| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996387471503316 |
|
|
Autore |
Brooks Thomas <1608-1680.> |
|
|
Titolo |
A string of pearls; or, The best things reserved till last [[electronic resource] ] : Discovered in a sermon preached in London, June 8, 1657, at the funeral of (that triumphant saint Mrs. Mary Blake, late wife to his worthy friend) Mr. Nicholas Blake, merchant, with an elegy on her death. / / [By] Thomas Brooks . |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, : Printed for John Hancock, and are to be sold at his shop ..., 1674 |
|
|
|
|
|
|
|
|
|
Edizione |
[The ninth edition.] |
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
Funeral sermons |
Sermons, English - 17th century |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Imperfect: lacks p. 23-26; pages tightly bound with slight loss of print. |
Errors in paging: p. 169-192 lacking in number only. |
Reproduction of original in: British Library. |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910969246703321 |
|
|
Autore |
Brunton Finn <1980-> |
|
|
Titolo |
Obfuscation : a user's guide for privacy and protest / / Finn Brunton, Helen Nissenbaum |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cambridge, Massachusetts ; ; London, England : , : The MIT Press, , [2015] |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
9780262331319 |
0-262-33132-2 |
0-262-33131-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (x, 123 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Privacy, Right of - United States |
Information technology - Social aspects - United States |
Information policy - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Contents; Acknowledgments; Introduction; I. An Obfuscation Vocabulary; 1 Core Cases; 2 Other Examples; II. Understanding Obfuscation; 3 Why Is Obfuscation Necessary?; 4 Is Obfuscation Justified?; 5 Will Obfuscation Work?; Epilogue; Notes; Bibliography; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage -- especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data |
|
|
|
|
|
|
|
|
|
|
safe, and policy makers to gather data without misusing it. --Publisher. |
|
|
|
|
|
| |