Understanding the Digital World

What You Need to Know about Computers, the Internet, Privacy, and Security

Author: Brian W. Kernighan

Publisher: Princeton University Press

ISBN: 1400884802

Category: Computers

Page: 256

View: 8936

DOWNLOAD NOW »

The basics of how computer hardware, software, and systems work, and the risks they create for our privacy and security Computers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks and advertisers know far more about us than we should be comfortable with, using information we freely give them. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world? Understanding the Digital World explains how computer hardware, software, networks, and systems work. Topics include how computers are built and how they compute; what programming is and why it is difficult; how the Internet and the web operate; and how all of these affect our security, privacy, property, and other important social, political, and economic issues. This book also touches on fundamental ideas from computer science and some of the inherent limitations of computers. It includes numerous color illustrations, notes on sources for further exploration, and a glossary to explain technical terms and buzzwords. Understanding the Digital World is a must-read for all who want to know more about computers and communications. It explains, precisely and carefully, not only how they operate but also how they influence our daily lives, in terms anyone can understand, no matter what their experience and knowledge of technology.

Millions, Billions, Zillions

Defending Yourself in a World of Too Many Numbers

Author: Brian W. Kernighan

Publisher: Princeton University Press

ISBN: 0691190135

Category: Mathematics

Page: N.A

View: 6046

DOWNLOAD NOW »

An essential guide to recognizing bogus numbers and misleading data Numbers are often intimidating, confusing, and even deliberately deceptive—especially when they are really big. The media loves to report on millions, billions, and trillions, but frequently makes basic mistakes or presents such numbers in misleading ways. And misunderstanding numbers can have serious consequences, since they can deceive us in many of our most important decisions, including how to vote, what to buy, and whether to make a financial investment. In this short, accessible, enlightening, and entertaining book, leading computer scientist Brian Kernighan teaches anyone—even diehard math-phobes—how to demystify the numbers that assault us every day. With examples drawn from a rich variety of sources, including journalism, advertising, and politics, Kernighan demonstrates how numbers can mislead and misrepresent. In chapters covering big numbers, units, dimensions, and more, he lays bare everything from deceptive graphs to speciously precise numbers. And he shows how anyone—using a few basic ideas and lots of shortcuts—can easily learn to recognize common mistakes, determine whether numbers are credible, and make their own sensible estimates when needed. Giving you the simple tools you need to avoid being fooled by dubious numbers, Millions, Billions, Zillions is an essential survival guide for a world drowning in big—and often bad—data.

Understanding the Digital World

What You Need to Know about Computers, the Internet, Privacy, and Security

Author: Brian W. Kernighan

Publisher: N.A

ISBN: 9780691176543

Category: Computers

Page: 256

View: 2388

DOWNLOAD NOW »

Computers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks and advertisers know far more about us than we should be comfortable with, using information we freely give them. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world? Understanding the Digital World explains how computer hardware, software, networks, and systems work. Topics include how computers are built and how they compute; what programming is and why it is difficult; how the Internet and the web operate; and how all of these affect our security, privacy, property, and other important social, political, and economic issues. This book also touches on fundamental ideas from computer science and some of the inherent limitations of computers. It includes numerous color illustrations, notes on sources for further exploration, and a glossary to explain technical terms and buzzwords. Understanding the Digital World is a must-read for all who want to know more about computers and communications. It explains, precisely and carefully, not only how they operate but also how they influence our daily lives, in terms anyone can understand, no matter what their experience and knowledge of technology.

Thinking Security

Stopping Next Year's Hackers

Author: Steven M. Bellovin

Publisher: Addison-Wesley Professional

ISBN: 0134278232

Category: Computers

Page: 400

View: 8605

DOWNLOAD NOW »

If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk than ever, and even the world’s most security-focused organizations are being victimized by massive attacks. In Thinking Security, author Steven M. Bellovin provides a new way to think about security. As one of the world’s most respected security experts, Bellovin helps you gain new clarity about what you’re doing and why you’re doing it. He helps you understand security as a systems problem, including the role of the all-important human element, and shows you how to match your countermeasures to actual threats. You’ll learn how to move beyond last year’s checklists at a time when technology is changing so rapidly. You’ll also understand how to design security architectures that don’t just prevent attacks wherever possible, but also deal with the consequences of failures. And, within the context of your coherent architecture, you’ll learn how to decide when to invest in a new security product and when not to. Bellovin, co-author of the best-selling Firewalls and Internet Security, caught his first hackers in 1971. Drawing on his deep experience, he shares actionable, up-to-date guidance on issues ranging from SSO and federated authentication to BYOD, virtualization, and cloud security. Perfect security is impossible. Nevertheless, it’s possible to build and operate security systems far more effectively. Thinking Security will help you do just that.

