006.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[78]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xdavid_b._suits_playing_1994\"><\/a>Suits&nbsp;D.B., Playing with mazes, <a class=\"url\" href=\"http:\/\/people.rit.edu\/dbsgsh\/\"><span class=\"pltt-10\">http:\/\/people.rit.edu\/dbsgsh\/<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/people.rit.edu\/dbsgsh\/\"><span class=\"pltt-10\">http:\/\/people.rit.edu\/dbsgsh\/<\/span><\/a> 1994.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[79]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xdavid_b._suits_solving_1994\"><\/a>Suits&nbsp;D.B., Solving mazes, [w:] Playing With Mazes 1994, URL <a class=\"url\" href=\"http:\/\/people.rit.edu\/dbsgsh\/MAZES3.pdf\"><span class=\"pltt-10\">http:\/\/people.rit.edu\/dbsgsh\/MAZES3.pdf<\/span><\/a>, <a class=\"url\" href=\"http:\/\/people.rit.edu\/dbsgsh\/MAZES3.pdf\"><span class=\"pltt-10\">http:\/\/people.rit.edu\/dbsgsh\/MAZES3.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[80]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xbeamer\"><\/a>Tantau&nbsp;T., User\u2019s guide to the beamer class, version 3.07 2007, <a class=\"url\" href=\"ftp:\/\/tug.ctan.org\/pub\/tex-archive\/macros\/latex\/contrib\/beamer\/doc\/beameruserguide.pdf\"><span class=\"pltt-10\">ftp:\/\/tug.ctan.org\/pub\/tex-archive\/macros\/latex\/contrib\/beamer\/doc\/beameruserguide.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[81]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xalek_tarkowski_uczenie_2013\"><\/a>Tarkowski&nbsp;A., Uczenie o dozwolonym u\u017cytku nie jest nak\u0142anianiem do \u0142amania prawa, http:\/\/artykuly.bibliosfera.net\/2013\/02\/uczenie-o-dozwolonym-uzytku-nie-jest-naklanianiem-do-lamania-prawa\/, URL <a class=\"url\" href=\"http:\/\/artykuly.bibliosfera.net\/2013\/02\/uczenie-o-dozwolonym-uzytku-nie-jest-naklanianiem-do-lamania-prawa\/\"><span class=\"pltt-10\">http:\/\/artykuly.bibliosfera.net\/2013\/02\/uczenie-o-dozwolonym-uzytku-nie-jest-naklanianiem-do-lamania-prawa\/<\/span><\/a> 2013.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[82]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xdaniel_a._tysver_history_2008\"><\/a>Tysver&nbsp;D.A., History of software patents, from Benson and Diehr to State Street and Bilski (BitLaw), <a class=\"url\" href=\"http:\/\/www.bitlaw.com\/software-patent\/history.html\"><span class=\"pltt-10\">http:\/\/www.bitlaw.com\/software-patent\/history.html<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/www.bitlaw.com\/software-patent\/history.html\"><span class=\"pltt-10\">http:\/\/www.bitlaw.com\/software-patent\/history.html<\/span><\/a> 2008.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[83]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_o_????\"><\/a>Waglowski&nbsp;P., O tym, \u017ce przyj\u0119cie jednolitego patentu przez polsk\u0119 wydaje si\u0119 przedwczesne <span class=\"cmsy-10\">|<\/span> prawo <span class=\"cmsy-10\">|<\/span> VaGla.pl prawo i internet, <a class=\"url\" href=\"http:\/\/prawo.vagla.pl\/node\/9910\"><span class=\"pltt-10\">http:\/\/prawo.vagla.pl\/node\/9910<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/prawo.vagla.pl\/node\/9910\"><span class=\"pltt-10\">http:\/\/prawo.vagla.pl\/node\/9910<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[84]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xwaglowski_prawo_2005\"><\/a>Waglowski&nbsp;P., Prawo w sieci. Zarys regulacji internetu., Helion, Gliwice 2005, URL <a class=\"url\" href=\"http:\/\/www.vagla.pl\/\"><span class=\"pltt-10\">http:\/\/www.vagla.pl\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[85]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XWard2000\"><\/a>Ward&nbsp;A., Some issues on floating-point precision under linux, Linux Gazette, , 53, 2000, URL <a class=\"url\" href=\"http:\/\/www.tldp.org\/LDP\/LGNET\/issue53\/ward.html\"><span class=\"pltt-10\">http:\/\/www.tldp.org\/LDP\/LGNET\/issue53\/ward.html<\/span><\/a>, <a