dimanche 30 décembre 2012

Das Grobetae Computerbuch fur Dummies

Das Grobetae
Das Grobetae Computerbuch fur Dummies
Dan Gookin (Auteur), Brad Hill (Auteur), John R. Levine (Auteur), Margaret Levine Young (Auteur), Carol Baroudi (Auteur), Andy Rathbone (Auteur), Peter Weverka (Auteur)

Acheter neuf : EUR 28,25 (as of 12/30/2012 14:29 PST)
5 neuf & d'occasion a partir de EUR 27,13 (as of 12/30/2012 14:29 PST)

(Consultez la liste Cadeaux les plus offerts dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Code version 2.0

Code version
Code version 2.0
Lawrence Lessig (Auteur)

Download : EUR 2,68 (as of 12/30/2012 02:12 PST)

(Consultez la liste Meilleures ventes Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Description du produit

The "alarming and impassioned"* book on how the Internet is redefining constitutional law, now reissued as the first popular book revised online by its readers (*New York Times) There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's) control. Code, first published in 2000, argues that this belief is wrong. It is not in the nature of cyberspace to be unregulable; cyberspace has no "nature." It only has code-the software and hardware that make cyberspace what it is. That code can create a place of freedom-as the original architecture of the Net did-or a place of oppressive control. Under the influence of commerce, cyberpsace is becoming a highly regulable space, where behavior is much more tightly controlled than in real space. But that's not inevitable either. We can-we must-choose what kind of cyberspace we want and what freedoms we will guarantee. These choices are all about architecture: about what kind of code will govern cyberspace, and who will control it. In this realm, code is the most significant form of law, and it is up to lawyers, policymakers, and especially citizens to decide what values that code embodies. Since its original publication, this seminal book has earned the status of a minor classic. This second edition, or Version 2.0, has been prepared through the author's wiki, a web site that allows readers to edit the text, making this the first reader-edited revision of a popular book.

samedi 29 décembre 2012

Interception of Communications: Code of Practice: A Consultation Paper

Interception of Communications
Interception of Communications: Code of Practice: A Consultation Paper
Home Office (Auteur)

Acheter neuf : EUR 5,13 (as of 12/29/2012 14:54 PST)
6 neuf & d'occasion a partir de EUR 5,13 (as of 12/29/2012 14:54 PST)

(Consultez la liste Cadeaux les plus demandes dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Reinventing Peacekeeping in Africa: Conceptual and Legal Issues in Ecomog Operations

Reinventing Peacekeeping in Africa
Reinventing Peacekeeping in Africa: Conceptual and Legal Issues in Ecomog Operations
Funmi Olonisakin (Auteur)

Acheter neuf : EUR 76,59 (as of 12/29/2012 03:45 PST)
5 neuf & d'occasion a partir de EUR 68,04 (as of 12/29/2012 03:45 PST)

(Consultez la liste Cadeaux les plus offerts dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Description du produit

The euphoric cries of a peaceful and more dynamic `new world order', which followed the end of the Cold War have been silenced by the increased intensity of local conflicts around the world. The humanitarian crises resulting from these conflicts have attracted greater international attention. Perhaps even more tragic is the failure of the international community to find early effective response to these conflicts, which have profound security implications for the affected regions and have led to the collapse of state structures in some cases. The intra-state conflicts in Africa alone have claimed over one million lives since 1990. On the international scene these internal conflicts have created new challenges for the UN, whose efforts at dealing with them have produced mixed results, whilst international policy makers, the military and academics are faced with difficult questions. Can traditional peacekeeping be stretched to accommodate this class of conflict? What is the legal basis for these operations? Attempts to answer these questions at the conceptual level have led to the development of concepts such as second generation peacekeeping, wider peacekeeping, peace support operations and strategic peacekeeping. It has emerged that there is no common view on an effective and realistic set of tools to manage these crises. Perhaps the most significant point to arise from the differing conceptual views presently is that an effective approach and sound legal basis have not been found for dealing with recalcitrant internal conflicts in far away regions, which are not high on the strategic considerations of the great powers. This book reconsiders the role of the UN and regional organisations such as ECOWAS in Africa. It examines the response to the civil war in Liberia, which served as a precursor to the international response to the crisis in Sierra Leone. On the one hand, this book offers an analysis of a new conceptual framework for managing a specific class of violent conflict. On the other hand, it provides first hand account of the character of a force that attempted to apply this approach. In drawing some of its conclusions, the book relies on the testimonies of many of the soldiers who formed the core of the military operations in these difficult conflict areas in West Africa.