Unauthorized Access

The Crisis in Online Privacy and Security

Author: Robert H. Sloan,Richard Warner

Publisher: CRC Press

ISBN: 1439830142

Category: Computers

Page: 398

View: 4674

DOWNLOAD NOW »

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors—two renowned experts on computer security and law—explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.

D Is for Digital

What a Well-informed Person Should Know About Computers and Communications

Author: Brian W. Kernighan

Publisher: Createspace Independent Publishing Platform

ISBN: 9781530896363

Category:

Page: 256

View: 1118

DOWNLOAD NOW »

This book explains hardware, software and communications, precisely and carefully but in terms that anyone can understand, no matter what their experience and knowledge of technology.

The Parent's Guide to Texting, Facebook, and Social Media

Understanding the Benefits and Dangers of Parenting in a Digital World

Author: Shawn Marie Edgington

Publisher: N.A

ISBN: 9781934812976

Category: Reference

Page: 188

View: 1264

DOWNLOAD NOW »

The parent's guide provides awareness, solutions, and preventative resources to keep your children safe and secure online--P. [4] of cover.

What School Leaders Need to Know About Digital Technologies and Social Media

Author: Scott McLeod,Chris Lehmann

Publisher: John Wiley & Sons

ISBN: 1118022246

Category: Education

Page: 214

View: 4026

DOWNLOAD NOW »

Facebook, Twitter, Google . . . today's tech-savvy students are always plugged in. However, all too often their teachers and administrators aren't experienced in the use of these familiar digital tools. If schools are to prepare students for the future, administrators and educators must harness the power of digital technologies and social media. With contributions from authorities on the topic of educational technology, What School Leaders Need to Know About Digital Technologies and Social Media is a compendium of the most useful tools for any education setting. Throughout the book, experts including Will Richardson, Vicki Davis, Sheryl Nussbaum-Beach, Richard Byrne, Joyce Valenza, and many others explain how administrators and teachers can best integrate technology into schools, helping to make sense of the often-confusing world of social media and digital tools. They offer the most current information for the educational use of blogs, wikis and podcasts, online learning, open-source courseware, educational gaming, social networking, online mind mapping, mobile phones, and more, and include examples of these methods currently at work in schools. As the book clearly illustrates, when these tools are combined with thoughtful and deliberate pedagogical practice, it can create a transformative experience for students, educators, and administrators alike. What School Leaders Need to Know About Digital Technologies and Social Media reveals the power of information technology and social networks in the classroom and throughout the education community.

The Shallows: What the Internet Is Doing to Our Brains

Author: Nicholas Carr

Publisher: W. W. Norton & Company

ISBN: 9780393079364

Category: Science

Page: 256

View: 9524

DOWNLOAD NOW »

Finalist for the 2011 Pulitzer Prize in General Nonfiction: “Nicholas Carr has written a Silent Spring for the literary mind.”—Michael Agger, Slate “Is Google making us stupid?” When Nicholas Carr posed that question, in a celebrated Atlantic Monthly cover story, he tapped into a well of anxiety about how the Internet is changing us. He also crystallized one of the most important debates of our time: As we enjoy the Net’s bounties, are we sacrificing our ability to read and think deeply? Now, Carr expands his argument into the most compelling exploration of the Internet’s intellectual and cultural consequences yet published. As he describes how human thought has been shaped through the centuries by “tools of the mind”—from the alphabet to maps, to the printing press, the clock, and the computer—Carr interweaves a fascinating account of recent discoveries in neuroscience by such pioneers as Michael Merzenich and Eric Kandel. Our brains, the historical and scientific evidence reveals, change in response to our experiences. The technologies we use to find, store, and share information can literally reroute our neural pathways. Building on the insights of thinkers from Plato to McLuhan, Carr makes a convincing case that every information technology carries an intellectual ethic—a set of assumptions about the nature of knowledge and intelligence. He explains how the printed book served to focus our attention, promoting deep and creative thought. In stark contrast, the Internet encourages the rapid, distracted sampling of small bits of information from many sources. Its ethic is that of the industrialist, an ethic of speed and efficiency, of optimized production and consumption—and now the Net is remaking us in its own image. We are becoming ever more adept at scanning and skimming, but what we are losing is our capacity for concentration, contemplation, and reflection. Part intellectual history, part popular science, and part cultural criticism, The Shallows sparkles with memorable vignettes—Friedrich Nietzsche wrestling with a typewriter, Sigmund Freud dissecting the brains of sea creatures, Nathaniel Hawthorne contemplating the thunderous approach of a steam locomotive—even as it plumbs profound questions about the state of our modern psyche. This is a book that will forever alter the way we think about media and our minds.