class=\"url\" href=\"http:\/\/www.tldp.org\/LDP\/LGNET\/issue53\/ward.html\"><span class=\"pltt-10\">http:\/\/www.tldp.org\/LDP\/LGNET\/issue53\/ward.html<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[86]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xwiedmann\"><\/a>Wiedmann&nbsp;M., Screen presentation tools, <a class=\"url\" href=\"https:\/\/miwie.de\/screen-presentations\/presentations.html\"><span class=\"pltt-10\">https:\/\/miwie.de\/screen-presentations\/presentations.html<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[87]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XWirth\"><\/a>Wirth&nbsp;N., Algorytmy + struktury danych = programy, Klasyka informatyki, Wydawnictwa Naukowo-Techniczne 2004.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[88]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xwirth_algorithms_1976\"><\/a>Wirth&nbsp;N., Algorithms + Data Structures = Programs, 1st wyd., Prentice Hall 1976.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[89]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XWissema05\"><\/a>Wissema&nbsp;J.G., Technostarterzy dlaczego i jak?, Polska Agencja Rozwoju Przedsi\u0119biorczo\u015bci, Warszawa 2005, dost\u0119pne w wersji elektronicznej: <a class=\"url\" href=\"http:\/\/www.parp.gov.pl\/files\/74\/81\/105\/technostarterzy.pdf\"><span class=\"pltt-10\">http:\/\/www.parp.gov.pl\/files\/74\/81\/105\/technostarterzy.pdf<\/span><\/a>; ostatnio odwiedzane: 4 listopada 2007.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[90]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XUslugi\"><\/a>Wojciechowski&nbsp;A., Us\u0142ugi w sieciach informatycznych, Wydawnictwo Naukowe PWN, Mikom, Warszawa 2006, europejski Certyfikat Umiej\u0119tno\u015bci Komputerowych modu\u0142&nbsp;7.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[91]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XWroblewski2010\"><\/a>Wr\u00f3blewski&nbsp;P., Algorytmy: struktury danych i&nbsp;techniki programowania, Helion, Gliwice 2010.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[92]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XWroblewski2003\"><\/a>Wr\u00f3blewski&nbsp;P., Algorytmy: struktury danych i&nbsp;techniki programowania: algorytmika nie tylko dla informatyk\u00f3w, Helion, Gliwice 2003.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[93]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XFib\"><\/a>Zelent&nbsp;M., Tajemniczy ci\u0105g fibonacciego. z\u0142ota liczba. boska proporcja, URL <a class=\"url\" href=\"http:\/\/www.youtube.com\/watch?v=wb7kPaM8cfg&amp;feature;=youtube_gdata_player\"><span class=\"pltt-10\">http:\/\/www.youtube.com\/watch?v=wb7kPaM8cfg&amp;feature=youtube_gdata_player<\/span><\/a>, <a class=\"url\" href=\"http:\/\/www.youtube.com\/watch?v=wb7kPaM8cfg&amp;feature;=youtube_gdata_player\"><span class=\"pltt-10\">http:\/\/www.youtube.com\/watch?v=wb7kPaM8cfg&amp;feature=youtube_gdata_player<\/span><\/a> 2013.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[94]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"Xzuber\"><\/a>Zuber&nbsp;R., Metody numeryczne i programowanie, WSziP 1975, fragmenty: <a class=\"url\" href=\"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-content\/uploads\/sites\/2\/2020\/10\/zuber.pdf\"><span class=\"pltt-10\">https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-content\/uploads\/sites\/2\/2020\/10\/zuber.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[95]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XSkotnicka2012\"><\/a>Skotnicka&nbsp;M. (red.), My, dzieci sieci: wok\u00f3\u0142 manifestu, Fundacja Nowoczesna Polska, Warszawa 2012, URL <a class=\"url\" href=\"http:\/\/prawokultury.pl\/media\/entry\/attach\/my-dzieci-sieci-wok\/%C3\/%B3\/%C5\/%82-manifestu.pdf\"><span class=\"pltt-10\">http:\/\/prawokultury.pl\/media\/entry\/attach\/my-dzieci-sieci-wok\\%C3\\%B3\\%C5\\%82-manifestu.pdf<\/span><\/a>, <a class=\"url\" href=\"http:\/\/prawokultury.pl\/media\/entry\/attach\/my-dzieci-sieci-wok\/%C3\/%B3\/%C5\/%82-manifestu.pdf\"><span class=\"pltt-10\">http:\/\/prawokultury.pl\/media\/entry\/attach\/my-dzieci-sieci-wok\\%C3\\%B3\\%C5\\%82-manifestu.pdf<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[96]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_apple_????