Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Hal Abelson is Class of 1922 Professor of Electrical Engineering and Computer Science at MIT, and an IEEE Fellow. He has helped drive innovative educational technology initiatives such MIT OpenCourseWare, cofounded Creative Commons and Public Knowledge, and was founding director of the Free Software Foundation. Ken Ledeen, Chairman/CEO of Nevo Technologies, has served on the boards of numerous technology companies. Harry Lewis, former Dean of Harvard College, is Gordon McKay Professor of Computer Science at Harvard. He is author of Excellence Without a Soul: Does Liberal Education Have a Future? Together, the authors teach Quantitative Reasoning 48, an innovative Harvard course on information for non-technical, non-mathematically oriented students.
Preface | p. xiii |
Digital Explosion: Why Is It Happening, and What Is at Stake? | p. 1 |
The Explosion of Bits, and Everything Else | p. 2 |
The Koans of Bits | p. 4 |
Good and Ill, Promise and Peril | p. 13 |
Naked in the Sunlight: Privacy Lost, Privacy Abandoned | p. 19 |
1984 Is Here, and We Like It | p. 19 |
Footprints and Fingerprints | p. 22 |
Why We Lost Our Privacy, or Gave It Away | p. 36 |
Little Brother Is Watching | p. 42 |
Big Brother, Abroad and in the U.S. | p. 48 |
Technology Change and Lifestyle Change | p. 55 |
Beyond Privacy | p. 61 |
Ghosts in the Machine: Secrets and Surprises of Electronic Documents | p. 73 |
What You See Is Not What the Computer Knows | p. 73 |
Representation, Reality, and Illusion | p. 80 |
Hiding Information in Images | p. 94 |
The Scary Secrets of Old Disks | p. 99 |
Needles in the Haystack: Google and Other Brokers in the Bits Bazaar | p. 109 |
Found After Seventy Years | p. 109 |
The Library and the Bazaar | p. 110 |
The Fall of Hierarchy | p. 117 |
It Matters How It Works | p. 120 |
Who Pays, and for What? | p. 138 |
Search Is Power | p. 145 |
You Searched for WHAT? Tracking Searches | p. 156 |
Regulating or Replacing the Brokers | p. 158 |
Secret Bits: How Codes Became Unbreakable | p. 161 |
Encryption in the Hands of Terrorists, and Everyone Else | p. 161 |
Historical Cryptography | p. 165 |
Lessons for the Internet Age | p. 174 |
Secrecy Changes Forever | p. 178 |
Cryptography for Everyone | p. 187 |
Cryptography Unsettled | p. 191 |
Balance Toppled: Who Owns the Bits? | p. 195 |
Automated Crimes-Automated Justice | p. 195 |
NET Act Makes Sharing a Crime | p. 199 |
The Peer-to-Peer Upheaval | p. 201 |
Sharing Goes Decentralized | p. 204 |
Authorized Use Only | p. 209 |
Forbidden Technology | p. 213 |
Copyright Koyaanisqatsi: Life Out of Balance | p. 219 |
The Limits of Property | p. 225 |
You Can't Say That on the Internet: Guarding the Frontiers of Digital Expression | p. 229 |
Do You Know Where Your Child Is on the Web Tonight? | p. 229 |
Metaphors for Something Unlike Anything Else | p. 231 |
Publisher or Distributor? | p. 234 |
Neither Liberty nor Security | p. 235 |
The Nastiest Place on Earth | p. 237 |
The Most Participatory Form of Mass Speech | p. 239 |
Protecting Good Samaritans-and a Few Bad Ones | p. 242 |
Laws of Unintended Consequences | p. 245 |
Can the Internet Be Like a Magazine Store? | p. 247 |
Let Your Fingers Do the Stalking | p. 249 |
Like an Annoying Telephone Call? | p. 251 |
Digital Protection, Digital Censorship-and Self-Censorship | p. 253 |
Bits in the Air: Old Metaphors, New Technologies, and Free Speech | p. 259 |
Censoring the President | p. 259 |
How Broadcasting Became Regulated | p. 260 |
The Path to Spectrum Deregulation | p. 273 |
What Does the Future Hold for Radio? | p. 288 |
Conclusion: After the Explosion | p. 295 |
Bits Lighting Up the World | p. 295 |
A Few Bits in Conclusion | p. 299 |
The Internet as System and Spirit | p. 301 |
The Internet as a Communication System | p. 301 |
The Internet Spirit | p. 309 |
Endnotes | p. 317 |
Index | p. 347 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.