Obfuscation: A User’s Guide for Privacy and Protest

Rating: 
Amazon Price: N/A (as of June 19, 2018 00:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance — the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage — especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it.Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users' search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.

Password Journal: Password Keeper / Art Gifts ( Internet Address Logbook / Diary / Softback Notebook ) [ Van Gogh – Starry Night ] (Password Journals – Fine Art)

Rating: 
Amazon Price: $5.75 $5.75 (as of June 19, 2018 05:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Password Journal Password Keeper Art Gifts Internet Address Logbook Diary Softback Notebook Van Gogh Starry Night

Mobile and Web Messaging: Messaging Protocols for Web and Mobile Devices

Rating: 
Amazon Price: N/A (as of June 18, 2018 19:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn how to use messaging technologies to build responsive and resilient applications for mobile devices and web browsers. With this hands-on guide, you’ll use the STOMP and MQTT messaging protocols to write iOS and web applications capable of sending and receiving GPS and device sensor data, text messages, and alerts.

Messaging protocols are not only simple to use, but also conserve network bandwidth, device memory, and batteries. Using this book’s step-by-step format, author Jeff Mesnil helps you work with Objective-C and JavaScript libraries, as well as the protocols. All you need to get started are basic programming skills.Understand basic messaging concepts and compositionLearn two common messaging models: point-to-point and publish/subscribeUse STOMP to write an iOS application that sends GPS data, and a web app that consumes the dataBuild an iOS app with MQTT that tracks and broadcasts device motion data, and a web app that displays the data and sends alertsExtend STOMP to filter, prioritize, persist, and expire messagesTake a complete tour of STOMP and MQTT, including features not used in the book’s sample apps

Paws-itively Puppies: The Secret Personal Internet Address & Password Log Book for Puppy & Dog Lovers (Disguised Password Book Series) (Volume 2)

Rating: 
Amazon Price: $8.99 $8.99 (as of June 18, 2018 21:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Are you always forgetting your logins, usernames and passwords? Do you have lots of sticky notes or labels around the house to remember them? Would you like to find a better way?

Paws-itively Puppies is a secret password book that is disguised as a paperback dog photobook. Add all your website information in one handy place to organize your internet life.
Continue reading “Paws-itively Puppies: The Secret Personal Internet Address & Password Log Book for Puppy & Dog Lovers (Disguised Password Book Series) (Volume 2)”

Network Forensics: Tracking Hackers through Cyberspace

Rating: 
Amazon Price: N/A (as of June 19, 2018 03:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”

– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.
Continue reading “Network Forensics: Tracking Hackers through Cyberspace”