12,99 €
inkl. MwSt.
Sofort lieferbar
6 °P sammeln
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This isn't a book for people who want to fix Big Tech. It's a detailed disassembly manual for people who want to dismantle it.
Andere Kunden interessierten sich auch für
- Nicole AschoffThe Smartphone Society: Technology, Power, and Resistance in the New Gilded Age16,99 €
- Stuart SumnerYou: For Sale25,99 €
- Evgeny MorozovTo Save Everything, Click Here10,99 €
- Barton GellmanDark Mirror23,99 €
- Huib ModderkolkDer digitale Weltkrieg, den keiner bemerkt22,00 €
- Peter S. GoodmanDavos Man27,99 €
- Martin AndreeBig Tech muss weg!25,00 €
-
-
-
This isn't a book for people who want to fix Big Tech. It's a detailed disassembly manual for people who want to dismantle it.
Produktdetails
- Produktdetails
- Verlag: Verso
- Artikelnr. des Verlages: 9341
- Seitenzahl: 184
- Erscheinungstermin: 5. September 2023
- Englisch
- Abmessung: 213mm x 141mm x 18mm
- Gewicht: 288g
- ISBN-13: 9781804291245
- ISBN-10: 1804291242
- Artikelnr.: 65593740
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Verso
- Artikelnr. des Verlages: 9341
- Seitenzahl: 184
- Erscheinungstermin: 5. September 2023
- Englisch
- Abmessung: 213mm x 141mm x 18mm
- Gewicht: 288g
- ISBN-13: 9781804291245
- ISBN-10: 1804291242
- Artikelnr.: 65593740
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Cory Doctorow is a science fiction author, activist and journalist. He is the author of many books, most recently RADICALIZED and WALKAWAY, science fiction for adults; HOW TO DESTROY SURVEILLANCE CAPITALISM, nonfiction about monopoly and conspiracy; IN REAL LIFE, a graphic novel; and the picture book POESY THE MONSTER SLAYER. His latest book is ATTACK SURFACE, a standalone adult sequel to LITTLE BROTHER. In 2020, he was inducted into the Canadian Science Fiction and Fantasy Hall of Fame. He works for the Electronic Frontier Foundation, is a MIT Media Lab Research Affiliate, is a Visiting Professor of Computer Science at Open University, a Visiting Professor of Practice at the University of North Carolina's School of Library and Information Science and co-founded the UK Open Rights Group.
Introduction
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index
Introduction
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index