Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hactivism and Cyberwars: Rebels with a Cause

Buy
This detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics describes the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. The authors provide an explanation of the different strands of hacktivism ranging from such avant garde groups as the Electronic Disturbance Theatre to more virtually-focused groups labelled "the digitally correct". The full social and historical context of hacktivism is portrayed to take into account its position in terms of new social movements, direct action, and its contribution to the anti-globalization debate. This book provides an important corrective flip-side to mainstream accounts of E-commerce and broadens the conceptualization of the internet to take into full account the other side of the digital divide.

About the Author

Tim Jordan is lecturer in sociology at the Open University. His books include Cyberpower (1999) and Activism! (2002). Paul Taylor is a senior lecturer in Communication Studies at the University of Leeds. His previous publications include Hackers (1999).
(HTML tags aren't allowed.)

The Innovation and Evolution of Medical Devices: Vaginal Mesh Kits
The Innovation and Evolution of Medical Devices: Vaginal Mesh Kits
This text provides a central resource for physicians, entrepreneurs, and the MBA students about how innovation occurs in medical device industry.  The book uses the rise and fall of vaginal mesh kits to highlight the evolution of responses by the physicians, patients and the regulatory bodies.  There are specific chapters...
Klimt (Mega Square Collection)
Klimt (Mega Square Collection)
Gustav Klimt first made himself known by the decorations he executed (with his brother and their art school companion F. Matsch), for numerous theatres and above all (on his own this time) for the Kunsthistorisches Museum in Vienna, where he completed, in a coolly photographic style, the work begun by Makart. At the age of thirty he moved into...
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...

Linux Firewalls (3rd Edition)
Linux Firewalls (3rd Edition)
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most...
Device Modeling for Analog and RF CMOS Circuit Design
Device Modeling for Analog and RF CMOS Circuit Design
In order to keep up with global demand, microelectronics engineers are continually challenged to produce increasingly complex, high performance integrated circuits. The steady downscaling of MOSFET/CMOS technology has highlighted the need for a thorough understanding of the properties, potentials and limitations of the latest device models and...
Meet the iPad 2
Meet the iPad 2

Given Apple’s advertising budget and ubiquitous ads, plus an enormous amount of media attention, it’s still difficult to determine just what an iPad is. Is it a media player or a business machine? Does it replace a laptop? There are other tablet computers on the market, as well as “netbooks” that act like...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy