eBooks-it.org Logo
eBooks-IT.org Inner Image

MIX eBooks Page 58

Download free MIX eBooks Page 58

A Networked Self

Identity, Community, and Culture on Social Network Sites
A Networked Self Image
ANetworked Selfexamines self presentation and social connection in the digital age. This collection brings together new work on online social networks by leading scholars from a variety of disciplines. The focus of the volume rests on the construction of the self, and what happens to self-identity when it is presented through networks of social connections in new media environments. The volume is structured around the core themes of identity, community, and culture the central themes of social network sites. Contributors address theory, research, and practical implications of many aspects of online social networks including self-presentation, behavioral norms, patterns and routines, social impact, privacy, class/gender/race divides, taste cultures o...

Virtual Freedom

Net Neutrality and Free Speech in the Internet Age
Virtual Freedom Image
Communications giants like Google, Comcast, and AT&T enjoy increasingly unchecked control over speech. As providers of broadband access and Internet search engines, they can control online expression. Their online content restrictionsfrom obstructing e-mail to censoring cablecastsare considered legal because of recent changes in free speech law.In this book, Dawn Nunziato criticizes recent changes in free speech law in which only the government need refrain from censoring speech, while companies are permitted to self-regulate. By enabling Internet providers to exercise control over content, the Supreme Court and the FCC have failed to protect the public's right to access a broad diversity of content. Nunziato argues that regulation is necessary t...

Document Security

Protecting Physical and Electronic Content
Document Security Image
Index This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in....

Internet Security

A Jumpstart for Systems Administrators and IT Managers
Internet Security Image
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. Shield data f...

Windows Server 2003 Security Infrastructures

Core Security Features
Windows Server 2003 Security Infrastructures Image
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. *Explains nuts and bolts of Windows Server 2003 security *Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures *Draws on the experience of a lead consultan...



2007 - 2017 © eBooks-IT.org