Author: David Jagneaux
Publisher: Simon and Schuster
ISBN: 1507217587
Category : Computers
Languages : en
Pages : 256
Book Description
Build and create your own Roblox world with this updated, easy-to-use guide. Roblox, the largest user-generated online gaming platform that allows users to create and share their own game worlds and gaming creations, has taken the digital world by storm! With updated screenshots and instructions, The Ultimate Roblox Book, Updated Edition provides brand-new information on game changes and the latest features so you can make the most out of your Roblox game. With everything from instructions for playing the games to tips on creating your own worlds to the basics of coding, this updated guide gives you all the tools you need to get started.
The Ultimate Roblox Book: An Unofficial Guide, Updated Edition
Hacking Exposed Mobile
Author: Neil Bergman
Publisher: McGraw Hill Professional
ISBN: 0071817026
Category : Computers
Languages : en
Pages : 320
Book Description
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists
Publisher: McGraw Hill Professional
ISBN: 0071817026
Category : Computers
Languages : en
Pages : 320
Book Description
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists
Google Hacking for Penetration Testers
Author: Johnny Long
Publisher: Elsevier
ISBN: 0080478050
Category : Computers
Languages : en
Pages : 529
Book Description
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
Publisher: Elsevier
ISBN: 0080478050
Category : Computers
Languages : en
Pages : 529
Book Description
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
Basic ROBLOX Lua Programming
Author:
Publisher: Brandon LaRouche
ISBN: 0985451300
Category :
Languages : en
Pages : 282
Book Description
Publisher: Brandon LaRouche
ISBN: 0985451300
Category :
Languages : en
Pages : 282
Book Description
The Age of Surveillance Capitalism
Author: Shoshana Zuboff
Publisher: PublicAffairs
ISBN: 1610395700
Category : Business & Economics
Languages : en
Pages : 683
Book Description
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.
Publisher: PublicAffairs
ISBN: 1610395700
Category : Business & Economics
Languages : en
Pages : 683
Book Description
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.
The UX Book
Author: Rex Hartson
Publisher: Morgan Kaufmann
ISBN: 0128010622
Category : Computers
Languages : en
Pages : 918
Book Description
The discipline of user experience (UX) design has matured into a confident practice and this edition reflects, and in some areas accelerates, that evolution. Technically this is the second edition of The UX Book, but so much of it is new, it is more like a sequel. One of the major positive trends in UX is the continued emphasis on design—a kind of design that highlights the designer's creative skills and insights and embodies a synthesis of technology with usability, usefulness, aesthetics, and meaningfulness to the user. In this edition a new conceptual top-down design framework is introduced to help readers with this evolution. This entire edition is oriented toward an agile UX lifecycle process, explained in the funnel model of agile UX, as a better match to the now de facto standard agile approach to software engineering. To reflect these trends, even the subtitle of the book is changed to "Agile UX design for a quality user experience. Designed as a how-to-do-it handbook and field guide for UX professionals and a textbook for aspiring students, the book is accompanied by in-class exercises and team projects. The approach is practical rather than formal or theoretical. The primary goal is still to imbue an understanding of what a good user experience is and how to achieve it. To better serve this, processes, methods, and techniques are introduced early to establish process-related concepts as context for discussion in later chapters. - Winner of a 2020 Textbook Excellence Award (College) (Texty) from the Textbook and Academic Authors Association - A comprehensive textbook for UX/HCI/Interaction Design students readymade for the classroom, complete with instructors' manual, dedicated web site, sample syllabus, examples, exercises, and lecture slides - Features HCI theory, process, practice, and a host of real world stories and contributions from industry luminaries to prepare students for working in the field - The only HCI textbook to cover agile methodology, design approaches, and a full, modern suite of classroom material (stemming from tried and tested classroom use by the authors)
Publisher: Morgan Kaufmann
ISBN: 0128010622
Category : Computers
Languages : en
Pages : 918
Book Description
The discipline of user experience (UX) design has matured into a confident practice and this edition reflects, and in some areas accelerates, that evolution. Technically this is the second edition of The UX Book, but so much of it is new, it is more like a sequel. One of the major positive trends in UX is the continued emphasis on design—a kind of design that highlights the designer's creative skills and insights and embodies a synthesis of technology with usability, usefulness, aesthetics, and meaningfulness to the user. In this edition a new conceptual top-down design framework is introduced to help readers with this evolution. This entire edition is oriented toward an agile UX lifecycle process, explained in the funnel model of agile UX, as a better match to the now de facto standard agile approach to software engineering. To reflect these trends, even the subtitle of the book is changed to "Agile UX design for a