Author: Pablo Gutiérrez Salazar
Publisher: Ra-Ma Editorial
ISBN: 8499648622
Category : Computers
Languages : es
Pages : 291
Book Description
De forma totalmente práctica, este libro te guiará, desde los cimientos hasta las técnicas más modernas que usa un Hacker profesional, para poder comprometer la seguridad de un sistema. De esta forma descubrirás cómo puedes tú también convertirte en Hacker profesional. Una de las profesiones más demandadas del mundo. Este libro contiene las técnicas de seguridad ofensivas necesarias para que puedas llegar a auditar (por medio de pruebas de penetración) y defender una organización en temas de ciberseguridad, basándote en metodologías y estándares internacionales, tales como: PTES, OWASP, NIST, etc. Aprenderás de forma real y ágil los conceptos necesarios sobre ciberseguridad, además de todas las herramientas necesarias para que puedas poner en práctica todo lo visto. Adicionalmente, este libro está diseñado para que superes con éxito las certificaciones profesionales de hacking ético: como, por ejemplo, G.H.O.S.T. ¡Diviértete convirtiéndote en el próximo Hacker profesional!
El libro blanco del HACKER
Author: Pablo Gutiérrez Salazar
Publisher: Ra-Ma Editorial
ISBN: 8499648622
Category : Computers
Languages : es
Pages : 291
Book Description
De forma totalmente práctica, este libro te guiará, desde los cimientos hasta las técnicas más modernas que usa un Hacker profesional, para poder comprometer la seguridad de un sistema. De esta forma descubrirás cómo puedes tú también convertirte en Hacker profesional. Una de las profesiones más demandadas del mundo. Este libro contiene las técnicas de seguridad ofensivas necesarias para que puedas llegar a auditar (por medio de pruebas de penetración) y defender una organización en temas de ciberseguridad, basándote en metodologías y estándares internacionales, tales como: PTES, OWASP, NIST, etc. Aprenderás de forma real y ágil los conceptos necesarios sobre ciberseguridad, además de todas las herramientas necesarias para que puedas poner en práctica todo lo visto. Adicionalmente, este libro está diseñado para que superes con éxito las certificaciones profesionales de hacking ético: como, por ejemplo, G.H.O.S.T. ¡Diviértete convirtiéndote en el próximo Hacker profesional!
Publisher: Ra-Ma Editorial
ISBN: 8499648622
Category : Computers
Languages : es
Pages : 291
Book Description
De forma totalmente práctica, este libro te guiará, desde los cimientos hasta las técnicas más modernas que usa un Hacker profesional, para poder comprometer la seguridad de un sistema. De esta forma descubrirás cómo puedes tú también convertirte en Hacker profesional. Una de las profesiones más demandadas del mundo. Este libro contiene las técnicas de seguridad ofensivas necesarias para que puedas llegar a auditar (por medio de pruebas de penetración) y defender una organización en temas de ciberseguridad, basándote en metodologías y estándares internacionales, tales como: PTES, OWASP, NIST, etc. Aprenderás de forma real y ágil los conceptos necesarios sobre ciberseguridad, además de todas las herramientas necesarias para que puedas poner en práctica todo lo visto. Adicionalmente, este libro está diseñado para que superes con éxito las certificaciones profesionales de hacking ético: como, por ejemplo, G.H.O.S.T. ¡Diviértete convirtiéndote en el próximo Hacker profesional!
The Hardware Hacking Handbook
Author: Jasper van Woudenberg
Publisher: No Starch Press
ISBN: 1593278748
Category : Computers
Languages : en
Pages : 514
Book Description
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget. You’ll learn: How to model security threats, using attacker profiles, assets, objectives, and countermeasures Electrical basics that will help you understand communication interfaces, signaling, and measurement How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips How to use timing and power analysis attacks to extract passwords and cryptographic keys Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand.
Publisher: No Starch Press
ISBN: 1593278748
Category : Computers
Languages : en
Pages : 514
Book Description
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget. You’ll learn: How to model security threats, using attacker profiles, assets, objectives, and countermeasures Electrical basics that will help you understand communication interfaces, signaling, and measurement How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips How to use timing and power analysis attacks to extract passwords and cryptographic keys Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand.
Hands on Hacking
Author: Matthew Hickey
Publisher: John Wiley & Sons
ISBN: 1119561450
Category : Computers
Languages : en
Pages : 608
Book Description
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you’ll look for flaws and their known exploits—including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.
