An exploration of the Dark Web--websites accessible only with special routing software--that examines the history of three anonymizing networks, Freenet, Tor, and I2P.OCLC-licensed vendor bibliographic record.
Howard Rheingold tours the "virtual community" of online networking. Howard Rheingold has been called the First Citizen of the Internet. In this book he tours the "virtual community" of online networking. He describes a community that is as real and as much a mixed bag as any physical community -- one where people talk, argue, seek information, organize politically, fall in love, and dupe other…
This book provides a framework for thinking about the law and cyberspace, examining the extent to which the Internet is currently under control and the extent to which it can or should be controlled. It focuses in part on the proliferation of MP3 file sharing, a practice made possible by the development of a file format that enables users to store large audio files with near-CD sound quality on…
"The global digital network is not just a delivery system for email, Web pages, and digital television. It is a whole new form of urban infrastructure - one that will change the forms of our cities as dramatically as railroads, highways, electric power supply, and telephone networks did in the past. In this book, William J. Mitchell examines this new infrastructure and its implications for our …
"With Me++ the author of City of Bits and e-topia completes an informal trilogy examining the ramifications of information technology in everyday life. William Mitchell describes the transformation of wireless technology in the hundred years since Marconi: the scaling up of networks and the scaling down of the apparatus for transmission and reception. He examines the effects of wireless linkage…
Written by the team that developed the software, this tutorial is the definitive resource for scientists, engineers, and other computer users who want to use PVM to increase the flexibility and power of their high-performance computing resources.Written by the team that developed the software, this tutorial is the definitive resource for scientists, engineers, and other computer users who want …
How Control Exists after DecentralizationIs the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconne…
Title from title screen.Includes index.Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts belie…
"An outgrowth of the Seventh DIAC symposium held in Seattle in 2000"--Introduction.Information and computer technologies are used every day by real people with real needs. The authors contributing to Shaping the Network Society describe how technology can be used effectively by communities, activists, and citizens to meet society's challenges. In their vision, computer professionals are concern…
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…