Hackers and Computer Philosophy

Learn the philosophy of the computing world and meet the people who enjoy exploring the details of programmable systems and stretching their capabilities.

All categories

Books under this sub-category (16 books)

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion

Post date: 16 Mar 2016
Provides a unique and informative perspective from the computing industry's greatest minds. A insightful book that helps you understand computers and their impact on the world in a whole new way.
Publisher: Addison-Wesley Professional
Publication date: 16 Jun 2008
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported
Document Type: Book
 
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion

Post date: 16 Mar 2016
Provides a unique and informative perspective from the computing industry's greatest minds. A insightful book that helps you understand computers and their impact on the world in a whole new way.
Publisher: Addison-Wesley Professional
Publication date: 16 Jun 2008
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported Document Type: Book


Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Publication date: 01 Sep 2005
Document Type: Book
 
Handbook for Bloggers and Cyber-Dissidents

Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Publication date: 01 Sep 2005
Document Type: Book


ICT4D – Connecting People for a Better World

Post date: 12 Mar 2007
Offers some new and often surprising answers to the questions of wether information and communication technologies are effective instruments to improve lives OR just deepening already existing inequalities and divisions in the world.
Publisher: Swiss Agency for Development and Cooperation
Publication date: 31 Dec 2004
Document Type: Book
 
ICT4D – Connecting People for a Better World

ICT4D – Connecting People for a Better World

Post date: 12 Mar 2007
Offers some new and often surprising answers to the questions of wether information and communication technologies are effective instruments to improve lives OR just deepening already existing inequalities and divisions in the world.
Publisher: Swiss Agency for Development and Cooperation
Publication date: 31 Dec 2004
Document Type: Book


Invisible Engines

Post date: 04 Oct 2007
Examines the business dynamics and strategies used by firms that recognize the transformative power unleashed by the revolution of software platforms, a revolution that will change both new and old industries.
Publisher: The MIT Press
Publication date: 01 Oct 2006
 
Invisible Engines

Invisible Engines

Post date: 04 Oct 2007
Examines the business dynamics and strategies used by firms that recognize the transformative power unleashed by the revolution of software platforms, a revolution that will change both new and old industries.
Publisher: The MIT Press
Publication date: 01 Oct 2006


Moths to the Flame : The Seductions of Computer Technology

Post date: 28 Oct 2004
Addresses important issues concerning the role of computers on privacy, war, and poverty.
Publisher: The MIT Press
Publication date: 01 Aug 1996
Document Type: Book
 
Moths to the Flame : The Seductions of Computer Technology

Moths to the Flame : The Seductions of Computer Technology

Post date: 28 Oct 2004
Addresses important issues concerning the role of computers on privacy, war, and poverty.
Publisher: The MIT Press
Publication date: 01 Aug 1996
Document Type: Book


Online Privacy for Journalists

Post date: 29 Aug 2017
A must-have guide for journalism in 2017. Topics include how to protect your source and sensitive data, maintaining your anonymity online, and securing your emails.
Publisher: Self-publishing
Publication date: 31 Mar 2017
Document Type: Book
 
Online Privacy for Journalists

Online Privacy for Journalists

Post date: 29 Aug 2017
A must-have guide for journalism in 2017. Topics include how to protect your source and sensitive data, maintaining your anonymity online, and securing your emails.
Publisher: Self-publishing
Publication date: 31 Mar 2017
Document Type: Book


Open Access

Post date: 27 Oct 2016
A concise introduction to open access, covers what open access is and isn't, how it benefits authors and readers of research, how it has moved from the periphery to the mainstream, and what its future may hold.
Publisher: The MIT Press
Publication date: 01 Jul 2012
License: Creative Commons Attribution-NonCommercial 3.0 Unported
Document Type: Book
 
Open Access

Open Access

Post date: 27 Oct 2016
A concise introduction to open access, covers what open access is and isn't, how it benefits authors and readers of research, how it has moved from the periphery to the mainstream, and what its future may hold.
Publisher: The MIT Press
Publication date: 01 Jul 2012
License: Creative Commons Attribution-NonCommercial 3.0 Unported Document Type: Book


Privacy on the Line: The Politics of Wiretapping and Encryption

Post date: 15 Nov 2016
This book discusses the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated edition covers recent controversies over NSA spying and other government threats to communications privacy.
Publisher: The MIT Press
Publication date: 01 Feb 2010
License: Standard Copyright License
Document Type: Book
 