\"><\/a>Apple patents the virtual page turn, <a class=\"url\" href=\"http:\/\/mashable.com\/2012\/11\/16\/apple-page-turn-patent\/\"><span class=\"pltt-10\">http:\/\/mashable.com\/2012\/11\/16\/apple-page-turn-patent\/<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/mashable.com\/2012\/11\/16\/apple-page-turn-patent\/\"><span class=\"pltt-10\">http:\/\/mashable.com\/2012\/11\/16\/apple-page-turn-patent\/<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[97]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_co_????\"><\/a>Co mog\u0119?, <a class=\"url\" href=\"https:\/\/web.archive.org\/web\/20130413100524\/http:\/\/badzbardziejswiadomy.pl\"><span class=\"pltt-10\">https:\/\/web.archive.org\/web\/20130413100524\/http:\/\/badzbardziejswiadomy.pl<\/span><\/a>, URL <a class=\"url\" href=\"https:\/\/web.archive.org\/web\/20130413100524\/http:\/\/badzbardziejswiadomy.pl\"><span class=\"pltt-10\">https:\/\/web.archive.org\/web\/20130413100524\/http:\/\/badzbardziejswiadomy.pl<\/span><\/a>, https:\/\/web.archive.org\/web\/20130413100524\/http:\/\/badzbardziejswiadomy.pl.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[98]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_escher_????\"><\/a>Escher and the Droste effect \u2013 Universiteit Leiden, <a class=\"url\" href=\"http:\/\/escherdroste.math.leidenuniv.nl\/index.php?menu=intro\"><span class=\"pltt-10\">http:\/\/escherdroste.math.leidenuniv.nl\/index.php?menu=intro<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/escherdroste.math.leidenuniv.nl\/index.php?menu=intro\"><span class=\"pltt-10\">http:\/\/escherdroste.math.leidenuniv.nl\/index.php?menu=intro<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[99]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_marie_????\"><\/a>MARIE, <a class=\"url\" href=\"http:\/\/pl.wikipedia.org\/w\/index.php?title=MARIE\"><span class=\"pltt-10\">http:\/\/pl.wikipedia.org\/w\/index.php?title=MARIE<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/pl.wikipedia.org\/w\/index.php?title=MARIE\"><span class=\"pltt-10\">http:\/\/pl.wikipedia.org\/w\/index.php?title=MARIE<\/span><\/a>, page Version ID: 27069816.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[100]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_student_\"><\/a>Student resources \u2013 essentials of computer organization and architecture, second edition, <a class=\"url\" href=\"http:\/\/computerscience.jbpub.com\/ecoa\/2e\/student_resources.cfm\"><span class=\"pltt-10\">http:\/\/computerscience.jbpub.com\/ecoa\/2e\/student_resources.cfm<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/computerscience.jbpub.com\/ecoa\/2e\/student_resources.cfm\"><span class=\"pltt-10\">http:\/\/computerscience.jbpub.com\/ecoa\/2e\/student_resources.cfm<\/span><\/a>.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[101]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_ministerstwo_2012\"><\/a>Ministerstwo administracji i cyfryzacji, <a class=\"url\" href=\"http:\/\/mac.gov.pl\/dzialania\/jednolity-patent-europejski-nad-czym-warto-sie-zastanowic\/\"><span class=\"pltt-10\">http:\/\/mac.gov.pl\/dzialania\/jednolity-patent-europejski-nad-czym-warto-sie-zastanowic\/<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/mac.gov.pl\/dzialania\/jednolity-patent-europejski-nad-czym-warto-sie-zastanowic\/\"><span class=\"pltt-10\">http:\/\/mac.gov.pl\/dzialania\/jednolity-patent-europejski-nad-czym-warto-sie-zastanowic\/<\/span><\/a> 2012.