Résultats de recherche de titre
Articles 121 à 140 sur 45881
The idealist: Aaron Swartz and the rise of free culture on the Internet
Par Justin Peters. 2016
Journalist examines the life and advocacy of Aaron Swartz (1986-2013), the history and future of copyright, data curation and archiving…
in the Internet age, the open access movement, and laws related to telecommunications and intellectual property. Discusses the at times competing philosophies behind these constructs. 2016Cyberphobia: identity, trust, security and the Internet
Par Edward Lucas. 2015
Senior editor at the Economist examines the culture surrounding cybercrimes--crimes involving computers--in the early twenty-first century. Topics include hackers, identity…
theft, corporate and political warfare using computers, the darknet where illegal and morally questionable transactions occur, and how to understand and protect oneself against these risks in everyday life. 2015The smart girl's guide to privacy: practical tips for staying safe online
Par Violet Blue. 2015
Investigative journalist discusses the hidden dangers in social media, dating websites, and apps that predators use to target women. Demonstrates…
how to protect yourself from identity theft and online stalkers, how to create safe profiles and block trackers, and more. Some strong language. For senior high and older readers. 2015You're never weird on the Internet (almost): a memoir
Par Felicia Day. 2015
Memoir of an actress who made her name with the web series she created about gamers called The Guild. She…
shares stories of her awkward childhood, her experiences as an actress, and how she turned her love of video gaming into a successful career. Some strong language. Bestseller. 2015After Snowden: privacy, secrecy, and security in the information age
Par Barry Siegel, Jon Mills, Ronald Goldfarb, Hodding Carter III, Edward Wasserman, Tom Blanton, David D. Cole. 2015
Collection of six essays analyzing questions raised in the fallout of government surveillance revelations exposed by Edward Snowden. Topics include…
the role of the press, national security in the twenty-first century, consequences of revealing confidential information, responsibility for determination of state secrets, and more. 2015The dark net: inside the digital underworld
Par Jamie Bartlett. 2015
Technology academic and columnist explores areas of the Internet that are havens for questionable activities. Examines the growth of the…
Internet from its earliest days, types of personalities who benefit from anonymity, and how the Internet is used outside the public eye. Strong language and some descriptions of sex. 2014El arte de la quietud: la aventura de no ir a ninguna parte (Ted books)
Par Pico Iyer. 2015
El periodista y cronista de viajes Pico Iyer explora los beneficios de la desconexión, de apreciar dónde estas, y de…
ser tranquilo. Analizando las vidas de personalidades tan disímiles como Gandhi, Proust, y Leonard Cohen, Iyer revela cómo la quietud puede despertar la creatividad y aliviar el estrésMedia literacy series (Media literacy)
Par Megan Fromm. 2015
Six books featuring topics in media literacy. Discusses how to navigate and analyze information in the digital age. Includes Accuracy…
in Media, Digital Content Creation, Ethics and Digital Citizenship, Gathering and Sharing Digital Information, How Policy and Profit Shape Content, and Privacy and Digital Security. For junior and senior high readers. 2015Internet: edición 2015 (Informática para mayores)
Par Ana Martos Rubio. 2015
Editor-in-chief of Truthdig Robert Scheer discusses the widespread surveillance of the general public conducted by corporations and government agencies and…
condemns the erosion of privacy rights. He argues that the information revolution, despite its positive elements, contains the seeds of freedom's destruction in the form of a surveillance state. 2015Los innovadores: los genios que inventaron el futuro
Par Walter Isaacson. 2014
Author of Steve Jobs: La Biografia (DB 72993) chronicles the development of the digital age and the personalities involved. Proceeds…
from the 1833 meeting of Lady Ada Lovelace--sometimes described as the world's first computer programmer--and Charles Babbage--pioneer inventor of complex mechanical calculators--to the computer Watson's winning Jeopardy! in 2011. Spanish language. 2014Alan Turing: the enigma : the book that inspired the film The imitation game
Par Andrew Hodges. 2014
Examination of the life of mathematician Turing (1912-1954). Discusses his early studies in math and sciences, the development of his…
sexuality (for which he would stand trial in 1952), and his work on breaking the Germans' Enigma code during World War II. Basis for the Oscar-nominated movie The Imitation Game. Bestseller. 1983Data and Goliath: the hidden battles to collect your data and control your world
Par Bruce Schneier. 2015
Computer security expert details the state of data analysis in the twenty-first century, including the ways it is generated and…
collected, as well as how to protect it. He examines the entities collecting data, the ways data is analyzed, and the predictions it can make. 2015Newsmakers: Microsoft Founder and Philanthropist (Newsmakers)
Par Marylou Morano Kjelle. 2015
Eight books featuring newsworthy individuals. Includes: Bill Gates, Jeff Bezos, Malala Yousafzai, Mark Zuckerberg, Nelson Mandela, Pope Francis, Steve Jobs,…
and Vladimir Putin. The series covers their contributions to society as well as controversies. Questions to promote critical thinking are provided. For grades 4-7 and older readers. 2015Culture crash: the killing of the creative class
Par Scott Timberg. 2015
Journalist examines the effects of pervasive digital technology and attendant economic developments on the arts in the twenty-first century. Laments…
the decline of vibrant local cultural scenes. Discusses negative consequences for the creation of art in the first place, the disappearance of physical spaces that foster creativity, and future prospects. 2015@WAR: the rise of the military-Internet complex
Par Shane Harris. 2014
Journalist Shane Harris delves into the technologically-focused side of modern warfare. The "fifth domain" of warfare has found a home…
in United States defense agencies, many of whom employ teams of hackers against enemy targets. Cybersecurity and the use of data mining from tech giants like Google and Facebook are also discussed. 2014To build and retain business, Caesars Entertainment in Las Vegas mines customer data, tracking what customers like to play, what…
foods they enjoy, when they prefer to visit, and more. Many companies have adopted this model to remain competitive, but Tanner examines both the benefits and the destructive nature of this practice. 2014The Internet is Not the Answer
Par Andrew Keen. 2015
Columnist examines the negative effects of the Internet, from its inception in the 1960s with ARPANET to the twenty-first century.…
Examines business interests involved in the Internet's development, the Net's uses in military and government surveillance programs, and the culture of Silicon Valley,2015The innovators: how a group of hackers, geniuses, and geeks created the digital revolution
Par Walter Isaacson. 2014
Author of Steve Jobs (DB 73682) chronicles the development of the digital age and the personalities involved. Proceeds from the…
1833 meeting of Lady Ada Lovelace--sometimes described as the world's first computer programmer--and Charles Babbage--pioneer inventor of complex mechanical calculators--to the computer Watson winning Jeopardy! in 2011. 2014Investigative journalist for Forbes profiles well-known information activists of the early twenty-first century, including Julian Assange, founder of WikiLeaks; Bradley…
Manning; and Daniel Domscheit-Berg, founder of OpenLeaks. Examines the culture of politically motivated computer hackers. 2012