1.

Record Nr.

UNINA9910978385203321

Autore

Batteau Allen

Titolo

Tools, Totems, and Totalities : The Modern Construction of Hegemonic Technology / / by Allen Batteau, Christine Z. Miller

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024

ISBN

9789819787081

9819787084

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (290 pages)

Altri autori (Persone)

MillerChristine Z

Disciplina

301

Soggetti

Applied anthropology

Ethnology

Science - History

Technology

History

Technology - Philosophy

Applied Anthropology

Sociocultural Anthropology

History of Science

History of Technology

Philosophy of Technology

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Technology and Cultural Imagination -- The Invention of Technology -- The Prehistory of Technology -- Perspectives: Engineering -- Perspectives: Philosophy -- Perspectives: Sociology and Anthropology -- Technology and Economic Values -- Technology and Citizenship -- Technology and the Human Community -- Optimization and Brittleness -- Techno-narcissism -- Conclusion: Toward the Post-Technological Age.

Sommario/riassunto

This book provides a critical perspective on technology, answering the questions of why technologies often disappoint. It takes a sociotechnical and historical perspective on technology, as developed by an engineer–anthropologist and a design anthropologist, to answer



questions not only about why modern societies have great expectations of technology, but also of why these technologies often fail to meet expectations. Modern societies often search for technological solutions (“technofixes”) to what are institutional problems, which include border crossings or urban mobility, or improvements in productivity or improved communication. It is disappointing when technofixes, whether border walls or driverless cars or social media, fail to live up to their promises of greater personal autonomy (such as afforded by driverless cars) or improved social harmony through social media. Examining technology from the perspectives of instrumentality (“tools”), identity (“totems”), and world-defining systems (“totalities”) develops a comprehensive perspective that is at once historically informed and cross-culturally accurate. Although instrumentality is obvious and is at the core of any understanding of technology, identity is less so; yet many modern “tribes” create their identity in terms of technological objects and systems, whether transport systems (cars and airplanes) or social media or weapons (guns). Further, modern technologies span the globe, so that they exert imperative coordination over distant populations; the use of cell phones around the world is testimony to this fact. Such a critical perspective on technology can be useful in policy discussions of numerous issues affecting contemporary institutions.



2.

Record Nr.

UNINA9910957118403321

Autore

Dulaney Emmett A

Titolo

CompTIA security+ deluxe study guide / / Emmett Dulaney

Pubbl/distr/stampa

Indianapolis, : Wiley Pub., Inc., c2011

ISBN

1-283-40073-1

9786613400734

1-118-11366-7

Edizione

[2nd ed.]

Descrizione fisica

1 online resource (703 p.)

Classificazione

COM053000

Disciplina

005.8

Soggetti

Electronic data processing personnel - Certification

Computer security - Examinations

Computer networks - Security measures - Examinations

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes: "A handy tear card that maps every official exam objective"--P. 4 of cover.

"Exam SY0-301"--Cover.

Includes index.

Nota di contenuto

CompTIA Discount Coupon; CompTIA Security+ Deluxe Study Guide; Contents; Foreword; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Measuring and Weighing Risk; Risk Assessment; Developing Policies, Standards, and Guidelines; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Infrastructure and Connectivity; Mastering TCP/IP; Distinguishing between Security Topologies; Understanding Infrastructure Security; Understanding the Different Network Infrastructure Devices; Understanding Remote Access; Summary; Exam Essentials; Review Questions

Answers to Review QuestionsChapter 3: Protecting Networks; Monitoring and Diagnosing Networks; Understanding Intrusion Detection Systems; Understanding Protocol Analyzers; Securing Workstations and Servers; Securing Internet Connections; Understanding Network Protocols; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 4: Threats and Vulnerabilities; Understanding Software Exploitation; Surviving



Malicious Code; Calculating Attack Strategies; Recognizing Common Attacks; Identifying TCP/IP Security Concerns; Summary; Exam Essentials; Review Questions

Answers to Review QuestionsChapter 5: Access Control and Identity Management; Access Control Basics; Understanding Remote Access Connectivity; Understanding Authentication Services; Understanding Access Control; Implementing Access Control Best Practices; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 6: Educating and Protecting the User; Understanding Security Awareness and Training; Classifying Information; Information Access Controls; Complying with Privacy and Security Regulations; Understanding Social Engineering; Summary; Exam Essentials

Review QuestionsAnswers to Review Questions; Chapter 7: Operating System and Application Security; Hardening the Operating System; Application Hardening; Working with Data Repositories; Host Security; Mobile Devices; Best Practices for Security; Attack Types to Be Aware Of; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 8: Cryptography Basics; An Overview of Cryptography; Understanding Cryptographic Algorithms; Using Cryptographic Systems; Understanding Cryptography Standards and Protocols; Summary; Exam Essentials; Review Questions

Answers to Review QuestionsChapter 9: Cryptography Implementation; Using Public Key Infrastructure; Preparing for Cryptographic Attacks; Understanding Key Management and the Key Life Cycle; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 10: Physical and Hardware-Based Security; Implementing Access Control; Maintaining Environmental and Power Controls; Fire Suppression; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 11: Security and Vulnerability in the Network; Network Security Threats

Secure Network Administration Principles

Sommario/riassunto

"Get a host of extras with this Deluxe version of our top-selling Security+ study guide!Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition. In addition to the 100% coverage of all exam objectives and study tools you'll find in the regular study guide, the Deluxe Edition gives additional hands-on exercises and study aides, three additional practice exams, over 100 additional electronic flashcards, valuable video demonstrations by the author, and an exclusive security administration simulator. Provides 100% coverage of all exam objectives for Security+ exam SY0-301 Packed with a hundred additional pages, located on the CD Features Deluxe-Edition-only additional practice exams and electronic flashcard, video demonstrations, and an exclusive Security Administrator simulator so you can practice in a real-world environment Covers key topics such as general security concepts, communication and infrastructure security, the basics of cryptography, operational security, and more Shows you pages of practical examples and offers insights drawn from the real world Get deluxe preparation, pass the exam, and jump-start your career. It all starts with CompTIA Security+ Deluxe Study Guide, 2nd Edition"--