When Edward Snowden began leaking NSA documents in June 2013, his actions sparked impassioned debates about electronic surveillance, national security, and privacy in the digital age. The Snowden Reader looks at Snowden’s disclosures and their aftermath. Critical analyses by experts discuss the historical, political, legal, and ethical issues raised by the disclosures. Over forty key documents related to …
history
Recoding Gender: Women’s Changing Participation in Computing (History of Computing)
Today, women earn a relatively low percentage of computer science degrees and hold proportionately few technical computing jobs. Meanwhile, the stereotype of the male “computer geek” …
Issues in Internet Law: Society, Technology, and the Law, 9th Edition
The 9th edition of Issues In Internet Law: Society, Technology, and the Law has been updated for 2015 with the latest cases and trends in Internet Law. The new edition not only has an expanded glossary and expanded topic, statute, and case indexes but a new chapter devoted to the NSA’s spying on Internet users. Topics include: …
Using a progressive intuitive/mathematical approach, this introduction to computer vision provides necessary theory and examples for practitioners who work in fields where significant information must be extracted automatically from images– including those interested in multimedia, art and design, geographic information systems, and image databases, in addition to the traditional areas of automation, image science, medical …
A remarkable piece of forgotten history- the never-before-told story of Americans lured to Soviet Russia by the promise of jobs and better lives, only to meet tragic ends In 1934, a photograph was taken of a baseball team. These two rows of young men look like any group of American ballplayers, except perhaps for the Russian lettering on …
The second edition of Kerrs popular computer crimes text reflects the many new caselaw and statutory developments since the publication of the first edition in 2006. It also adds a new section on encryption that covers both Fourth Amendment and Fifth Amendment issues raised by its use to conceal criminal activity. Computer crime law will be an essential …
The Chip : How Two Americans Invented the Microchip and Launched a Revolution
Barely fifty years ago a computer was a gargantuan, vastly expensive thing that only a handful of scientists had ever seen. The world’s brightest engineers were stymied in their quest to make these machines small and affordable until the solution finally came from two ingenious young Americans. Jack Kilby and Robert Noyce hit upon the stunning …
Decoding the Heavens: A 2,000-Year-Old Computer–and the Century-long Search to Discover Its Secrets
In Decoding the Heavens, Jo Marchant tells for the first time the full story of the hundred-year quest to decipher the ancient Greek computer known as the Antikythera Mechanism. Along the way she unearths a diverse cast of remarkable characters and explores the deep roots of modern technology in ancient Greece and the medieval European and Islamic worlds. …
As Apollo 11’s Lunar Module descended toward the moon under automatic control, a program alarm in the guidance computer’s software nearly caused a mission abort. Neil …
Under Andy Grove’s leadership, Intel has become the world’s largest chipmaker, the fifth-most-admired company in America, and the seventh-most-profitable company among the Fortune 500. You don’t achieve rankings like these unless you have mastered a rare understanding of the art of business and an unusual way with its practice.Few CEOs can claim this level of consistent record-breaking success. …