Dragnet Nation

A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Author: Julia Angwin

Publisher: Macmillan

ISBN: 0805098070

Category: Business & Economics

Page: 289

View: 4603

DOWNLOAD NOW »

An investigative journalist offers a revealing look at the surveillance economy in America that captures what citizens actions online and off, putting individual freedoms at risk and discusses results from a number of experiments she conducted to try and protect herself.

Future Crimes

Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

Author: Marc Goodman

Publisher: Anchor

ISBN: 0385539010

Category: Technology & Engineering

Page: 464

View: 4050

DOWNLOAD NOW »

NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015 One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined. Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services. Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders. With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment. Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late. From the Hardcover edition.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Author: Bruce Schneier

Publisher: W. W. Norton & Company

ISBN: 0393244822

Category: Computers

Page: 320

View: 3832

DOWNLOAD NOW »

“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky “Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Worm

The First Digital World War

Author: Mark Bowden

Publisher: Grove/Atlantic, Inc.

ISBN: 0802195121

Category: Political Science

Page: 288

View: 4120

DOWNLOAD NOW »

From the bestselling author of Black Hawk Down, the gripping story of the Conficker worm—the cyberattack that nearly toppled the world. The Conficker worm infected its first computer in November 2008, and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks—including British Parliament and the French and German military—became infected almost instantaneously. No one had ever seen anything like it. By January 2009, the worm lay hidden in at least eight million computers, and the botnet of linked computers it had created was big enough that an attack might crash the world. In this “masterpiece” (The Philadelphia Inquirer), Mark Bowden expertly lays out a spellbinding tale of how hackers, researchers, millionaire Internet entrepreneurs, and computer security experts found themselves drawn into a battle between those determined to exploit the Internet and those committed to protecting it.

Blown to Bits

Your Life, Liberty, and Happiness After the Digital Explosion

Author: Harold Abelson,Ken Ledeen,Harry R. Lewis

Publisher: Addison-Wesley Professional

ISBN: 0137135599

Category: Computers

Page: 366

View: 7904

DOWNLOAD NOW »

Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can't escape this explosion of digital information and few of us want to-the benefits are too seductive. The technology has enabled unprecedented innovation, collaboration, entertainment, and democratic participation. But the same engineering marvels are shattering centuries-old assumptions about privacy, identity, free expression, and personal control as more and more details of our lives are captured as digital data. Can you control who sees all that personal information about you? Can email be truly confidential, when nothing seems to be private? Shouldn't the Internet be censored the way radio and TV are? is it really a federal crime to download music? When you use Google or Yahoo! to search for something, how do they decide which sites to show you? Do you still have free speech in the digital world? Do you have a voice in shaping government or corporate policies about any of this? Blown to Bits offers provocative answers to these questions and tells intriguing real-life stories. This book is a wake-up call To The human consequences of the digital explosion.

The Future of Foreign Intelligence

Privacy and Surveillance in a Digital Age

Author: Laura K. Donohue

Publisher: Oxford University Press

ISBN: 0190235403

Category: Law

Page: 224

View: 4698

DOWNLOAD NOW »

