Amazon Price: N/A (as of June 20, 2018 20:31 –
Celebrants and skeptics alike have produced valuable analyses of the Internet’s effect on us and our world, oscillating between utopian bliss and dystopian hell. But according to Robert W. McChesney, arguments on both sides fail to address the relationship between economic power and the digital world.
McChesney’s award-winning Rich Media, Poor Democracy skewered the assumption that a society drenched in commercial information is a democratic one. In Digital Disconnect McChesney returns to this provocative thesis in light of the advances of the digital age, incorporating capitalism into the heart of his analysis. He argues that the sharp decline in the enforcement of antitrust violations, the increase in patents on digital technology and proprietary systems, and other policies and massive indirect subsidies have made the Internet a place of numbing commercialism. A small handful of monopolies now dominate the political economy, from Google, which garners an astonishing 97 percent share of the mobile search market, to Microsoft, whose operating system is used by over 90 percent of the world’s computers. This capitalistic colonization of the Internet has spurred the collapse of credible journalism, and made the Internet an unparalleled apparatus for government and corporate surveillance, and a disturbingly anti-democratic force.
Continue reading “Digital Disconnect: How Capitalism is Turning the Internet Against Democracy”
Amazon Price: N/A (as of June 20, 2018 22:30 –
In Ruling the Root, Milton Mueller uses the theoretical framework of institutional
economics to analyze the global policy and governance problems created by the assignment of Internet
domain names and addresses. "The root" is the top of the domain name hierarchy and the Internet
address space. It is the only point of centralized control in what is otherwise a distributed and
voluntaristic network of networks. Both domain names and IP numbers are valuable resources, and
their assignment on a coordinated basis is essential to the technical operation of the Internet.
Mueller explains how control of the root is being leveraged to control the Internet itself in such
key areas as trademark and copyright protection, surveillance of users, content regulation, and
regulation of the domain name supply industry.Control of the root originally resided in an
informally organized technical elite comprised mostly of American computer scientists. As the
Internet became commercialized and domain name registration became a profitable business, a six-year
struggle over property rights and the control of the root broke out among Internet technologists,
business and intellectual property interests, international organizations, national governments, and
advocates of individual rights. By the late 1990s, it was apparent that only a new international
institution could resolve conflicts among the factions in the domain name wars. Mueller recounts the
fascinating process that led to the formation of a new international regime around ICANN, the
Internet Corporation for Assigned Names and Numbers. In the process, he shows how the vaunted
freedom and openness of the Internet is being diminished by the institutionalization of the
Amazon Price: N/A (as of June 21, 2018 10:27 –
The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware
Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail. Counter today’s most virulent network attack types Find out how malware infects, survives, and propagates across an enterprise Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Learn how hackers use archivers, encryptors, and packers to obfuscate code Defend against keylogging, redirect, click fraud, and identity theft threats
Amazon Price: $6.99 $6.99 (as of June 20, 2018 17:04 –
BLACK & WHITE VERSION. Reddcoin (RDD) is a decentralised cryptocurrency similar to Bitcoin. It was the first cryptocurrency to introduce a new form of timestamping (proof of stake velocity) that allows users of the wallet to receive up to 5% rate of return on their holdings per year. This book is a detailed history of the first year of Reddcoin up to the 2nd of February 2015 (the time at which the blockchain had been usable for one year by the general public).
Amazon Price: $90.95 $90.95 (as of June 20, 2018 18:38 –
Based on related courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.
Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how to avoid these vulnerabilities through secure coding. It covers organizational-related vulnerabilities, including access authorization, user authentication, and human factors in information security. Providing readers with the understanding required to build a secure enterprise, block intrusions, and handle delicate legal and ethical issues, the text:
Continue reading “Cyberspace and Cybersecurity”