quality user experience. Designed as a how-to-do-it handbook and field guide for UX professionals and a textbook for aspiring students, the book is accompanied by in-class exercises and team projects. The approach is practical rather than formal or theoretical. The primary goal is still to imbue an understanding of what a good user experience is and how to achieve it. To better serve this, processes, methods, and techniques are introduced early to establish process-related concepts as context for discussion in later chapters. - Winner of a 2020 Textbook Excellence Award (College) (Texty) from the Textbook and Academic Authors Association - A comprehensive textbook for UX/HCI/Interaction Design students readymade for the classroom, complete with instructors' manual, dedicated web site, sample syllabus, examples, exercises, and lecture slides - Features HCI theory, process, practice, and a host of real world stories and contributions from industry luminaries to prepare students for working in the field - The only HCI textbook to cover agile methodology, design approaches, and a full, modern suite of classroom material (stemming from tried and tested classroom use by the authors)
The IDA Pro Book, 2nd Edition
Author: Chris Eagle
Publisher: No Starch Press
ISBN: 1593273959
Category : Computers
Languages : en
Pages : 676
Book Description
No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use. Hailed by the creator of IDA Pro as "profound, comprehensive, and accurate," the second edition of The IDA Pro Book covers everything from the very first steps to advanced automation techniques. You'll find complete coverage of IDA's new Qt-based user interface, as well as increased coverage of the IDA debugger, the Bochs debugger, and IDA scripting (especially using IDAPython). But because humans are still smarter than computers, you'll even learn how to use IDA's latest interactive and scriptable interfaces to your advantage. Save time and effort as you learn to: –Navigate, comment, and modify disassembly –Identify known library routines, so you can focus your analysis on other areas of the code –Use code graphing to quickly make sense of cross references and function calls –Extend IDA to support new processors and filetypes using the SDK –Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more –Use IDA's built-in debugger to tackle hostile and obfuscated code Whether you're analyzing malware, conducting vulnerability research, or reverse engineering software, a mastery of IDA is crucial to your success. Take your skills to the next level with this 2nd edition of The IDA Pro Book.
Publisher: No Starch Press
ISBN: 1593273959
Category : Computers
Languages : en
Pages : 676
Book Description
No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use. Hailed by the creator of IDA Pro as "profound, comprehensive, and accurate," the second edition of The IDA Pro Book covers everything from the very first steps to advanced automation techniques. You'll find complete coverage of IDA's new Qt-based user interface, as well as increased coverage of the IDA debugger, the Bochs debugger, and IDA scripting (especially using IDAPython). But because humans are still smarter than computers, you'll even learn how to use IDA's latest interactive and scriptable interfaces to your advantage. Save time and effort as you learn to: –Navigate, comment, and modify disassembly –Identify known library routines, so you can focus your analysis on other areas of the code –Use code graphing to quickly make sense of cross references and function calls –Extend IDA to support new processors and filetypes using the SDK –Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more –Use IDA's built-in debugger to tackle hostile and obfuscated code Whether you're analyzing malware, conducting vulnerability research, or reverse engineering software, a mastery of IDA is crucial to your success. Take your skills to the next level with this 2nd edition of The IDA Pro Book.
Don't Use Your Words!
Author: Jane Juffer
Publisher: NYU Press
ISBN: 1479831743
Category : Social Science
Languages : en
Pages : 300
Book Description
How children are taught to control their feelings and how they resist this emotional management through cultural production. Today, even young kids talk to each other across social media by referencing memes,songs, and movements, constructing a common vernacular that resists parental, educational, and media imperatives to name their feelings and thus control their bodies. Over the past two decades, children’s television programming has provided a therapeutic site for the processing of emotions such as anger, but in doing so has enforced normative structures of feeling that, Jane Juffer argues, weaken the intensity and range of children’s affective experiences. Don’t Use Your Words! seeks to challenge those norms, highlighting the ways that kids express their feelings through cultural productions including drawings, fan art, memes, YouTube videos, dance moves, and conversations while gaming online. Focusing on kids between ages five and nine, Don’t Use Your Words! situates these productions in specific contexts, including immigration policy referenced in drawings by Central American children just released from detention centers and electoral politics as contested in kids’ artwork expressing their anger at Trump’s victory. Taking issue with the mainstream tendency to speak on behalf of children, Juffer argues that kids have the agency to answer for themselves: what does it feel like to be a kid?