Since the Revolutionary War, America's military and political leaders have recognized that U.S. national security depends upon the collection of intelligence. Absent information about foreign threats, the thinking went, the country and its citizens stood in great peril. To address this, the Courts and Congress have historically given the President broad leeway to obtain foreign intelligence. But in order to find information about an individual in the United States, the executive branch had to demonstrate that the person was an agent of a foreign power. Today, that barrier no longer exists. The intelligence community now collects massive amounts of data and then looks for potential threats to the United States. As renowned national security law scholar Laura K. Donohue explains in The Future of Foreign Intelligence, global communications systems and digital technologies have changed our lives in countless ways. But they have also contributed to a worrying transformation. Together with statutory alterations instituted in the wake of 9/11, and secret legal interpretations that have only recently become public, new and emerging technologies have radically expanded the amount and type of information that the government collects about U.S. citizens. Traditionally, for national security, the Courts have allowed weaker Fourth Amendment standards for search and seizure than those that mark criminal law. Information that is being collected for foreign intelligence purposes, though, is now being used for criminal prosecution. The expansion in the government's acquisition of private information, and the convergence between national security and criminal law threaten individual liberty. Donohue traces the evolution of U.S. foreign intelligence law and pairs it with the progress of Fourth Amendment jurisprudence. She argues that the bulk collection programs instituted by the National Security Agency amount to a general warrant, the prevention of which was the reason the Founders introduced the Fourth Amendment. The expansion of foreign intelligence surveillanceleant momentum by advances in technology, the Global War on Terror, and the emphasis on securing the homelandnow threatens to consume protections essential to privacy, which is a necessary component of a healthy democracy. Donohue offers a road map for reining in the national security state's expansive reach, arguing for a judicial re-evaluation of third party doctrine and statutory reform that will force the executive branch to take privacy seriously, even as Congress provides for the collection of intelligence central to U.S. national security. Alarming and penetrating, this is essential reading for anyone interested in the future of foreign intelligence and privacy in the United States.

Exploding Data

Reclaiming Our Cyber Security in the Digital Age

Author: Michael Chertoff

Publisher: Atlantic Monthly Press

ISBN: 0802165788

Category: Political Science

Page: 288

View: 5557

DOWNLOAD NOW »

The most dangerous threat we—individually and as a society and country—face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack. In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data—more widespread by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.

Click Here to Kill Everybody: Security and Survival in a Hyper-connected World

Author: Bruce Schneier

Publisher: W. W. Norton & Company

ISBN: 0393608891

Category: Computers

Page: 288

View: 2813

DOWNLOAD NOW »

A world of "smart" devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers—from home thermostats to chemical plants—are all online. The Internet, once a virtual abstraction, can now sense and touch the physical world. As we open our lives to this future, often called the Internet of Things, we are beginning to see its enormous potential in ideas like driverless cars, smart cities, and personal agents equipped with their own behavioral algorithms. But every knife cuts two ways. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality. After exploring the full implications of a world populated by hyperconnected devices, Schneier reveals the hidden web of technical, political, and market forces that underpin the pervasive insecurities of today. He then offers common-sense choices for companies, governments, and individuals that can allow us to enjoy the benefits of this omnipotent age without falling prey to its vulnerabilities. From principles for a more resilient Internet of Things, to a recipe for sane government regulation and oversight, to a better way to understand a truly new environment, Schneier’s vision is required reading for anyone invested in human flourishing.

Parenting for the Digital Age

The Truth Behind Media's Effect on Children and What to Do About It

Author: Bill Ratner

Publisher: Familius

ISBN: 1939629004

Category: Family & Relationships

Page: N.A

View: 1828

DOWNLOAD NOW »

From how to deal with cyberbullying to the strange, true stories behind Barbie and G.I. Joe, media insider Bill Ratner takes an inside look at our wired-up world in a fascinating book—part memoir, part parenting guide—for the digital age. Landing his first job in advertising at age fourteen, Ratner learned early that the media doesn't necessarily have our best interests at heart. His career as one of America’s most popular voiceover artists and his life as a parent and educator gives readers a first-hand look at the effects of digital media on children and what you can do about it.

The Digital Person

Technology and Privacy in the Information Age

Author: Daniel J Solove

Publisher: NYU Press

ISBN: 0814740375

Category: Computers

Page: 283

View: 900

DOWNLOAD NOW »

In a revealing study of how digital dossiers are created (usually without our knowledge), the author argues that we must rethink our understanding of what privacy is and what it means in the digital age, and then reform the laws that define and regulate it. Reprint.

Secrets and Lies

Digital Security in a Networked World

Author: Bruce Schneier

Publisher: John Wiley & Sons

ISBN: 1118082273

Category: Computers

Page: 448

View: 9337

DOWNLOAD NOW »

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. * Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs * Explains what cryptography can and can't do in achieving digital security