Listing 1 - 10 of 65 | << page >> |
Sort by
|
Choose an application
When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media – music, videos, games, and software – before their official sale date and then racing against one another to release the material for free.Warez: The Infrastructure and Aesthetics of Piracy is the first scholarly research book about this underground subculture, which began life in the pre-internet era Bulletin Board Systems and moved to internet File Transfer Protocol servers (“topsites”) in the mid- to late-1990s. The “Scene,” as it is known, is highly illegal in almost every aspect of its operations. The term “Warez” itself refers to pirated media, a derivative of “software.” Taking a deep dive in the documentary evidence produced by the Scene itself, Warez describes the operations and infrastructures an underground culture with its own norms and rules of participation, its own forms of sociality, and its own artistic forms. Even though forms of digital piracy are often framed within ideological terms of equal access to knowledge and culture, Eve uncovers in the Warez Scene a culture of competitive ranking and one-upmanship that is at odds with the often communalist interpretations of piracy.Broad in scope and novel in its approach, Warez is indispensible reading for anyone interested in recent developments in digital culture, access to knowledge and culture, and the infrastructures that support our digital age.
Choose an application
When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media – music, videos, games, and software – before their official sale date and then racing against one another to release the material for free.Warez: The Infrastructure and Aesthetics of Piracy is the first scholarly research book about this underground subculture, which began life in the pre-internet era Bulletin Board Systems and moved to internet File Transfer Protocol servers (“topsites”) in the mid- to late-1990s. The “Scene,” as it is known, is highly illegal in almost every aspect of its operations. The term “Warez” itself refers to pirated media, a derivative of “software.” Taking a deep dive in the documentary evidence produced by the Scene itself, Warez describes the operations and infrastructures an underground culture with its own norms and rules of participation, its own forms of sociality, and its own artistic forms. Even though forms of digital piracy are often framed within ideological terms of equal access to knowledge and culture, Eve uncovers in the Warez Scene a culture of competitive ranking and one-upmanship that is at odds with the often communalist interpretations of piracy.Broad in scope and novel in its approach, Warez is indispensible reading for anyone interested in recent developments in digital culture, access to knowledge and culture, and the infrastructures that support our digital age.
Choose an application
Systems integration --- Systems integration. --- information systems --- software engineering --- web applications --- internet security --- knowledge management --- Computer. Automation
Choose an application
When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media – music, videos, games, and software – before their official sale date and then racing against one another to release the material for free.Warez: The Infrastructure and Aesthetics of Piracy is the first scholarly research book about this underground subculture, which began life in the pre-internet era Bulletin Board Systems and moved to internet File Transfer Protocol servers (“topsites”) in the mid- to late-1990s. The “Scene,” as it is known, is highly illegal in almost every aspect of its operations. The term “Warez” itself refers to pirated media, a derivative of “software.” Taking a deep dive in the documentary evidence produced by the Scene itself, Warez describes the operations and infrastructures an underground culture with its own norms and rules of participation, its own forms of sociality, and its own artistic forms. Even though forms of digital piracy are often framed within ideological terms of equal access to knowledge and culture, Eve uncovers in the Warez Scene a culture of competitive ranking and one-upmanship that is at odds with the often communalist interpretations of piracy.Broad in scope and novel in its approach, Warez is indispensible reading for anyone interested in recent developments in digital culture, access to knowledge and culture, and the infrastructures that support our digital age.
Choose an application
"A trade book on the economics of the internet and the policies that have shaped our view of online activity"--
Choose an application
Choose an application
Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Sécurité informatique --- Computer networks --- Internet --- Security measures --- Computer networks - Security measures --- Internet - Security measures
Choose an application
Choose an application
Secret service --- Internet --- Computer crimes --- Service secret --- Criminalité informatique --- Délits par ordinateur --- Business intelligence --- Computer security --- Information superhighway --- Intelligence service --- World Wide Web --- Security measures --- Information superhighway - Security measures --- Internet - Security measures --- World Wide Web - Security measures
Choose an application
Claudia Eckert beschreibt hier systematisch, welche Aspekte bei der Planung sicherer informationstechnischer Systeme eine Rolle spielen und welche verschiedenen Ansätze verfolgt werden können. Sie stellt die Verfahren und Protokolle, die zur Umsetzung der Sicherheitsanforderungen benötigt werden, detailliert vor und erläutert sie anhand von Fallbeispielen. Ein Muss für jeden, der sich mit der hochaktuellen Problematik "IT-Sicherheit" beschäftigt.
Information technology --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Risk management. --- Security measures. --- Cloud computing --- Information technology. --- Electronic data processing --- Web services --- Distributed processing --- Internet, security models, network security, protocols, IT systems.
Listing 1 - 10 of 65 | << page >> |
Sort by
|