Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy. Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy , Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which …
"Based on fieldwork at three distinct sites in Washington, DC, this book finds that the persistent problem of poverty is often framed as a problem of technology"--OCLC-licensed vendor bibliographic record.
A history of one of the most influential American companies of the last century. For decades, IBM shaped the way the world did business. IBM products were in every large organization, and IBM corporate culture established a management style that was imitated by companies around the globe. It was "Big Blue", an icon. And yet over the years, IBM has gone through both failure and success, survivin…
An introduction to computational thinking that traces a genealogy beginning centuries before the digital computer. A few decades into the digital era, scientists discovered that thinking in terms of computation made possible an entirely new way of organizing scientific investigation; eventually, every field had a computational branch: computational physics, computational biology, computational …
OCLC-licensed vendor bibliographic record.
Why the Internet was designed to be the way it is, and how it could be different, now and in the future. How do you design an internet The architecture of the current Internet is the product of basic design decisions made early in its history. What would an internet look like if it were designed, today, from the ground up In this book, MIT computer scientist David Clark explains how the Interne…
"This book provides a model for teaching computational thinking to middle and high school students across a broad range of school subjects"--OCLC-licensed vendor bibliographic record.
An exploration of the Dark Web--websites accessible only with special routing software--that examines the history of three anonymizing networks, Freenet, Tor, and I2P.OCLC-licensed vendor bibliographic record.
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach--the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump--makes headlines, in…
"Collection of arguments about STEM fields' blind spots in computing and a deliberately provocative underscoring of humanists' appeals for a "wake up call" in computing culture"--OCLC-licensed vendor bibliographic record.