Publisher: John Wiley & Sons
ISBN: 1119561450
Category : Computers
Languages : en
Pages : 608
Book Description
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you’ll look for flaws and their known exploits—including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.
Beautiful Trouble
Author: Andrew Boyd
Publisher: OR Books
ISBN: 1939293162
Category : Art
Languages : en
Pages : 187
Book Description
Banksy, the Yes Men, Gandhi, Starhawk: the accumulated wisdom of decades of creative protest is now in the hands of the next generation of change-makers, thanks to Beautiful Trouble. Sophisticated enough for veteran activists, accessible enough for newbies, this compact pocket edition of the bestselling Beautiful Trouble is a book that’s both handy and inexpensive. Showcasing the synergies between artistic imagination and shrewd political strategy, this generously illustrated volume can easily be slipped into your pocket as you head out to the streets. This is for everyone who longs for a more beautiful, more just, more livable world – and wants to know how to get there. Includes a new introduction by the editors. Contributors include: Celia Alario • Andy Bichlbaum • Nadine Bloch • L. M. Bogad • Mike Bonnano • Andrew Boyd • Kevin Buckland • Doyle Canning • Samantha Corbin • Stephen Duncombe • Simon Enoch • Janice Fine • Lisa Fithian • Arun Gupta • Sarah Jaffe • John Jordan • Stephen Lerner • Zack Malitz • Nancy L. Mancias • Dave Oswald Mitchell • Tracey Mitchell • Mark Read • Patrick Reinsborough • Joshua Kahn Russell • Nathan Schneider • John Sellers • Matthew Skomarovsky • Jonathan Matthew Smucker • Starhawk • Eric Stoner • Harsha Walia
Publisher: OR Books
ISBN: 1939293162
Category : Art
Languages : en
Pages : 187
Book Description
Banksy, the Yes Men, Gandhi, Starhawk: the accumulated wisdom of decades of creative protest is now in the hands of the next generation of change-makers, thanks to Beautiful Trouble. Sophisticated enough for veteran activists, accessible enough for newbies, this compact pocket edition of the bestselling Beautiful Trouble is a book that’s both handy and inexpensive. Showcasing the synergies between artistic imagination and shrewd political strategy, this generously illustrated volume can easily be slipped into your pocket as you head out to the streets. This is for everyone who longs for a more beautiful, more just, more livable world – and wants to know how to get there. Includes a new introduction by the editors. Contributors include: Celia Alario • Andy Bichlbaum • Nadine Bloch • L. M. Bogad • Mike Bonnano • Andrew Boyd • Kevin Buckland • Doyle Canning • Samantha Corbin • Stephen Duncombe • Simon Enoch • Janice Fine • Lisa Fithian • Arun Gupta • Sarah Jaffe • John Jordan • Stephen Lerner • Zack Malitz • Nancy L. Mancias • Dave Oswald Mitchell • Tracey Mitchell • Mark Read • Patrick Reinsborough • Joshua Kahn Russell • Nathan Schneider • John Sellers • Matthew Skomarovsky • Jonathan Matthew Smucker • Starhawk • Eric Stoner • Harsha Walia
Practical Deep Learning for Cloud, Mobile, and Edge
Author: Anirudh Koul
Publisher: "O'Reilly Media, Inc."
ISBN: 1492034819
Category : Computers
Languages : en
Pages : 585
Book Description
Whether you’re a software engineer aspiring to enter the world of deep learning, a veteran data scientist, or a hobbyist with a simple dream of making the next viral AI app, you might have wondered where to begin. This step-by-step guide teaches you how to build practical deep learning applications for the cloud, mobile, browsers, and edge devices using a hands-on approach. Relying on years of industry experience transforming deep learning research into award-winning applications, Anirudh Koul, Siddha Ganju, and Meher Kasam guide you through the process of converting an idea into something that people in the real world can use. Train, tune, and deploy computer vision models with Keras, TensorFlow, Core ML, and TensorFlow Lite Develop AI for a range of devices including Raspberry Pi, Jetson Nano, and Google Coral Explore fun projects, from Silicon Valley’s Not Hotdog app to 40+ industry case studies Simulate an autonomous car in a video game environment and build a miniature version with reinforcement learning Use transfer learning to train models in minutes Discover 50+ practical tips for maximizing model accuracy and speed, debugging, and scaling to millions of users
Publisher: "O'Reilly Media, Inc."