Privacy on the Line: The Politics of Wiretapping and Encryption

Privacy on the Line: The Politics of Wiretapping and Encryption

Post date: 15 Nov 2016
This book discusses the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated edition covers recent controversies over NSA spying and other government threats to communications privacy.
Publisher: The MIT Press
Publication date: 01 Feb 2010
License: Standard Copyright License Document Type: Book


Software and Mind: The Mechanistic Myth and Its Consequences

Post date: 17 Apr 2016
Addressing general readers as well as software practitioners, Software and Mind discusses the fallacies of the mechanistic ideology and the degradation of minds caused by these fallacies.
 
Software and Mind: The Mechanistic Myth and Its Consequences

Software and Mind: The Mechanistic Myth and Its Consequences

Post date: 17 Apr 2016
Addressing general readers as well as software practitioners, Software and Mind discusses the fallacies of the mechanistic ideology and the degradation of minds caused by these fallacies.

Taken Out of Context: American Teen Sociality in Networked Publics

Post date: 24 Mar 2009
This dissertation documents author's 2.5-year ethnographic study of American teens' engagement with social network sites.
Publication date: 01 Jan 2008
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported
Document Type: Thesis
 
Taken Out of Context: American Teen Sociality in Networked Publics

Taken Out of Context: American Teen Sociality in Networked Publics

Post date: 24 Mar 2009
This dissertation documents author's 2.5-year ethnographic study of American teens' engagement with social network sites.
Publication date: 01 Jan 2008
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported Document Type: Thesis


The Digital Person - Technology and Privacy in the Information Age

Post date: 28 Mar 2008
Aims to rethink longstanding notions of privacy to grapple with the consequences of living in an Information Age.
 
The Digital Person - Technology and Privacy in the Information Age

The Digital Person - Technology and Privacy in the Information Age

Post date: 28 Mar 2008
Aims to rethink longstanding notions of privacy to grapple with the consequences of living in an Information Age.

The Future Does Not Compute, Transcending the Machines in Our Midst

Post date: 28 Oct 2004
Reveals many reasons why we should not just accept the promises of a technological paradise without reflecting on its consequences.
Publisher: O’Reilly Media, Inc.
Publication date: 11 May 1995
 
The Future Does Not Compute, Transcending the Machines in Our Midst

The Future Does Not Compute, Transcending the Machines in Our Midst

Post date: 28 Oct 2004
Reveals many reasons why we should not just accept the promises of a technological paradise without reflecting on its consequences.
Publisher: O’Reilly Media, Inc.
Publication date: 11 May 1995


The Future of Reputation - Gossip, Rumor, and Privacy on the Internet

Post date: 28 Mar 2008
Shows how the free flow of information on the Internet can make us less free. Takes a journey through the ways in which private lives are being exposed online, and examines the implications.
 
The Future of Reputation - Gossip, Rumor, and Privacy on the Internet

The Future of Reputation - Gossip, Rumor, and Privacy on the Internet

Post date: 28 Mar 2008
Shows how the free flow of information on the Internet can make us less free. Takes a journey through the ways in which private lives are being exposed online, and examines the implications.

The Hacker Crackdown: Law and Disorder on the Electronic Frontier

Post date: 28 Oct 2004
A classic work highlights the 1990 assault on hackers, on the arrest of suspected illicit hackers and other computer-based law-breakers.
Publisher: Bantam Books Inc.
Publication date: 01 Nov 1993
 
The Hacker Crackdown: Law and Disorder on the Electronic Frontier

The Hacker Crackdown: Law and Disorder on the Electronic Frontier

Post date: 28 Oct 2004
A classic work highlights the 1990 assault on hackers, on the arrest of suspected illicit hackers and other computer-based law-breakers.
Publisher: Bantam Books Inc.
Publication date: 01 Nov 1993


Underground

Post date: 28 Oct 2004
A compelling true story of the rise of the computer underground and the crimes of an elite group of hackers who took on the forces of the establishment.
Publisher: Random House Australia
Publication date: 06 Jun 1997
Document Type: Book
 
Underground

Underground

Post date: 28 Oct 2004
A compelling true story of the rise of the computer underground and the crimes of an elite group of hackers who took on the forces of the establishment.
Publisher: Random House Australia
Publication date: 06 Jun 1997
Document Type: Book


Book Categories
Sponsors
Icons8, a free icon pack