11,99 €
inkl. MwSt.
Versandfertig in über 4 Wochen
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
A detailed disassembly manual for people who want to dismantle Big Tech
Andere Kunden interessierten sich auch für
- Michael ChertoffExploding Data14,99 €
- Naomi KleinDoppelganger9,99 €
- Kai StrittmatterWe Have Been Harmonized27,99 €
- Evgeny MorozovTo Save Everything, Click Here16,99 €
- Christopher HitchensThe Trial of Henry Kissinger17,99 €
- Sensing In/Security: Sensors as Transnational Security Infrastructures24,99 €
- Mike ZajkoTelecom Tensions: Internet Service Providers and Public Policy in Canada39,99 €
-
-
-
Produktdetails
- Produktdetails
- Verlag: Verso Books
- Seitenzahl: 192
- Erscheinungstermin: 3. September 2024
- Englisch
- Abmessung: 198mm x 129mm x 14mm
- Gewicht: 367g
- ISBN-13: 9781804292143
- ISBN-10: 1804292141
- Artikelnr.: 69644551
- Verlag: Verso Books
- Seitenzahl: 192
- Erscheinungstermin: 3. September 2024
- Englisch
- Abmessung: 198mm x 129mm x 14mm
- Gewicht: 367g
- ISBN-13: 9781804292143
- ISBN-10: 1804292141
- Artikelnr.: 69644551
Cory Doctorow is a science fiction author, activist and journalist. He is the author of many books, most recently RADICALIZED and WALKAWAY, science fiction for adults; HOW TO DESTROY SURVEILLANCE CAPITALISM, nonfiction about monopoly and conspiracy; IN REAL LIFE, a graphic novel; and the picture book POESY THE MONSTER SLAYER. His latest book is ATTACK SURFACE, a standalone adult sequel to LITTLE BROTHER. In 2020, he was inducted into the Canadian Science Fiction and Fantasy Hall of Fame. He works for the Electronic Frontier Foundation, is a MIT Media Lab Research Affiliate, is a Visiting Professor of Computer Science at Open University, a Visiting Professor of Practice at the University of North Carolina’s School of Library and Information Science and co-founded the UK Open Rights Group.
Introduction
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index
Introduction
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index
PART I. SEIZE THE MEANS OF COMPUTATION
1. How Big Tech Got Big
2. Network Effects vs. Switching Costs
3. Copyright Wars, Cybercrime, Terrorism, Human Trafficking and Other Gifts
to Big Tech
4. Interop: From Computer Science to the Real World
5. Standards and Mandates: What’s Behind the Shield of Boringness?
6. Adversarial Interop: Guerrilla Warfare and Reverse Engineering
7. Jam Tomorrow: Life after We Seize the Means of Computation
8. Jam Today: How We’ll Get There
PART II. WHAT ABOUT
9. What about Privacy?
10. What about Harassment?
11. What about Algorithmic Radicalization?
12. What about Child Sexual Abuse Material, Nonconsensual Pornography and
Terrorist Materials?
13. What about Warranties?
14. What about Poor Countries?
15. What about Blockchain?
Further Reading, Listening and Viewing
Index