Linux Clearly Explained
This book assumes absolutely no previous experience with UNIX or Linux. It's written for any PC user who wishes to make the transition to a Linux-based workstation and Linux applications. This book is for users who want to get Linux installed and configured, and then get on with the tasks they currently accomplish with their Windows software: file maintenance, email, Web browsing, newsgroups, word processing, and spreadsheet use. Cover Title
The Coming Swarm
What is Hacktivism? In The Coming Swarm, rising star Molly Sauter examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. The internet is a vital arena of communication, self expression, and interpersonal organizing. When there is a message to convey, words to get out, or people to unify, many will turn to the internet as a theater for that activity. As familiar and widely accepted activist tools-petitions, fundraisers, mass letter-writing, call-in campaigns and others-find equivalent practices in the online space, is there also room for the tactics of disruption and civil disobedience that are equally familiar from the realm of street marches, occupations, and sit-ins? With a historically grounded analysis, and a focus on early deployments of activist DDOS as well as modern instances to trace its development over time, The Coming Swarm uses activist DDOS actions as the foundation of a larger analysis of the practice of disruptive civil disobedience on the internet.
DIVEthnographic study of the programmers, engineers, and hackers who have shaped the internet since the 1970s and the battles that have been waged amongst them over the development of open source software./div
Producing for Web 2 0
Praise for the previous edition: 'Gives an excellent insight into the main issues of creating a website and offers a good foundation of knowledge.' – i.net Producing for Web 2.0 is a clear and practical guide to the planning, set up and management of a website in web 2.0. It gives readers an overview of the current technologies available for online communications and shows how to use them for maximum effect when planning a website. Producing for Web 2.0 sets out the practical toolkit needed for web design and content management. It is supported by a regularly updated and comprehensive Companion Website at: www.producingforweb2.com where readers can see examples of programming and demonstrations of concepts discussed in the book, as well as trying things out themselves. Producing for Web 2.0 includes: illustrated examples of good design and content advice on content, maintenance and how to use sites effectively tips on using multimedia, including video, audio, flash, and images a chapter on ethics and internet regulations for journalists and writers tutorials for the main applications used in website design step by step guides to difficult areas with screenshots guides to good practice for all those involved in publishing news online.
The Digital Rights Movement
The movement against restrictive digital copyright protection arose largely in response to the excesses of the Digital Millennium Copyright Act (DMCA) of 1998. In The Digital Rights Movement, Hector Postigo shows that what began as an assertion of consumer rights to digital content has become something broader: a movement concerned not just with consumers and gadgets but with cultural ownership. Increasingly stringent laws and technological measures are more than incoveniences; they lock up access to our "cultural commons." Postigo describes the legislative history of the DMCA and how policy "blind spots" produced a law at odds with existing and emerging consumer practices. Yet the DMCA established a political and legal rationale brought to bear on digital media, the Internet, and other new technologies. Drawing on social movement theory and science and technology studies, Postigo presents case studies of resistance to increased control over digital media, describing a host of tactics that range from hacking to lobbying. Postigo discusses the movement's new, user-centered conception of "fair use" that seeks to legitimize noncommercial personal and creative uses such as copying legitimately purchased content and remixing music and video tracks. He introduces the concept of technological resistance--when hackers and users design and deploy technologies that allows access to digital content despite technological protection mechanisms--as the flip side to the technological enforcement represented by digital copy protection and a crucial tactic for the movement.
UNIX The Complete Reference Second Edition
The Definitive UNIX Resource--Fully Updated Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities. Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You'll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included. Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications
Good Faith Collaboration
How Wikipedia collaboration addresses the challenges of openness, consensus, and leadership in a historical pursuit for a universal encyclopedia.
Securing IM and P2P Applications for the Enterprise
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic. * A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004 * The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time * The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics
The Net Effect
This book about America's romance with computer communication looks at the internet, not as harbinger of the future or the next big thing, but as an expression of the times. Streeter demonstrates that our ideas about what connected computers are for have been in constant flux since their invention. In the 1950s they were imagined as the means for fighting nuclear wars, in the 1960s as systems for bringing mathematical certainty to the messy complexity of social life, in the 1970s as countercultural playgrounds, in the 1980s as an icon for what's good about free markets, in the 1990s as a new frontier to be conquered and, by the late 1990s, as the transcendence of markets in an anarchist open source utopia. The Net Effect teases out how culture has influenced the construction of the internet and how the structure of the internet has played a role in cultures of social and political thought. It argues that the internet's real and imagined anarchic qualities are not a product of the technology alone, but of the historical peculiarities of how it emerged and was embraced. Finding several different traditions at work in the development of the internet—most uniquely, romanticism—Streeter demonstrates how the creation of technology is shot through with profoundly cultural forces—with the deep weight of the remembered past, and the pressures of shared passions made articulate.
The Future of the Internet And How to Stop It
This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity—and reveals that it is sputtering precisely because of its runaway success. With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control. IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can't be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk. The Internet's current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.”