vendredi 28 décembre 2012

Homerecording Fur Dummies

Homerecording Fur
Homerecording Fur Dummies
Jeff Strong (Auteur), Gerhard Franken (Traduction)

Acheter neuf : EUR 28,25 (as of 12/28/2012 15:26 PST)
19 neuf & d'occasion a partir de EUR 18,45 (as of 12/28/2012 15:26 PST)

(Consultez la liste Meilleures ventes Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Key Element Guide Itil Continual Service Improvement: Aligned to the 2011 Editions

Key Element Guide Itil Continual Service Improvement
Key Element Guide Itil Continual Service Improvement: Aligned to the 2011 Editions
Vernon Lloyd (Auteur), Great Britain: Cabinet Office (Auteur)

Acheter neuf : EUR 12,69 (as of 12/28/2012 03:40 PST)
5 neuf & d'occasion a partir de EUR 8,52 (as of 12/28/2012 03:40 PST)

(Consultez la liste Meilleures ventes Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

jeudi 27 décembre 2012

The Regulation of Investigatory Powers (Directed Surveillance and Covert Human Intelligence Sources) (Amendment) Order 2012

The Regulation
The Regulation of Investigatory Powers (Directed Surveillance and Covert Human Intelligence Sources) (Amendment) Order 2012
Great Britain (Auteur)

Acheter neuf : EUR 5,19 (as of 12/27/2012 17:02 PST)

(Consultez la liste Cadeaux les plus demandes dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Access Controlled
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Miklos Haraszti (Preface), Ronald J. Deibert (Sous la direction de), John G. Palfrey (Sous la direction de), Rafal Rohozinski (Sous la direction de), Jonathan L. Zittrain (Sous la direction de)

Acheter neuf : EUR 20,73 (as of 12/27/2012 04:09 PST)
27 neuf & d'occasion a partir de EUR 13,15 (as of 12/27/2012 04:09 PST)

(Consultez la liste Cadeaux les plus offerts dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Description du produit

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall of China" is one of the first national Internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the Internet's infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies. Access Controlled reports on this new normative terrain. The book, a project from the OpenNet Initiative (ONI), a collaboration of the Citizen Lab at the University of Toronto's Munk Centre for International Studies, Harvard's Berkman Center for Internet and Society, and the SecDev Group, offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods.

mercredi 26 décembre 2012

Delete: The Virtue of Forgetting in the Digital Age (New in Paper)

Delete
Delete: The Virtue of Forgetting in the Digital Age (New in Paper)
Viktor Mayer-Schonberger (Auteur)

Download : EUR 10,38 (as of 12/26/2012 16:38 PST)

(Consultez la liste Meilleures ventes Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Patent Law for Computer Scientists: Steps to Protect Computer-Implemented Inventions

Patent Law for Computer Scientists
Patent Law for Computer Scientists: Steps to Protect Computer-Implemented Inventions
Daniel Closa (Auteur), Alex Gardiner (Auteur), Falk Giemsa (Auteur), Jorg Machek (Auteur)

Acheter neuf : EUR 47,56 EUR 44,85 (as of 12/26/2012 08:08 PST)
19 neuf & d'occasion a partir de EUR 33,74 (as of 12/26/2012 08:08 PST)

(Consultez la liste Meilleures ventes Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

mardi 25 décembre 2012

The Offensive Internet: Privacy, Speech, and Reputation

The Offensive Internet
The Offensive Internet: Privacy, Speech, and Reputation
Saul Levmore (Sous la direction de), Martha C. Nussbaum (Sous la direction de)

Acheter neuf : EUR 22,76 (as of 12/25/2012 21:52 PST)
21 neuf & d'occasion a partir de EUR 18,90 (as of 12/25/2012 21:52 PST)

(Consultez la liste Cadeaux les plus demandes dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Description du produit

