The Modem World

The Modem World

Author: Kevin Driscoll

Publisher: Yale University Press

Published: 2022-04-19

Total Pages: 327

ISBN-13: 0300265123

DOWNLOAD EBOOK

The untold story about how the internet became social, and why this matters for its future “Whether you’re reading this for a nostalgic romp or to understand the dawn of the internet, The Modem World will delight you with tales of BBS culture and shed light on how the decisions of the past shape our current networked world.”—danah boyd, author of It’s Complicated: The Social Lives of Networked Teens Fifteen years before the commercialization of the internet, millions of amateurs across North America created more than 100,000 small-scale computer networks. The people who built and maintained these dial-up bulletin board systems (BBSs) in the 1980s laid the groundwork for millions of others who would bring their lives online in the 1990s and beyond. From ham radio operators to HIV/AIDS activists, these modem enthusiasts developed novel forms of community moderation, governance, and commercialization. The Modem World tells an alternative origin story for social media, centered not in the office parks of Silicon Valley or the meeting rooms of military contractors, but rather on the online communities of hobbyists, activists, and entrepreneurs. Over time, countless social media platforms have appropriated the social and technical innovations of the BBS community. How can these untold stories from the internet’s past inspire more inclusive visions of its future?


The Complete Idiot's Guide to Computer Basics

The Complete Idiot's Guide to Computer Basics

Author: Joe Kraynak

Publisher: Penguin

Published: 2004-01-06

Total Pages: 450

ISBN-13: 9781592571680

DOWNLOAD EBOOK

The computer how-to that's actually coherent... Now in its third edition, this book puts the reader in charge of the computer, rather than the other way around. It identifies practical uses for the computer, and shows how to get the most out of your machine, simply and step-by-step. € New information on going digital with music, photos, and video € Updates for Windows XP € Updates for soon-to-be-released Microsoft Office 2003 € Step-by-step instructions for backing up data € Advice for troubleshooting common problems € Latest info on upgrades, components, and accessories € Ideal for any new user, including the large numbers of senior citizens teaching themselves how to use the computer


Invocational Media

Invocational Media

Author: Chris Chesher

Publisher: Bloomsbury Publishing USA

Published: 2023-10-19

Total Pages: 281

ISBN-13: 1501363603

DOWNLOAD EBOOK

Invocational Media critiques the sociotechnical power of digital technologies by introducing the concept of invocational media. What is an invocation? Ask your voice assistant and it will define it for you. It is a media artefact that responds to many invocations such as seeking the weather forecast, requesting any song you can name, or turning on the lights, almost magically. This contemporary manifestation of the ancient practice of invocation gives an immediate response to your call in a way that Chris Chesher argues is the characteristic power of all computers, which he redefines as invocational media. This book challenges the foundations of computer science by offering invocation as a powerful new way of conceptualising digital technologies. Drawing on media philosophy, Deleuze, Guattari, Heidegger, Latour, Austin, Innis and McLuhan, it critiques the representationalism of data processing, artificial intelligence and virtual reality. Invocational media seem to empower individuals, but necessarily subject users to corporate and government monopolies of invocation. They offer many 'solutions', but only by reducing everything to the same kind of act. They complicate agency in their indifference as to whether invokers are human or non-human. With robotics they invoke material form to act physically and autonomously. People willingly make themselves invocable to surveillance and control by creating their own profiles and marking themselves with biometrics. This ground-breaking book will change how you think about digital media by showing they are, in fact, invocational media.


Discovering Computers 2003

Discovering Computers 2003

Author: Gary B. Shelly

Publisher:

Published: 2002

Total Pages: 896

ISBN-13:

DOWNLOAD EBOOK

The Shelly Cashman Series presents a completely revised and updated edition to the best-selling computer concepts book to make learning about computers interesting and interactive. Discovering Computers 2003 is fully integrated with the World Wide Web as a means of offering additional content, unmatched currency, learning games, and more. Discovering Computers 2003 is available in three versions to provide the right depth of coverage for every class. Unparalleled online content, extensive end-of-chapter exercises, and comprehensive instructor's resources give you all the tools you need to present an outstanding concepts course.


Handbook of Digital Forensics of Multimedia Data and Devices, Enhanced E-Book

Handbook of Digital Forensics of Multimedia Data and Devices, Enhanced E-Book

Author: Anthony T. S. Ho

Publisher: John Wiley & Sons

Published: 2016-05-20

Total Pages: 704

ISBN-13: 1118757076

DOWNLOAD EBOOK

Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializing in diverse topics such as forensic authentication, forensic triage, forensic photogrammetry, biometric forensics, multimedia device identification, and image forgery detection among many others. Key features: Brings digital and multimedia forensics together with contributions from academia, law enforcement, and the digital forensics industry for extensive coverage of all the major aspects of digital forensics of multimedia data and devices Provides comprehensive and authoritative coverage of digital forensics of multimedia data and devices Offers not only explanations of techniques but also real-world and simulated case studies to illustrate how digital and multimedia forensics techniques work Includes a companion website hosting continually updated supplementary materials ranging from extended and updated coverage of standards to best practice guides, test datasets and more case studies


Science Fiction Video Games

Science Fiction Video Games

Author: Neal Roger Tringham

Publisher: CRC Press

Published: 2014-09-10

Total Pages: 540

ISBN-13: 1040074618

DOWNLOAD EBOOK

Understand Video Games as Works of Science Fiction and Interactive Stories Science Fiction Video Games focuses on games that are part of the science fiction genre, rather than set in magical milieux or exaggerated versions of our own world. Unlike many existing books and websites that cover some of the same material, this book emphasizes critical a


Secrets and Lies

Secrets and Lies

Author: Bruce Schneier

Publisher: John Wiley & Sons

Published: 2015-03-23

Total Pages: 453

ISBN-13: 1119092434

DOWNLOAD EBOOK

This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.


Guide to Cisco Routers Configuration

Guide to Cisco Routers Configuration

Author: Mohammed M. Alani

Publisher: Springer

Published: 2017-05-09

Total Pages: 239

ISBN-13: 3319546309

DOWNLOAD EBOOK

This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios. Features: discusses basic configuration, domestic duties, standard and advanced routing, WAN technologies, security, router management, remote connectivity, and practical tips; explains in detail the steps required to configure different protocols on Cisco routers; includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW); provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW).


Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations

Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations

Author: Hossein Bidgoli

Publisher: John Wiley & Sons

Published: 2006-03-10

Total Pages: 1008

ISBN-13: 0470051205

DOWNLOAD EBOOK

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.