Publisher: NYU Press
ISBN: 1479831743
Category : Social Science
Languages : en
Pages : 300
Book Description
How children are taught to control their feelings and how they resist this emotional management through cultural production. Today, even young kids talk to each other across social media by referencing memes,songs, and movements, constructing a common vernacular that resists parental, educational, and media imperatives to name their feelings and thus control their bodies. Over the past two decades, children’s television programming has provided a therapeutic site for the processing of emotions such as anger, but in doing so has enforced normative structures of feeling that, Jane Juffer argues, weaken the intensity and range of children’s affective experiences. Don’t Use Your Words! seeks to challenge those norms, highlighting the ways that kids express their feelings through cultural productions including drawings, fan art, memes, YouTube videos, dance moves, and conversations while gaming online. Focusing on kids between ages five and nine, Don’t Use Your Words! situates these productions in specific contexts, including immigration policy referenced in drawings by Central American children just released from detention centers and electoral politics as contested in kids’ artwork expressing their anger at Trump’s victory. Taking issue with the mainstream tendency to speak on behalf of children, Juffer argues that kids have the agency to answer for themselves: what does it feel like to be a kid?
Grand Theft Childhood
Author: Lawrence Kutner
Publisher: Simon and Schuster
ISBN: 1416564691
Category : Family & Relationships
Languages : en
Pages : 275
Book Description
Listening to pundits and politicians, you'd think that the relationship between violent video games and aggressive behavior in children is clear. Children who play violent video games are more likely to be socially isolated and have poor interpersonal skills. Violent games can trigger real-world violence. The best way to protect our kids is to keep them away from games such as Grand Theft Auto that are rated M for Mature. Right? Wrong. In fact, many parents are worried about the wrong things! In 2004, Lawrence Kutner, PhD, and Cheryl K. Olson, ScD, cofounders and directors of the Harvard Medical School Center for Mental Health and Media, began a $1.5 million federally funded study on the effects of video games. In contrast to previous research, their study focused on real children and families in real situations. What they found surprised, encouraged and sometimes disturbed them: their findings conform to the views of neither the alarmists nor the video game industry boosters. In Grand Theft Childhood: The Surprising Truth about Violent Video Games and What Parents Can Do, Kutner and Olson untangle the web of politics, marketing, advocacy and flawed or misconstrued studies that until now have shaped parents' concerns. Instead of offering a one-size-fits-all prescription, Grand Theft Childhood gives the information you need to decide how you want to handle this sensitive issue in your own family. You'll learn when -- and what kinds of -- video games can be harmful, when they can serve as important social or learning tools and how to create and enforce game-playing rules in your household. You'll find out what's really in the games your children play and when to worry about your children playing with strangers on the Internet. You'll understand how games are rated, how to make best use of ratings and the potentially important information that ratings don't provide. Grand Theft Childhood takes video games out of the political and media arenas, and puts parents back in control. It should be required reading for all families who use game consoles or computers. Almost all children today play video or computer games. Half of twelve-year-olds regularly play violent, Mature-rated games. And parents are worried... "I don't know if it's an addiction, but my son is just glued to it. It's the same with my daughter with her computer...and I can't be watching both of them all the time, to see if they're talking to strangers or if someone is getting killed in the other room on the PlayStation. It's just nerve-racking!" "I'm concerned that this game playing is just the kid and the TV screen...how is this going to affect his social skills?" "I'm not concerned about the violence; I'm concerned about the way they portray the violence. It's not accidental; it's intentional. They're just out to kill people in some of these games." What should we as parents, teachers and public policy makers be concerned about? The real risks are subtle and aren't just about gore or sex. Video games don't affect all children in the same way; some children are at significantly greater risk. (You may be surprised to learn which ones!) Grand Theft Childhood gives parents practical, research-based advice on ways to limit many of those risks. It also shows how video games -- even violent games -- can benefit children and families in unexpected ways. In this groundbreaking and timely book, Drs. Lawrence Kutner and Cheryl Olson cut through the myths and hysteria, and reveal the surprising truth about kids and violent games.