ISBN: 1492034819
Category : Computers
Languages : en
Pages : 585
Book Description
Whether you’re a software engineer aspiring to enter the world of deep learning, a veteran data scientist, or a hobbyist with a simple dream of making the next viral AI app, you might have wondered where to begin. This step-by-step guide teaches you how to build practical deep learning applications for the cloud, mobile, browsers, and edge devices using a hands-on approach. Relying on years of industry experience transforming deep learning research into award-winning applications, Anirudh Koul, Siddha Ganju, and Meher Kasam guide you through the process of converting an idea into something that people in the real world can use. Train, tune, and deploy computer vision models with Keras, TensorFlow, Core ML, and TensorFlow Lite Develop AI for a range of devices including Raspberry Pi, Jetson Nano, and Google Coral Explore fun projects, from Silicon Valley’s Not Hotdog app to 40+ industry case studies Simulate an autonomous car in a video game environment and build a miniature version with reinforcement learning Use transfer learning to train models in minutes Discover 50+ practical tips for maximizing model accuracy and speed, debugging, and scaling to millions of users
I Am Pilgrim
Author: Terry Hayes
Publisher: Simon and Schuster
ISBN: 1501119451
Category : Fiction
Languages : en
Pages : 800
Book Description
In a seedy hotel near Ground Zero, a woman lies face down in a pool of acid, features melted of her face, teeth missing, fingerprints gone. The room has been sprayed down with DNA-eradicating antiseptic spray. Pilgrim, the code name for a legendary, world-class segret agent, quickly realizes that all of the murderer's techniques were pulled directly from his own book, a cult classic of forensic science written under a pen name.
Publisher: Simon and Schuster
ISBN: 1501119451
Category : Fiction
Languages : en
Pages : 800
Book Description
In a seedy hotel near Ground Zero, a woman lies face down in a pool of acid, features melted of her face, teeth missing, fingerprints gone. The room has been sprayed down with DNA-eradicating antiseptic spray. Pilgrim, the code name for a legendary, world-class segret agent, quickly realizes that all of the murderer's techniques were pulled directly from his own book, a cult classic of forensic science written under a pen name.
Urban Planet
Author: Thomas Elmqvist
Publisher:
ISBN: 9781316647554
Category :
Languages : en
Pages : 514
Book Description
Global urbanization promises better services, stronger economies, and more connections; it also carries risks and unforeseeable consequences. To deepen our understanding of this complex process and its importance for global sustainability, we need to build interdisciplinary knowledge around a systems approach. Urban Planet takes an integrative look at our urban environment, bringing together scholars from a diverse range of disciplines: from sociology and political science to evolutionary biology, geography, economics and engineering. It includes the perspectives of often neglected voices: architects, journalists, artists and activists. The book provides a much needed cross-scale perspective, connecting challenges and solutions on a local scale with drivers and policy frameworks on a regional and global scale. The authors argue that to overcome the major challenges we are facing, we must embark on a large-scale reinvention of how we live together, grounded in inclusiveness and sustainability.
Publisher:
ISBN: 9781316647554
Category :
Languages : en
Pages : 514
Book Description
Global urbanization promises better services, stronger economies, and more connections; it also carries risks and unforeseeable consequences. To deepen our understanding of this complex process and its importance for global sustainability, we need to build interdisciplinary knowledge around a systems approach. Urban Planet takes an integrative look at our urban environment, bringing together scholars from a diverse range of disciplines: from sociology and political science to evolutionary biology, geography, economics and engineering. It includes the perspectives of often neglected voices: architects, journalists, artists and activists. The book provides a much needed cross-scale perspective, connecting challenges and solutions on a local scale with drivers and policy frameworks on a regional and global scale. The authors argue that to overcome the major challenges we are facing, we must embark on a large-scale reinvention of how we live together, grounded in inclusiveness and sustainability.
