LEADER 01600nam--2200445---450 001 990003200890203316 005 20230627121201.0 010 $a978-88-89821-25-1 035 $a000320089 035 $aUSA01000320089 035 $a(ALEPH)000320089USA01 035 $a000320089 100 $a20090302d2008----km-y0itay50------ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aGiovanni Cuomo$euna vita per Salerno e il Mezzogiorno$eatti del convegno nazionale di studi$eSalerno, 12-14 dicembre 2007$fa cura di Vittoria Bonani 210 $aAngri$cGaia$d2008 215 $a126 p.$d24 cm 225 2 $aBiblioteca Co.sto.sa$v3 300 $aIn testa al frontespizio: Sotto l'Alto Patronato del Presidente della Repubblica, Assessorato ai Beni e alle Attivitą culturali, Biblioteca provinciale di Salerno 300 $aNell'occhietto: Dono della Biblioteca provinciale di Salerno, gennaio 2009 410 0$12001$aBiblioteca Co.sto.sa 600 1$aCuomo,$bGiovanni$xAtti di congressi$2BNCF 676 $a945.0916092 702 1$aBONANI,$bVittoria 801 0$aIT$bsalbc$gISBD 912 $a990003200890203316 951 $aXV.1.A. 1315$b215196 L.M.$cXV.1.$d00191586 951 $aXV.15. 89$b270624 L.M.$cXV.15.$d00152624 951 $aXV.22.C. 39$b278705 L.M.$cXV.22.$d543870 959 $aBK 969 $aLOCA 969 $aFCACCIA 969 $aFGAL 979 $aGIUSY$b90$c20090302$lUSA01$h1100 979 $aGIUSY$b90$c20090302$lUSA01$h1106 979 $aGIUSY$b90$c20090302$lUSA01$h1111 996 $aGiovanni Cuomo$91015230 997 $aUNISA LEADER 04063nam 2200385 450 001 9910597893003321 005 20230627203312.0 010 $a1-62892-152-8 024 7 $a10.5040/9781628926705 035 $a(CKB)4100000010860393 035 $a(NjHacI)994100000010860393 035 $a(EXLCZ)994100000010860393 100 $a20230627d2014 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComing Swarm $eDDOS Actions, Hacktivism, and Civil Disobedience on the Internet /$fMolly Sauter 210 1$aNew York :$cBloomsbury Academic & Professional,$d2014. 215 $a1 online resource (xv, 168 pages) 320 $aIncludes bibliographical references and index. 327 $aTitle Page; Additional Praise for the Coming Swarm; Copyright Page; Contents; Acknowledgments; Foreword by ETHAN ZUCKERMAN ; Introduction: Searching for the digital street; The structure of this work; Technical note; Legal note; Notes; Chapter 1 DDoS and Civil Disobedience in historical context; Silence and disruption in the time of constant comment; "Full and free discussion even of ideas we hate"; Notes; Chapter 2 Blockades and blockages: DDoS as direct action; Functional metaphors of geography and physicality; Shouting down your opponent: The censorship critique. The Euskal Herria Journal and the IGCThe "Deportation class" action; Notes; Chapter 3 Which way to the #press channel? DDoS as media manipulation; Terrorist, hacker, artist, nuisance: The many media reflections of the EDT; Allies in the toywar; Anonymous and the media: Manipulation, entertainment, and readymades; Shadows in the monitor:The CAE's symbolic dissent critique; What does winning look like?; Notes; Chapter 4 Show me what an activist looks like: DDoS as a method of biographical impact; The culture of the Hive; Anonymous' hacker identity; Notes. Chapter 5 Identity, anonymity, and responsibility: DDoS and the personalDDoS and impure dissent; Identity, anonymity, and responsibility within protest; Accessibility in technologically defined tactical spaces; Notes; Chapter 6 LOIC will tear us apart: DDoS tool development and design; The Electronic Disturbance Theater and FloodNet; Anonymous, Operation Payback and LOIC; A forked comparison: abatishchev and NewEraCracker; Changes in the technology; Notes; Chapter 7 Against the man: State and corporate responses to DDoS actions; Terrorism accusations and the CFAA. GCHQ's rolling thunder and the (re)militarization of the internetThe internet as melded commercial/military space; The avatar nature of online brand presence; Notes; Conclusion: The future of DDoS; Note; Index; Biographies; Foreword by. 330 $a"This book examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. The internet is a vital arena of communication, self expression, and interpersonal organizing. When there is a message to convey, words to get out, people to organize, many will turn to the internet as a theater for that activity. As familiar and widely accepted activist tools--petitions, fundraisers, mass letter-writing, call-in campaigns and others--find equivalent practices in the online space, is there also room for the tactics of disruption and civil disobedience that are equally familiar from the realm of street marches, occupations, and sit-ins? Grounding the analysis historically, focusing on early deployments of activist DDOS as well as modern instances to trace its development over time, this book uses activist DDOS actions as the foundation of a larger analysis of the practice of disruptive civil disobedience on the internet"--$cProvided by publisher. 517 $aComing Swarm 606 $aHacktivism 615 0$aHacktivism. 676 $a364.168 700 $aSauter$b Molly$0803464 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910597893003321 996 $aComing Swarm$91804707 997 $aUNINA