The Internet has been romanticized as a zone of freedom. The alluring combination of sophisticated technology with low barriers to entry and instantaneous outreach to millions of users has mesmerized libertarians and communitarians alike. Lawmakers have joined the celebration, passing the Communications Decency Act, which enables Internet Service Providers to allow unregulated discourse without danger of liability, all in the name of enhancing freedom of speech. But an unregulated Internet is a breeding ground for offensive conduct. At last we have a book that begins to focus on abuses made possible by anonymity, freedom from liability, and lack of oversight. The distinguished scholars assembled in this volume, drawn from law and philosophy, connect the absence of legal oversight with harassment and discrimination. Questioning the simplistic notion that abusive speech and mobocracy are the inevitable outcomes of new technology, they argue that current misuse is the outgrowth of social, technological, and legal choices. Seeing this clearly will help us to be better informed about our options. In a field still dominated by a frontier perspective, this book has the potential to be a real game changer. Armed with example after example of harassment in Internet chat rooms and forums, the authors detail some of the vile and hateful speech that the current combination of law and technology has bred. The facts are then treated to analysis and policy prescriptions. Read this book and you will never again see the Internet through rose-colored glasses.

The Legal Challenges of Cybersecurity

The Legal
The Legal Challenges of Cybersecurity
Tim Mishago (Auteur)

Download : EUR 8,01 (as of 12/25/2012 09:19 PST)

(Consultez la liste Meilleures ventes Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Eu Internet Law

Eu Internet
Eu Internet Law
Andrej Savin (Auteur)

Acheter neuf : EUR 93,48 (as of 12/25/2012 00:20 PST)

(Consultez la liste Meilleures ventes Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

lundi 24 décembre 2012

Safeguards in a World of Ambient Intelligence

Safeguards in
Safeguards in a World of Ambient Intelligence
David Wright (Sous la direction de), Serge Gutwirth (Sous la direction de), Michael Friedewald (Sous la direction de), Elena Vildjiounaite (Sous la direction de), Yves Punie (Sous la direction de)

Acheter neuf : EUR 154,60 EUR 148,53 (as of 12/24/2012 10:00 PST)
23 neuf & d'occasion a partir de EUR 89,80 (as of 12/24/2012 10:00 PST)

(Consultez la liste Cadeaux les plus demandes dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

dimanche 23 décembre 2012

Code: Version 2.0

Code
Code: Version 2.0
Lawrence Lessig (Auteur)

Acheter neuf : EUR 14,33 (as of 12/23/2012 22:49 PST)
16 neuf & d'occasion a partir de EUR 10,57 (as of 12/23/2012 22:49 PST)

(Consultez la liste Meilleures ventes Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Description du produit

"Now available for the first time in the UK, this is the "alarming and impassioned" book on how the Internet is redefining constitutional law. This updated edition is the first popular book revised online by its readers" - "New York Times". There's a common belief that cyberspace cannot be regulated - that is, its very essence is immune from the government's (or anyone else's) control. "Code", first published in 2000, argues that this belief is wrong. It is not in the nature of cyberspace to be unregulable; cyberspace has no "nature". It only has code - the software and hardware that makes cyberspace what it is. That code can create a place of freedom - as the original architecture of the Net did - or a place of oppressive control. Under the influence of commerce, cyberspace is becoming a highly regulable space, where behaviour is much more tightly controlled than in real space. But that's not inevitable either. We can - we must - choose what kind of cyberspace we want and what freedoms we will guarantee. These choices are all about architecture: about what kind of code will govern cyberspace, and who will control it. In this realm, code is the most significant for of law, and it is up to lawyers, policymakers, and especially citizens to decide what values that code embodies. Since its original publication, this seminal book has earned the status of a minor classic. This second edition, or Version 2.0, has been prepared through the author's wiki, a web site that allows readers to edit the text, making this the first reader-edited revision of a popular book.