MR. ROBOT: Red Wheelbarrow
Author: Sam Esmail
Publisher: Abrams
ISBN: 1683350286
Category : Fiction
Languages : en
Pages : 180
Book Description
The only tie-in book for USA’s award-winning series MR. ROBOT, Elliot’s journal—Red Wheelbarrow—is written by show creator Sam Esmail and show writer Courtney Looney. Before and during the events of season two, Elliot recorded his most private thoughts in this journal—and now you can hold this piece of the series in your hands. Experience Elliot’s battles to gain control of his life and his struggles to survive increasingly dangerous circumstances, in a brand-new story rendered in his own words. The notebook also holds seven removable artifacts—a ripped-out page, a newspaper clipping, a mysterious envelope, and more—along with sketches throughout the book. You’ll discover the story behind MR. ROBOT season two and hints of what is to come. This book is the ultimate journey into the world of the show—and a key to hacking the mind of its main character. MR. ROBOT is a psychological thriller that follows Elliot (Rami Malek, The Pacific), a young programmer, who works as a cyber-security engineer by day and as a vigilante hacker by night. Elliot finds himself at a crossroads when the mysterious leader (Christian Slater, Adderall Diaries) of an underground hacker group recruits him to destroy the firm he is paid to protect. Praise for MR. ROBOT: “Relentless, sensational, and unabashedly suspenseful” —The New York Times “. . . most narratively and visually daring drama series on television . . .” —Entertainment Weekly “Terrific” —The New Yorker “Sam Esmail is one of the most innovative creators to make his mark on television in a long time.” —Rolling Stone “A modern classic” —Forbes “MR. ROBOT has the potential to be one of the defining shows of our age.” —TIME “Brilliant” —The Huffington Post Golden Globe Awards for Best Television Series, Drama, and Best Performance by an Actor in a Supporting Role in a Series, Mini-Series or Motion Picture Made for Television (Christian Slater) Critics’ Choice® Awards for Best Drama Series, Best Actor in a Drama Series (Rami Malek), and Best Supporting Actor in a Drama Series (Christian Slater) Emmy Award® for Outstanding Lead Actor in a Drama Series (Rami Malek) Five Emmy® nominations, including for Outstanding Drama Series
Publisher: Abrams
ISBN: 1683350286
Category : Fiction
Languages : en
Pages : 180
Book Description
The only tie-in book for USA’s award-winning series MR. ROBOT, Elliot’s journal—Red Wheelbarrow—is written by show creator Sam Esmail and show writer Courtney Looney. Before and during the events of season two, Elliot recorded his most private thoughts in this journal—and now you can hold this piece of the series in your hands. Experience Elliot’s battles to gain control of his life and his struggles to survive increasingly dangerous circumstances, in a brand-new story rendered in his own words. The notebook also holds seven removable artifacts—a ripped-out page, a newspaper clipping, a mysterious envelope, and more—along with sketches throughout the book. You’ll discover the story behind MR. ROBOT season two and hints of what is to come. This book is the ultimate journey into the world of the show—and a key to hacking the mind of its main character. MR. ROBOT is a psychological thriller that follows Elliot (Rami Malek, The Pacific), a young programmer, who works as a cyber-security engineer by day and as a vigilante hacker by night. Elliot finds himself at a crossroads when the mysterious leader (Christian Slater, Adderall Diaries) of an underground hacker group recruits him to destroy the firm he is paid to protect. Praise for MR. ROBOT: “Relentless, sensational, and unabashedly suspenseful” —The New York Times “. . . most narratively and visually daring drama series on television . . .” —Entertainment Weekly “Terrific” —The New Yorker “Sam Esmail is one of the most innovative creators to make his mark on television in a long time.” —Rolling Stone “A modern classic” —Forbes “MR. ROBOT has the potential to be one of the defining shows of our age.” —TIME “Brilliant” —The Huffington Post Golden Globe Awards for Best Television Series, Drama, and Best Performance by an Actor in a Supporting Role in a Series, Mini-Series or Motion Picture Made for Television (Christian Slater) Critics’ Choice® Awards for Best Drama Series, Best Actor in a Drama Series (Rami Malek), and Best Supporting Actor in a Drama Series (Christian Slater) Emmy Award® for Outstanding Lead Actor in a Drama Series (Rami Malek) Five Emmy® nominations, including for Outstanding Drama Series
Captivate
Author: Vanessa Van Edwards
Publisher: Penguin
ISBN: 0399564489
Category : Business & Economics
Languages : en
Pages : 322
Book Description
Do you feel awkward at networking events? Do you wonder what your date really thinks of you? Do you wish you could decode people? You need to learn the science of people. As a human behavior hacker, Vanessa Van Edwards created a research lab to study the hidden forces that drive us. And she’s cracked the code. In Captivate, she shares shortcuts, systems, and secrets for taking charge of your interactions at work, at home, and in any social situation. These aren’t the people skills you learned in school. This is the first comprehensive, science backed, real life manual on how to captivate anyone—and a completely new approach to building connections. Just like knowing the formulas to use in a chemistry lab, or the right programming language to build an app, Captivate provides simple ways to solve people problems. You’ll learn, for example… · How to work a room: Every party, networking event, and social situation has a predictable map. Discover the sweet spot for making the most connections. · How to read faces: It’s easier than you think to speed-read facial expressions and use them to predict people’s emotions. · How to talk to anyone: Every conversation can be memorable—once you learn how certain words generate the pleasure hormone dopamine in listeners. When you understand the laws of human behavior, your influence, impact, and income will increase significantly. What’s more, you will improve your interpersonal intelligence, make a killer first impression, and build rapport quickly and authentically in any situation—negotiations, interviews, parties, and pitches. You’ll never interact the same way again.
