Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Technological Turf Wars: A Case Study of the Computer Antivirus Industry

Buy
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems articulated by computer antivirus industry professionals affect technological security. It analyzes the tensions and political dilemmas at the heart of the interrelationships among science, technology, and society.

All technologies involve ‘scripts’. A computer virus is a metaphor that generates images of global viral epidemics and outbreaks, of infectious code reeking havoc on personal computers and global information networks, and of machines that no longer respond to or are under our control. The reality of infected computers generates an entire industry seemingly dedicated to protecting computers and their users from infection, and disinfecting those that succumb. Indeed, those who work within the antivirus industry perpetuate this scripted imagery, and consider themselves part of a security force that polices the ‘dark alleys’ of the ‘information superhighway’.
(HTML tags aren't allowed.)

Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook (2nd Edition)

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series...

Anatomical Terms and their Derivation
Anatomical Terms and their Derivation

Anatomical terms are the vocabulary of medicine. Anatomy began as a descriptive science in the days when Latin was the universal scientific language. Early anatomists described the structures they saw in that language, comparing them to common and familiar objects, or borrowing terms from the Greek and Arabic masters before them. In anatomic...

WordPress 3 Complete
WordPress 3 Complete

WordPress 3 Complete begins from scratch, starting with how to install WordPress, all the way to the most advanced topics such as creating your own themes, writing plugins, and including custom post types in your website. Starting with downloading and installing the core WordPress software, you will take a detailed look at WordPress settings...


Encryption for Digital Content (Advances in Information Security)
Encryption for Digital Content (Advances in Information Security)

Encryption for Digital Content is an area in cryptography that is widely used in commercial productions (e.g., Blu-Ray and HD-DVDs). This book provides a comprehensive mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. A complete description of...

Switching to the Mac: The Missing Manual, Lion Edition
Switching to the Mac: The Missing Manual, Lion Edition
What’s going on with the Mac these days?

Apple was the only computer company whose sales actually increased during the recession. The Mac’s market share has quadrupled since 2005—it’s now around 20 percent of computer sales in the U.S. And then there’s the most
...
Java(TM) Programming: From Problem Analysis to Program Design
Java(TM) Programming: From Problem Analysis to Program Design

Welcome to Java Programming: From Problem Analysis to Program Design, Fifth Edition. Designed for a first Computer Science (CS1) Java course, this text will provide a breath of fresh air to you and your students. The CS1 course serves as the cornerstone of the Computer Science curriculum. My primary goal is to motivate and excite all...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy