Book picks similar to
Extreme Privacy: What It Takes to Disappear by Michael Bazzell
privacy
nonfiction
non-fiction
tech
Silicon Values: The Future of Free Speech Under Surveillance Capitalism
Jillian York - 2021
From the online calls to arms in the thick of the Arab Spring to the contemporary front line of misinformation, Jillian York charts the war over our digital rights. She looks at both how the big corporations have become unaccountable censors, and the devastating impact it has had on those who have been censored.In Silicon Values, leading campaigner Jillian York, looks at how our rights have become increasingly undermined by the major corporations desire to harvest our personal data and turn it into profit. She also looks at how governments have used the same technology to monitor citizens and threatened our ability to communicate. As a result our daily lives, and private thoughts, are being policed in an unprecedented manner. Who decides the difference between political debate and hate speech? How does this impact on our identity, our ability to create communities and to protest? Who regulates the censors? In response to this threat to our democracy, York proposes a user-powered movement against the platforms that demands change and a new form of ownership over our own data.
Deep Fakes and the Infocalypse: What You Urgently Need To Know
Nina Schick - 2020
When combined with powerful voice AI, the results are utterly convincing.So-called 'Deep Fakes' are not only a real threat for democracy but they take the manipulation of voters to new levels. They will also affect ordinary people. This crisis of misinformation we are facing has been dubbed the 'Infocalypse'.Using her expertise from working in the field, Nina Schick reveals shocking examples of Deep Fakery and explains the dangerous political consequences of the Infocalypse, both in terms of national security and what it means for public trust in politics. She also unveils what it means for us as individuals, how Deep Fakes will be used to intimidate and to silence, for revenge and fraud, and how unprepared governments and tech companies are.As a political advisor to select technology firms, Schick tells us what we need to do to prepare and protect ourselves. Too often we build the cool technology and ignore what bad guys can do with it before we start playing catch-up. But when it comes to Deep Fakes, we urgently need to be on the front foot.
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
Al Sweigart - 2014
But what if you could have your computer do them for you?In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple filesCreate, update, move, and rename files and foldersSearch the Web and download online contentUpdate and format data in Excel spreadsheets of any sizeSplit, merge, watermark, and encrypt PDFsSend reminder emails and text notificationsFill out online formsStep-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks.Don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work. Learn how in "Automate the Boring Stuff with Python.""
Infinite Reality: Avatars, Eternal Life, New Worlds, and the Dawn of the Virtual Revolution
Jim Blascovich - 2011
Infinite Reality is the straight dope on what is and isn’t happening to us right now, from two of the only scientists working on the boundaries between real life and its virtual extensions.”—Douglas Rushkoff, author of Program or Be ProgrammedHow achievable are the virtual experiences seen in The Matrix, Tron, and James Cameron’s Avatar? Do our brains know where “reality” ends and “virtual” begins? In Infinite Reality, Jim Blascovich and Jeremy Bailenson, two pioneering experts in the field of virtual reality, reveal how the human brain behaves in virtual environments and examine where radical new developments in digital technology will lead us in five, fifty, and five hundred years.
Total Workday Control Using Microsoft Outlook
Michael Linenberger - 2005
Outlook 2007 and 2003 are also covered. This seminal guide presents the author's best practices of time, task, and e-mail management, drawing from time management theories and applying these best practices in Microsoft Outlook. Anyone who finds they are overburdened by e-mail or working too late each day will benefit from this book.
The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
Adam Segal - 2016
Nation-states wielded military force, financial pressure, and diplomatic persuasion to create “world order.” Even after the end of the Cold War, the elements comprising world order remained essentially unchanged.But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation “Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.
Introducing Windows Server 2012
Mitch Tulloch - 2012
This practical introduction illuminates new features and capabilities, with scenarios demonstrating how the platform can meet the needs of your business.Based on beta software, this book provides the early, high-level information you need to begin preparing now for deployment and management. Topics include:Virtualization and cloud solutions Availability Provisioning and storage management Security and scalability Infrastructure options Server administration