Publisher: Penguin
ISBN: 0399564489
Category : Business & Economics
Languages : en
Pages : 322
Book Description
Do you feel awkward at networking events? Do you wonder what your date really thinks of you? Do you wish you could decode people? You need to learn the science of people. As a human behavior hacker, Vanessa Van Edwards created a research lab to study the hidden forces that drive us. And she’s cracked the code. In Captivate, she shares shortcuts, systems, and secrets for taking charge of your interactions at work, at home, and in any social situation. These aren’t the people skills you learned in school. This is the first comprehensive, science backed, real life manual on how to captivate anyone—and a completely new approach to building connections. Just like knowing the formulas to use in a chemistry lab, or the right programming language to build an app, Captivate provides simple ways to solve people problems. You’ll learn, for example… · How to work a room: Every party, networking event, and social situation has a predictable map. Discover the sweet spot for making the most connections. · How to read faces: It’s easier than you think to speed-read facial expressions and use them to predict people’s emotions. · How to talk to anyone: Every conversation can be memorable—once you learn how certain words generate the pleasure hormone dopamine in listeners. When you understand the laws of human behavior, your influence, impact, and income will increase significantly. What’s more, you will improve your interpersonal intelligence, make a killer first impression, and build rapport quickly and authentically in any situation—negotiations, interviews, parties, and pitches. You’ll never interact the same way again.
Data Feminism
Author: Catherine D'Ignazio
Publisher: MIT Press
ISBN: 0262358530
Category : Social Science
Languages : en
Pages : 328
Book Description
A new way of thinking about data science and data ethics that is informed by the ideas of intersectional feminism. Today, data science is a form of power. It has been used to expose injustice, improve health outcomes, and topple governments. But it has also been used to discriminate, police, and surveil. This potential for good, on the one hand, and harm, on the other, makes it essential to ask: Data science by whom? Data science for whom? Data science with whose interests in mind? The narratives around big data and data science are overwhelmingly white, male, and techno-heroic. In Data Feminism, Catherine D'Ignazio and Lauren Klein present a new way of thinking about data science and data ethics—one that is informed by intersectional feminist thought. Illustrating data feminism in action, D'Ignazio and Klein show how challenges to the male/female binary can help challenge other hierarchical (and empirically wrong) classification systems. They explain how, for example, an understanding of emotion can expand our ideas about effective data visualization, and how the concept of invisible labor can expose the significant human efforts required by our automated systems. And they show why the data never, ever “speak for themselves.” Data Feminism offers strategies for data scientists seeking to learn how feminism can help them work toward justice, and for feminists who want to focus their efforts on the growing field of data science. But Data Feminism is about much more than gender. It is about power, about who has it and who doesn't, and about how those differentials of power can be challenged and changed.
Publisher: MIT Press
ISBN: 0262358530
Category : Social Science
Languages : en
Pages : 328
Book Description
A new way of thinking about data science and data ethics that is informed by the ideas of intersectional feminism. Today, data science is a form of power. It has been used to expose injustice, improve health outcomes, and topple governments. But it has also been used to discriminate, police, and surveil. This potential for good, on the one hand, and harm, on the other, makes it essential to ask: Data science by whom? Data science for whom? Data science with whose interests in mind? The narratives around big data and data science are overwhelmingly white, male, and techno-heroic. In Data Feminism, Catherine D'Ignazio and Lauren Klein present a new way of thinking about data science and data ethics—one that is informed by intersectional feminist thought. Illustrating data feminism in action, D'Ignazio and Klein show how challenges to the male/female binary can help challenge other hierarchical (and empirically wrong) classification systems. They explain how, for example, an understanding of emotion can expand our ideas about effective data visualization, and how the concept of invisible labor can expose the significant human efforts required by our automated systems. And they show why the data never, ever “speak for themselves.” Data Feminism offers strategies for data scientists seeking to learn how feminism can help them work toward justice, and for feminists who want to focus their efforts on the growing field of data science. But Data Feminism is about much more than gender. It is about power, about who has it and who doesn't, and about how those differentials of power can be challenged and changed.