Publisher: Simon and Schuster
ISBN: 1416564691
Category : Family & Relationships
Languages : en
Pages : 275
Book Description
Listening to pundits and politicians, you'd think that the relationship between violent video games and aggressive behavior in children is clear. Children who play violent video games are more likely to be socially isolated and have poor interpersonal skills. Violent games can trigger real-world violence. The best way to protect our kids is to keep them away from games such as Grand Theft Auto that are rated M for Mature. Right? Wrong. In fact, many parents are worried about the wrong things! In 2004, Lawrence Kutner, PhD, and Cheryl K. Olson, ScD, cofounders and directors of the Harvard Medical School Center for Mental Health and Media, began a $1.5 million federally funded study on the effects of video games. In contrast to previous research, their study focused on real children and families in real situations. What they found surprised, encouraged and sometimes disturbed them: their findings conform to the views of neither the alarmists nor the video game industry boosters. In Grand Theft Childhood: The Surprising Truth about Violent Video Games and What Parents Can Do, Kutner and Olson untangle the web of politics, marketing, advocacy and flawed or misconstrued studies that until now have shaped parents' concerns. Instead of offering a one-size-fits-all prescription, Grand Theft Childhood gives the information you need to decide how you want to handle this sensitive issue in your own family. You'll learn when -- and what kinds of -- video games can be harmful, when they can serve as important social or learning tools and how to create and enforce game-playing rules in your household. You'll find out what's really in the games your children play and when to worry about your children playing with strangers on the Internet. You'll understand how games are rated, how to make best use of ratings and the potentially important information that ratings don't provide. Grand Theft Childhood takes video games out of the political and media arenas, and puts parents back in control. It should be required reading for all families who use game consoles or computers. Almost all children today play video or computer games. Half of twelve-year-olds regularly play violent, Mature-rated games. And parents are worried... "I don't know if it's an addiction, but my son is just glued to it. It's the same with my daughter with her computer...and I can't be watching both of them all the time, to see if they're talking to strangers or if someone is getting killed in the other room on the PlayStation. It's just nerve-racking!" "I'm concerned that this game playing is just the kid and the TV screen...how is this going to affect his social skills?" "I'm not concerned about the violence; I'm concerned about the way they portray the violence. It's not accidental; it's intentional. They're just out to kill people in some of these games." What should we as parents, teachers and public policy makers be concerned about? The real risks are subtle and aren't just about gore or sex. Video games don't affect all children in the same way; some children are at significantly greater risk. (You may be surprised to learn which ones!) Grand Theft Childhood gives parents practical, research-based advice on ways to limit many of those risks. It also shows how video games -- even violent games -- can benefit children and families in unexpected ways. In this groundbreaking and timely book, Drs. Lawrence Kutner and Cheryl Olson cut through the myths and hysteria, and reveal the surprising truth about kids and violent games.
We Are the Nerds
Author: Christine Lagorio-Chafkin
Publisher: Hachette Books
ISBN: 0316435368
Category : Social Science
Languages : en
Pages : 494
Book Description
Named a Best Book of 2018 by Fast Company, this is a "sharply written and brilliantly reported" (Shelf Awareness) look inside Reddit, the wildly popular, often misunderstood website that has changed the culture of the Internet. Reddit hails itself as "the front page of the Internet." It's the third most-visited website in the United States -- and yet, millions of Americans have no idea what it is. We Are the Nerds is an engrossing look deep inside this captivating, maddening enterprise, whose army of obsessed users have been credited with everything from solving cold case crimes and spurring tens of millions of dollars in charitable donations to seeding alt-right fury and landing Donald Trump in the White House. We Are the Nerds is a gripping start-up narrative: the story of how Reddit's founders, Steve Huffman and Alexis Ohanian, rose up from their suburban childhoods to become millionaires and create an icon of the digital age -- before seeing the site engulfed in controversies and nearly losing control of it for good. Based on Christine Lagorio-Chafkin's exclusive access to founders Ohanian and Huffman, We Are the Nerds is also a compelling exploration of the way we all communicate today -- and how we got here. Reddit and its users have become a mirror of the Internet: it has dingy corners, shiny memes, malicious trolls, and a sometimes heart-melting ability to connect people across cultures, oceans, and ideological divides.
Publisher: Hachette Books
ISBN: 0316435368
Category : Social Science
Languages : en
Pages : 494
Book Description
Named a Best Book of 2018 by Fast Company, this is a "sharply written and brilliantly reported" (Shelf Awareness) look inside Reddit, the wildly popular, often misunderstood website that has changed the culture of the Internet. Reddit hails itself as "the front page of the Internet." It's the third most-visited website in the United States -- and yet, millions of Americans have no idea what it is. We Are the Nerds is an engrossing look deep inside this captivating, maddening enterprise, whose army of obsessed users have been credited with everything from solving cold case crimes and spurring tens of millions of dollars in charitable donations to seeding alt-right fury and landing Donald Trump in the White House. We Are the Nerds is a gripping start-up narrative: the story of how Reddit's founders, Steve Huffman and Alexis Ohanian, rose up from their suburban childhoods to become millionaires and create an icon of the digital age -- before seeing the site engulfed in controversies and nearly losing control of it for good. Based on Christine Lagorio-Chafkin's exclusive access to founders Ohanian and Huffman, We Are the Nerds is also a compelling exploration of the way we all communicate today -- and how we got here. Reddit and its users have become a mirror of the Internet: it has dingy corners, shiny memes, malicious trolls, and a sometimes heart-melting ability to connect people across cultures, oceans, and ideological divides.