Book picks similar to
The Ethics of Information by Luciano Floridi
philosophy
technology
social-theory
book-collection
Steps to an Ecology of Mind: Collected Essays in Anthropology, Psychiatry, Evolution, and Epistemology
Gregory Bateson - 1972
With a new foreword by his daughter Mary Katherine Bateson, this classic anthology of his major work will continue to delight and inform generations of readers. "This collection amounts to a retrospective exhibition of a working life. . . . Bateson has come to this position during a career that carried him not only into anthropology, for which he was first trained, but into psychiatry, genetics, and communication theory. . . . He . . . examines the nature of the mind, seeing it not as a nebulous something, somehow lodged somewhere in the body of each man, but as a network of interactions relating the individual with his society and his species and with the universe at large."—D. W. Harding, New York Review of Books "[Bateson's] view of the world, of science, of culture, and of man is vast and challenging. His efforts at synthesis are tantalizingly and cryptically suggestive. . . .This is a book we should all read and ponder."—Roger Keesing, American Anthropologist
The Social Life of Information
John Seely Brown - 2000
John Seely Brown and Paul Duguid argue that the gap between digerati hype and end-user gloom is largely due to the "tunnel vision" that information-driven technologies breed. We've become so focused on where we think we ought to be--a place where technology empowers individuals and obliterates social organizations--that we often fail to see where we're really going.The Social Life of Information shows us how to look beyond our obsession with information and individuals to include the critical social networks of which these are always a part.
How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics
N. Katherine Hayles - 1999
While some marvel at these changes, envisioning consciousness downloaded into a computer or humans "beamed" Star Trek-style, others view them with horror, seeing monsters brooding in the machines. In How We Became Posthuman, N. Katherine Hayles separates hype from fact, investigating the fate of embodiment in an information age.Hayles relates three interwoven stories: how information lost its body, that is, how it came to be conceptualized as an entity separate from the material forms that carry it; the cultural and technological construction of the cyborg; and the dismantling of the liberal humanist "subject" in cybernetic discourse, along with the emergence of the "posthuman."Ranging widely across the history of technology, cultural studies, and literary criticism, Hayles shows what had to be erased, forgotten, and elided to conceive of information as a disembodied entity. Thus she moves from the post-World War II Macy Conferences on cybernetics to the 1952 novel Limbo by cybernetics aficionado Bernard Wolfe; from the concept of self-making to Philip K. Dick's literary explorations of hallucination and reality; and from artificial life to postmodern novels exploring the implications of seeing humans as cybernetic systems.Although becoming posthuman can be nightmarish, Hayles shows how it can also be liberating. From the birth of cybernetics to artificial life, How We Became Posthuman provides an indispensable account of how we arrived in our virtual age, and of where we might go from here.
Learn Brazilian Portuguese - Word Power 101
Innovative Language - 2011
This e-book is a completely new way to learn Brazilian Portuguese vocabulary fast - and for free! Start speaking Brazilian Portuguese in minutes with the powerful learning methods you will master in this book.The vocabulary words you’ll find in Learn BrazilianPortuguese - Word Power 101 were hand selected by our Brazilian Portuguese language teachers as the top 101 most frequently used words in the Brazilian Portuguese language. With each entry, you’ll see the word and a vibrant image to help remember the meaning. You’ll hear the word (separate free download) to master the pronunciation. Then you’ll see how the word is actually used in everyday speech with sample sentences and phrases. Learning Brazilian Portuguese vocabulary has never been easier!In this book, you’ll get: - 101 of the most frequently used Brazilian Portuguese vocabulary words - Audio with authentic native Brazilian Portuguese pronunciation *Supplementary mp3 audio files are a separate download - Vibrant photos and images to help memorization - Useful and practical sample sentences and phrases Purchase Learn BrazilianPortuguese - Word Power 101 today to start mastering Brazilian Portuguese vocabulary in the fastest, easiest and most fun way possible!
