0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (2)
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Digital Cash - The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency (Paperback): Finn... Digital Cash - The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency (Paperback)
Finn Brunton
R412 R386 Discovery Miles 3 860 Save R26 (6%) Ships in 18 - 22 working days

The fascinating untold story of digital cash and its creators-from experiments in the 1970s to the mania over Bitcoin and other cryptocurrencies Bitcoin may appear to be a revolutionary form of digital cash without precedent or prehistory. In fact, it is only the best-known recent experiment in a long line of similar efforts going back to the 1970s. But the story behind cryptocurrencies like Bitcoin and its blockchain technology has largely been untold-until now. In Digital Cash, Finn Brunton reveals how technological utopians and political radicals created experimental money to bring about their visions of the future: to protect privacy, bring down governments, prepare for apocalypse, or launch a civilization of innovation and abundance that would make its creators immortal. Filled with marvelous characters, stories, and ideas, Digital Cash is an engaging and accessible account of the strange origins and remarkable technologies behind today's cryptocurrency explosion.

Obfuscation - A User's Guide for Privacy and Protest (Paperback): Finn Brunton, Helen Nissenbaum Obfuscation - A User's Guide for Privacy and Protest (Paperback)
Finn Brunton, Helen Nissenbaum
R351 R325 Discovery Miles 3 250 Save R26 (7%) Ships in 18 - 22 working days

How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less-and why we should. With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance-the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage-especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it. Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users' search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.

Media Technologies - Essays on Communication, Materiality, and Society (Paperback): Tarleton Gillespie, Pablo J. Boczkowski,... Media Technologies - Essays on Communication, Materiality, and Society (Paperback)
Tarleton Gillespie, Pablo J. Boczkowski, Kirsten A. Foot; Contributions by Tarleton Gillespie, Pablo J. Boczkowski, …
R1,295 Discovery Miles 12 950 Ships in 18 - 22 working days

Scholars from communication and media studies join those from science and technology studies to examine media technologies as complex, sociomaterial phenomena. In recent years, scholarship around media technologies has finally shed the assumption that these technologies are separate from and powerfully determining of social life, looking at them instead as produced by and embedded in distinct social, cultural, and political practices. Communication and media scholars have increasingly taken theoretical perspectives originating in science and technology studies (STS), while some STS scholars interested in information technologies have linked their research to media studies inquiries into the symbolic dimensions of these tools. In this volume, scholars from both fields come together to advance this view of media technologies as complex sociomaterial phenomena. The contributors first address the relationship between materiality and mediation, considering such topics as the lived realities of network infrastructure. The contributors then highlight media technologies as always in motion, held together through the minute, unobserved work of many, including efforts to keep these technologies alive. Contributors Pablo J. Boczkowski, Geoffrey C. Bowker, Finn Brunton, Gabriella Coleman, Gregory J. Downey, Kirsten A. Foot, Tarleton Gillespie, Steven J. Jackson, Christopher M. Kelty, Leah A. Lievrouw, Sonia Livingstone, Ignacio Siles, Jonathan Sterne, Lucy Suchman, Fred Turner

Spam - A Shadow History of the Internet (Paperback): Finn Brunton Spam - A Shadow History of the Internet (Paperback)
Finn Brunton
R904 Discovery Miles 9 040 Ships in 18 - 22 working days

What spam is, how it works, and how it has shaped online communities and the Internet itself. The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms-spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Transcend 250GB 2.5" SATA Solid State…
R1,343 Discovery Miles 13 430
Karcher FP 303 - Floor Care For…
R349 Discovery Miles 3 490
Rotring A3 College Drawing Board
R1,679 R1,533 Discovery Miles 15 330
Digital Thermometer
 (5)
R124 Discovery Miles 1 240
Sunbeam Garment Steamer
R294 Discovery Miles 2 940
Ambulance
Jake Gyllenhaal, Yahya Abdul-Mateen II, … DVD  (1)
R260 Discovery Miles 2 600
Aluminum Ultra Light Hiking Trekking…
R189 R119 Discovery Miles 1 190
380GSM Golf Towel (30x50cm)(3 Piece)(Red…
Deepcool Z10 High Performance CPU…
R189 R118 Discovery Miles 1 180
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400

 

Partners