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[102]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span> <a id=\"X_patent_2012\"><\/a>Patent \u2019trolls cost $29bn a year\u2019, <a class=\"url\" href=\"http:\/\/www.bbc.co.uk\/news\/technology-18598559\"><span class=\"pltt-10\">http:\/\/www.bbc.co.uk\/news\/technology-18598559<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/www.bbc.co.uk\/news\/technology-18598559\"><span class=\"pltt-10\">http:\/\/www.bbc.co.uk\/news\/technology-18598559<\/span><\/a> 2012.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[103]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X_ustawa_2011\"><\/a>Ustawa z dnia 30 czerwca 2000 Prawo w\u0142asno\u015bci przemys\u0142owej (Dz. U. z 2003 r nr 119, poz 117 z p\u00f3\u017an. zm), <a class=\"url\" href=\"http:\/\/www.uprp.pl\/uprp\/_gAllery\/37\/06\/37064\/Ustawa_pwp_-_tekst_ujednolicony.pdf\"><span class=\"pltt-10\">http:\/\/www.uprp.pl\/uprp\/_gAllery\/37\/06\/37064\/Ustawa_pwp_-_tekst_ujednolicony.pdf<\/span><\/a>, URL <a class=\"url\" href=\"http:\/\/www.uprp.pl\/uprp\/_gAllery\/37\/06\/37064\/Ustawa_pwp_-_tekst_ujednolicony.pdf\"><span class=\"pltt-10\">http:\/\/www.uprp.pl\/uprp\/_gAllery\/37\/06\/37064\/Ustawa_pwp_-_tekst_ujednolicony.pdf<\/span><\/a> 2011.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[104]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"XNext_64\"><\/a>64-bitowa uk\u0142adanka, Magazyn Komputerowy Next, , 1, 2007, 34\u201348.<\/p>\n<p class=\"bibitem\"><span class=\"biblabel\">[105]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span><a id=\"X1994\"><\/a>Ustawa z dnia 4 lutego 1994 r. o prawie autorskim i prawach pokrewnych., <a class=\"url\" href=\"http:\/\/isap.sejm.gov.pl\/DetailsServlet?id=WDU19940240083\"><span class=\"pltt-10\">http:\/\/isap.sejm.gov.pl\/DetailsServlet?id=WDU19940240083<\/span><\/a>, obwieszczenie Marsza\u0142ka Sejmu Rzeczypospolitej Polskiej z dnia 17 maja 2006 r. w sprawie og\u0142oszenia jednolitego tekstu ustawy o prawie autorskim i prawach pokrewnych Dz.U. 2006 nr 90 poz. 631 <a class=\"url\" href=\"http:\/\/isap.sejm.gov.pl\/DetailsServlet?id=WDU20060900631&amp;min;=1\"><span class=\"pltt-10\">http:\/\/isap.sejm.gov.pl\/DetailsServlet?id=WDU20060900631&amp;min=1<\/span><\/a> 1994.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Co czyta\u0107? Nie ma jednego, dobrego podr\u0119cznika do tych zaj\u0119\u0107. Poni\u017csza lista zawiera spis wszystkich chyba odsy\u0142aczy, kt\u00f3re pojawiaj\u0105 si\u0119 na slajdach i podczas wyk\u0142adu. Podstawow\u0105 pozycj\u0105 literatury s\u0105 podr\u0119czniki Harella &nbsp;[1,&nbsp;2,&nbsp;3,&nbsp;4]. Z&nbsp;punktu widzenia \u201erozwoju osobistego\u201d warto zapozna\u0107 si\u0119 z&nbsp;gruba\u015bn\u0105 ksi\u0105\u017ck\u0105 Gleicka (&nbsp;[5]) czy (wszystkimi praktycznie) ksi\u0105\u017ckami wydanymi przez Lawrence Lessiga &nbsp;[6,&nbsp;7,&nbsp;8,&nbsp;9,&nbsp;10]. Ta pierwsza, na &hellip; <a href=\"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/dydaktyka\/technologie-informacyjne\/slajdy-do-wykladu-wersja-podstawowa\/literatura\/\" class=\"more-link\">Czytaj dalej <span class=\"screen-reader-text\">Literatura<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":21039,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-22172","page","type-page","status-publish","hentry"],"publishpress_future_action":{"enabled":false,"date":"2026-04-18 14:42:22","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"language","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-json\/wp\/v2\/pages\/22172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-json\/wp\/v2\/comments?post=22172"}],"version-history":[{"count":8,"href":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-json\/wp\/v2\/pages\/22172\/revisions"}],"predecessor-version":[{"id":26572,"href":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-json\/wp\/v2\/pages\/22172\/revisions\/26572"}],"up":[{"embeddable":true,"href":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-json\/wp\/v2\/pages\/21039"}],"wp:attachment":[{"href":"https:\/\/kmim.wm.pwr.edu.pl\/myszka\/wp-json\/wp\/v2\/media?parent=22172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}