Ethics in the Real World: 86 Brief Essays on Things that Matter
Peter Singer - 2016
He is also one of its most controversial. The author of important books such as Animal Liberation, Practical Ethics, Rethinking Life and Death, and The Life You Can Save, he helped launch the animal rights and effective altruism movements and contributed to the development of bioethics. Now, in Ethics in the Real World, Singer shows that he is also a master at dissecting important current events in a few hundred words.In this book of brief essays, he applies his controversial ways of thinking to issues like climate change, extreme poverty, animals, abortion, euthanasia, human genetic selection, sports doping, the sale of kidneys, the ethics of high-priced art, and ways of increasing happiness. Singer asks whether chimpanzees are people, smoking should be outlawed, or consensual sex between adult siblings should be decriminalized, and he reiterates his case against the idea that all human life is sacred, applying his arguments to some recent cases in the news. In addition, he explores, in an easily accessible form, some of the deepest philosophical questions, such as whether anything really matters and what is the value of the pale blue dot that is our planet. The collection also includes some more personal reflections, like Singer’s thoughts on one of his favorite activities, surfing, and an unusual suggestion for starting a family conversation over a holiday feast.Provocative and original, these essays will challenge—and possibly change—your beliefs about a wide range of real-world ethical questions.
The Four-Dimensional Human: Ways of Being in the Digital World
Laurence Scott - 2015
We are increasingly coaxed from the third-dimensional containment of our pre-digital selves into a wonderful and eerie fourth dimension, a world of ceaseless communication, instant information and global connection.Our portals to this new world have been wedged open, and the silhouette of a figure is slowly taking shape. But what does it feel like to be four-dimensional? How do digital technologies influence the rhythms of our thoughts, the style and tilt of our consciousness? What new sensitivities and sensibilities are emerging with our exposure to the delights, sorrows and anxieties of a networked world? And how do we live in public, with these recoded private lives?Tackling ideas of time, space, isolation, silence and threat – how our modern-day anxieties manifest online – and moving from Hamlet to the ghosts of social media, from Seinfeld to the fall of Gaddafi, from Twitter art to Oedipus, The Four-Dimensional Human is a highly original and pioneering portrait of life in a digital landscape.
Windows 7 Inside Out
Ed Bott - 2009
It's all muscle and no fluff. Discover how the experts tackle Windows 7--and challenge yourself to new levels of mastery! Compare features and capabilities in each edition of Windows 7.Configure and customize your system with advanced setup options.Manage files, folders, and media libraries.Set up a wired or wireless network and manage shared resources.Administer accounts, passwords, and logons--and help control access to resources.Configure Internet Explorer 8 settings and security zones.Master security essentials to help protect against viruses, worms, and spyware.Troubleshoot errors and fine-tune performance.Automate routine maintenance with scripts and other tools. CD includes: Fully searchable eBookDownloadable gadgets and other tools for customizing Windows 7Insights direct from the product team on the official Windows 7 blogLinks to the latest security updates and products, demos, blogs, and user communities For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
The Black Box Society: The Secret Algorithms That Control Money and Information
Frank Pasquale - 2014
The data compiled and portraits created are incredibly detailed, to the point of being invasive. But who connects the dots about what firms are doing with this information? The Black Box Society argues that we all need to be able to do so--and to set limits on how big data affects our lives.Hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only scratched the surface of this troubling behavior.Frank Pasquale exposes how powerful interests abuse secrecy for profit and explains ways to rein them in. Demanding transparency is only the first step. An intelligible society would assure that key decisions of its most important firms are fair, nondiscriminatory, and open to criticism. Silicon Valley and Wall Street need to accept as much accountability as they impose on others.
Free: The Future of a Radical Price
Chris Anderson - 2009
Reveals how to run an online business profitably in spite of the Internet's inherently free culture, disseminating the principles of a ''priceless economy'' in six categories that pertain to advertising, labor exchange, and advanced-version fees.
News Reporting and Writing
Brian S. Brooks - 2005
Effectively combining their knowledge as practicing journalists and experienced instructors, The Missouri Group teaches students the reporting and writing skills they need to become effective journalists. This edition includes new coverage of online journalism, public relations writing, and the many uses of new technology in the classroom and at work.
R for Data Science: Import, Tidy, Transform, Visualize, and Model Data
Hadley Wickham - 2016
This book introduces you to R, RStudio, and the tidyverse, a collection of R packages designed to work together to make data science fast, fluent, and fun. Suitable for readers with no previous programming experience, R for Data Science is designed to get you doing data science as quickly as possible.
