Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Psychology (The Basics)

Buy
Internet Psychology (The Basics), 9781138656062 (1138656062), Routledge, 2017

We can't imagine our lives without the Internet. It is the tool of our existence; without it we couldn't work, plan our social and leisure activities, and interact with friends. The Internet’s influence on contemporary society extends across every aspect of our personal and professional lives, but how has this altered us in psychological terms? How are we to understand how the Internet can promote enormous amounts of caring and kindness to strangers and yet be the source of unremitting acts of terror?

This book, grounded in the latest cutting-edge research, enhances our understanding of how we, and our children, behave online. It explores questions such as:

  • Why does our self-control abandon us sometimes on the Internet?
  • Why does the Internet create a separate realm of social and personal relationships?
  • How does all that change us as people?
  • Are youngsters really as exposed and threatened on the web as people think?

Internet Psychology: The Basics is a vital and fascinating guide to the online world, drawing on classic theories of human behaviour to shed fresh light on this central facet of modern life. It argues that, even in an age of constant technological advancement, our understanding of the human psyche remains rooted in these well-established theories. Embracing both positive and negative aspects of Internet use, this easy introduction to the subject will appeal to students and general readers alike.

(HTML tags aren't allowed.)

Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...


Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)
Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)

Programming multi-core and many-core computing systems

Sabri Pllana, Linnaeus University, Sweden

Fatos Xhafa, Technical University of Catalonia, Spain

Provides state-of-the-art methods for programming multi-core and many-core systems

The book comprises a selection of twenty two...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy