|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Neuroscience has begun to intrude deeply into what it means to be
human, an intrusion that offers profound benefits but will demolish
our present understanding of privacy. In Privacy in the Age of
Neuroscience, David Grant argues that we need to reconceptualize
privacy in a manner that will allow us to reap the rewards of
neuroscience while still protecting our privacy and, ultimately,
our humanity. Grant delves into our relationship with technology,
the latest in what he describes as a historical series of
'magnitudes', following Deity, the State and the Market, proposing
the idea that, for this new magnitude (Technology), we must control
rather than be subjected to it. In this provocative work, Grant
unveils a radical account of privacy and an equally radical
proposal to create the social infrastructure we need to support it.
Neuroscience has begun to intrude deeply into what it means to be
human, an intrusion that offers profound benefits but will demolish
our present understanding of privacy. In Privacy in the Age of
Neuroscience, David Grant argues that we need to reconceptualize
privacy in a manner that will allow us to reap the rewards of
neuroscience while still protecting our privacy and, ultimately,
our humanity. Grant delves into our relationship with technology,
the latest in what he describes as a historical series of
'magnitudes', following Deity, the State and the Market, proposing
the idea that, for this new magnitude (Technology), we must control
rather than be subjected to it. In this provocative work, Grant
unveils a radical account of privacy and an equally radical
proposal to create the social infrastructure we need to support it.
The path forward to rein in online surveillance, AI, and tech monopolies.
Technology is a gift and a curse. The five Big Tech companies―Meta, Apple, Amazon, Microsoft, and Google―have built innovative products that improve many aspects of our lives. But their intrusiveness and our dependence on them have created pressing threats to our civil rights, economy, and democracy.
Coming from an extensive background building Silicon Valley-based tech startups, Tom Kemp eloquently and precisely weaves together the threats posed by Big Tech:
- the overcollection and weaponization of our most sensitive data
- the problematic ways Big Tech uses AI to process and act upon our data
- the stifling of competition and entrepreneurship due to Big Tech's dominant market position
This richly detailed book exposes the consequences of Big Tech's digital surveillance, exploitative use of AI, and monopolistic and anticompetitive practices. It offers actionable solutions to these problems and a clear path forward for individuals and policymakers to advocate for change. By containing the excesses of Big Tech, we will ensure our civil rights are respected and preserved, our economy is competitive, and our democracy is protected.
Networks powered by algorithms are pervasive. Major contemporary
technology trends - Internet of Things, Big Data, Digital Platform
Power, Blockchain, and the Algorithmic Society - are manifestations
of this phenomenon. The internet, which once seemed an unambiguous
benefit to society, is now the basis for invasions of privacy,
massive concentrations of power, and wide-scale manipulation. The
algorithmic networked world poses deep questions about power,
freedom, fairness, and human agency. The influential 1997 Federal
Communications Commission whitepaper "Digital Tornado" hailed the
"endless spiral of connectivity" that would transform society, and
today, little remains untouched by digital connectivity. Yet
fundamental questions remain unresolved, and even more serious
challenges have emerged. This important collection, which offers a
reckoning and a foretelling, features leading technology scholars
who explain the legal, business, ethical, technical, and public
policy challenges of building pervasive networks and algorithms for
the benefit of humanity. This title is also available as Open
Access on Cambridge Core.
Google is the most popular search engine ever created, but Google's
search capabilities are so powerful, they sometimes discover
content that no one ever intended to be publicly available on the
Web, including social security numbers, credit card numbers, trade
secrets, and federally classified documents. Google Hacking for
Penetration Testers, Third Edition, shows you how security
professionals and system administratord manipulate Google to find
this sensitive information and "self-police" their own
organizations. You will learn how Google Maps and Google Earth
provide pinpoint military accuracy, see how bad guys can manipulate
Google to create super worms, and see how they can "mash up" Google
with Facebook, LinkedIn, and more for passive reconnaissance. This
third edition includes completely updated content throughout and
all new hacks such as Google scripting and using Google hacking
with other search engines and APIs. Noted author Johnny Long,
founder of Hackers for Charity, gives you all the tools you need to
conduct the ultimate open source reconnaissance and penetration
testing.
Handbook of IoT and Blockchain: Methods, solutions, and Recent
Advancements includes contributions from around the globe on recent
advances and findings in the domain of Internet of Things (IoT) and
Blockchain. Chapters include theoretical analysis, practical
implications, and extensive surveys with analysis on methods,
algorithms, and processes for new product development. IoT and
Blockchain are the emerging topics in the current manufacturing
scenario.This handbook includes recent advances; showcases the work
of research around the globe; offers theoretical analysis and
practical implications; presents extensive surveys with analysis,
new contributions, and proposals on methods, algorithms, and
processes; and also covers recent advances from quantitative and
qualitative articles, case studies, conceptual works, and
theoretical backing. This handbook will be of interest to graduate
students, researchers, academicians, institutions, and
professionals that are interested in exploring the areas of IoT and
Blockchain.
Discover how the internals of malware work and how you can analyze
and detect it. You will learn not only how to analyze and reverse
malware, but also how to classify and categorize it, giving you
insight into the intent of the malware. Malware Analysis and
Detection Engineering is a one-stop guide to malware analysis that
simplifies the topic by teaching you undocumented tricks used by
analysts in the industry. You will be able to extend your expertise
to analyze and reverse the challenges that malicious software
throws at you. The book starts with an introduction to malware
analysis and reverse engineering to provide insight on the
different types of malware and also the terminology used in the
anti-malware industry. You will know how to set up an isolated lab
environment to safely execute and analyze malware. You will learn
about malware packing, code injection, and process hollowing plus
how to analyze, reverse, classify, and categorize malware using
static and dynamic tools. You will be able to automate your malware
analysis process by exploring detection tools to modify and trace
malware programs, including sandboxes, IDS/IPS, anti-virus, and
Windows binary instrumentation. The book provides comprehensive
content in combination with hands-on exercises to help you dig into
the details of malware dissection, giving you the confidence to
tackle malware that enters your environment. What You Will Learn
Analyze, dissect, reverse engineer, and classify malware
Effectively handle malware with custom packers and compilers Unpack
complex malware to locate vital malware components and decipher
their intent Use various static and dynamic malware analysis tools
Leverage the internals of various detection engineering tools to
improve your workflow Write Snort rules and learn to use them with
Suricata IDS Who This Book Is For Security professionals, malware
analysts, SOC analysts, incident responders, detection engineers,
reverse engineers, and network security engineers "This book is a
beast! If you're looking to master the ever-widening field of
malware analysis, look no further. This is the definitive guide for
you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and
ZeroDayInitiative
People increasingly live online, sharing publicly what might have
once seemed private, but at the same time are enraged by extremes
of government surveillance and the corresponding invasion into our
private lives. In this enlightening work, Adam Henschke re-examines
privacy and property in the age of surveillance in order to
understand not only the importance of these social conventions, but
also their moral relevance. By analyzing identity and information,
and presenting a case for a relation between the two, he explains
the moral importance of virtual identities and offers an ethically
robust solution to designing surveillance technologies. This book
should be read by anyone interested in surveillance technology, new
information technology more generally, and social concepts like
privacy and property.
|
You may like...
Mechatronics '98
J. Adolfsson, J. Karlsen
Hardcover
R6,769
Discovery Miles 67 690
|