Authors Hadley Wickham and Garrett Grolemund guide you through the steps of importing, wrangling, exploring, and modeling your data and communicating the results. You’ll get a complete, big-picture understanding of the data science cycle, along with basic tools you need to manage the details. Each section of the book is paired with exercises to help you practice what you’ve learned along the way.
You’ll learn how to:
Wrangle—transform your datasets into a form convenient for analysis
Program—learn powerful R tools for solving data problems with greater clarity and ease
Explore—examine your data, generate hypotheses, and quickly test them
Model—provide a low-dimensional summary that captures true "signals" in your dataset
Communicate—learn R Markdown for integrating prose, code, and results
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Learning SQL
Alan Beaulieu - 2005
If you're working with a relational database--whether you're writing applications, performing administrative tasks, or generating reports--you need to know how to interact with your data. Even if you are using a tool that generates SQL for you, such as a reporting tool, there may still be cases where you need to bypass the automatic generation feature and write your own SQL statements.To help you attain this fundamental SQL knowledge, look to "Learning SQL," an introductory guide to SQL, designed primarily for developers just cutting their teeth on the language."Learning SQL" moves you quickly through the basics and then on to some of the more commonly used advanced features. Among the topics discussed: The history of the computerized databaseSQL Data Statements--those used to create, manipulate, and retrieve data stored in your database; example statements include select, update, insert, and deleteSQL Schema Statements--those used to create database objects, such as tables, indexes, and constraintsHow data sets can interact with queriesThe importance of subqueriesData conversion and manipulation via SQL's built-in functionsHow conditional logic can be used in Data StatementsBest of all, "Learning SQL" talks to you in a real-world manner, discussing various platform differences that you're likely to encounter and offering a series of chapter exercises that walk you through the learning process. Whenever possible, the book sticks to the features included in the ANSI SQL standards. This means you'll be able to apply what you learn to any of several different databases; the book covers MySQL, Microsoft SQL Server, and Oracle Database, but the features and syntax should apply just as well (perhaps with some tweaking) to IBM DB2, Sybase Adaptive Server, and PostgreSQL.Put the power and flexibility of SQL to work. With "Learning SQL" you can master this important skill and know that the SQL statements you write are indeed correct.
Visions: How Science Will Revolutionize the 21st Century
Michio Kaku - 1997
We will no longer be passive bystanders to the dance of the universe, but will become creative choreographers of matter, life, and intelligence.The first section of Visions presents a shocking look at a cyber-world infiltrated by millions of tiny intelligence systems. Part two illustrates how the decoding of DNA's genetic structure will allow humans the "godlike ability to manipulate life almost at will." Finally, VISIONS focuses on the future of quantum physics, in which physicists will perfect new ways to manipulate matter and harness the cosmic energy of the universe.What makes Michio Kaku's vision of the science of the future so compelling--and so different from the mere forecasts of most thinkers--is that it is based on the groundbreaking research taking place in labs today, as well as the consensus of over 150 of Kaku's scientific colleagues. Science, for all its breathtaking change, evolves slowly; we can accurately predict, asserts Kaku, what the direction of science will be, based on the paths that are being forged today.A thrilling, unique narrative that brings together the thinking of many of the world's most accomplished scientists to explore the world of the future, Visions is science writing at its best.
Incognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online
Rob Robideau - 2013
With laws getting stricter by the day and making it more and more difficult to properly protect your personal information, you need the most up-to-date information and tools available and that's what you will find in Incognito Toolkit! Don't let snoopers, investigators, and scammers look over your shoulder or track you while you work and play on the internet! Learn about the tools that will help you use the internet anonymously, privately, and securely to protect assets, avoid social stigmas, and make you safer. This book is full of information that large corporations, scammers, and nosy governments don't want you to find! You won't find a collection of techniques and creative methods like this anywhere else! Covered in Incognito Toolkit: - Making truly anonymous online purchases - Shortcomings of Bitcoin - Encrypting communications - Encryption for online file storage solutions - Locking down and monitoring your hardware - Browser Fingerprinting - Using TOR and VPNs - Creative Text and File Steganography Techniques - Critical Techniques for Publishing Anonymously - Cleaning photo and video metadata - Dealing with tracking cookies Updated December 4th, 2013 with new information about credit card skimmers, TOR hardware devices, and more!
Scroll up and click the "Look Inside" feature on the top left hand side of the page!