- Broschiertes Buch
A detailed disassembly manual for people who want to dismantle Big Tech
Andere Kunden interessierten sich auch für
- Cedric DurandHow Silicon Valley Unleashed Techno-feudalism18,99 €
- Nick Dyer-WithefordCybernetic Circulation Complex15,99 €
- Rob ReichSystem Error28,99 €
- Rob ReichSystem Error36,99 €
- Danielle Keats CitronThe Fight for Privacy12,99 €
- Nick CouldryThe Costs of Connection28,99 €
- Katherine OrmerodWhy Social Media is Ruining Your Life11,99 €
-
-
-
A detailed disassembly manual for people who want to dismantle Big Tech
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Verso Books
- Seitenzahl: 184
- Erscheinungstermin: 17. September 2024
- Englisch
- Abmessung: 197mm x 127mm x 14mm
- Gewicht: 160g
- ISBN-13: 9781804292143
- ISBN-10: 1804292141
- Artikelnr.: 69644551
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Verso Books
- Seitenzahl: 184
- Erscheinungstermin: 17. September 2024
- Englisch
- Abmessung: 197mm x 127mm x 14mm
- Gewicht: 160g
- ISBN-13: 9781804292143
- ISBN-10: 1804292141
- Artikelnr.: 69644551
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Cory Doctorow is a science fiction author, activist and journalist. He is the author of many books, most recently RADICALIZED and WALKAWAY, science fiction for adults; HOW TO DESTROY SURVEILLANCE CAPITALISM, nonfiction about monopoly and conspiracy; IN REAL LIFE, a graphic novel; and the picture book POESY THE MONSTER SLAYER. His latest book is ATTACK SURFACE, a standalone adult sequel to LITTLE BROTHER. In 2020, he was inducted into the Canadian Science Fiction and Fantasy Hall of Fame. He works for the Electronic Frontier Foundation, is a MIT Media Lab Research Affiliate, is a Visiting Professor of Computer Science at Open University, a Visiting Professor of Practice at the University of North Carolina’s School of Library and Information Science and co-founded the UK Open Rights Group.
Introduction
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index
Introduction
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index