Digital Copyright: Protecting Intellectual Property on the Internet

Digital Copyright
Digital Copyright: Protecting Intellectual Property on the Internet
Jessica Litman (Auteur)

12 neuf & d'occasion a partir de EUR 1,62 (as of 12/23/2012 09:15 PST)

(Consultez la liste Cadeaux les plus offerts dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Description du produit

In 1998, copyright lobbyists succeeded in persuading Congress to enact laws greatly expanding copyright owners' control over individuals' private uses of their works. The efforts to enforce these new rights have resulted in highly publicized legal battles between established media, and new upstarts. In this enlightening and well-argued book, law professor Jessica Litman questions whether copyright laws crafted by lawyers and their lobbyists really make sense for the vast majority of us. Should every interaction between ordinary consumers and copyright-protected works be restricted by law? Is it practical to enforce such laws, or expect consumers to obey them? What are the effects of such laws on the exchange of information in a free society? Litman's critique exposes the 1998 copyright law as an incoherent patchwork. She argues for reforms that reflect common sense and the way people actually behave in their daily digital interactions. This paperback edition includes an afterword that comments on recent developments, such as the end of the Napster story, the rise of peer-to-peer file sharing, the escalation of a full-fledged copyright war, the filing of lawsuits against thousands of individuals, and the June 2005 Supreme Court decision in the Grokster case.

The Wealth of Networks: How Social Production Transforms Markets and Freedom

The Wealth of Networks
The Wealth of Networks: How Social Production Transforms Markets and Freedom
Yochai Benkler (Auteur)
(1)

Acheter neuf : EUR 14,95 (as of 12/23/2012 00:13 PST)
19 neuf & d'occasion a partir de EUR 10,98 (as of 12/23/2012 00:13 PST)

(Consultez la liste Cadeaux les plus demandes dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Description du produit

With the radical changes in information production that the Internet has introduced, we stand at an important moment of transition, says Yochai Benkler in this thought-provoking book. The phenomenon he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today's emerging networked information environment. In this comprehensive social theory of the Internet and networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing - and shows that the way information and knowledge are made available can either limit or enlarge the ways people create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained, or lost, by the decisions we make today.

vendredi 21 décembre 2012

Nothing to Hide: The False Tradeoff Between Privacy and Security

Nothing to Hide
Nothing to Hide: The False Tradeoff Between Privacy and Security
Daniel J. Solove (Auteur)

Acheter neuf : EUR 13,91 (as of 12/21/2012 21:12 PST)

(Consultez la liste Dernieres nouveautes en Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Sonic Boom: Napster, P2P and the Battle for the Future of Music

Sonic Boom
Sonic Boom: Napster, P2P and the Battle for the Future of Music
John Alderman (Auteur)

10 neuf & d'occasion a partir de EUR 0,41 (as of 12/21/2012 13:13 PST)

(Consultez la liste Cadeaux les plus offerts dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)

Description du produit

The first book to tell the captivating inside story of the MP3 revolution as the record labels, musicians, Internet entrepreneurs, and fans battle for control over the future of music. Digital compression technologies such as MP3 and Napster are having an explosive impact on the way music is distributed. Every day, hundreds of thousands of music files are searched for, shared, recorded, and listened to by computer and Web users-all free of charge. It's a boon for consumers and a disaster for record companies, and the end result can be nothing less than a cultural and economic transformation. Sonic Boom is a fascinating narrative of the controversy that's sending shock waves through the music industry. It's the story of musicians such as the Beastie Boys and Public Enemy, who are reaching fans without record company support; entrepreneurs who are distributing MP3 files without licensing agreements; and record-industry executives who are fighting for their business at every turn. It reveals how, even as the star-maker machinery of record companies remains in the hands of the old guard, innovators are finding ways to outsmart it. Peopled with a sensational cast of characters that includes rock stars, music moguls, teenagers, and Internet entrepreneurs, Sonic Boom exposes the recording industry's plight as a fascinating microcosm of the vast cultural, ethical, and legal issues that all industries face in the information age.

mercredi 19 décembre 2012

Rustad's Internet Law in a Nutshell

Rustads Internet
Rustad's Internet Law in a Nutshell
Michael L. Rustad (Auteur)

Download : EUR 15,54 (as of 12/19/2012 03:57 PST)

(Consultez la liste Cadeaux les plus demandes dans la rubrique Computer & Internet pour des informations officielles sur le classement actuel de ce produit.)