age_of_surveillance_capitalism_table_of_contents

Age of Surveillance Capitalism Table of Contents

Return to Age of Surveillance Capitalism], Security, Privacy, and Anonymity, One Nation, Under Surveillance - Privacy from the Watchful Eye by Boston T. Party, Security Bibliography, Cybersecurity, Awesome Privacy, Awesome Security

CONTENTS

Cover

Title Page

Copyright

Dedication

The Definition

INTRODUCTION

1 Home or Exile in the Digital Future

PART I

THE FOUNDATIONS OF SURVEILLANCE CAPITALISM

2 August 9, 2011: Setting the Stage for Surveillance Capitalism

3 The Discovery of Behavioral Surplus

4 The Moat Around the Castle

5 The Elaboration of Surveillance Capitalism: Kidnap, Corner, Compete

6 Hijacked: The Division of Learning in Society

PART II

THE ADVANCE OF SURVEILLANCE CAPITALISM

7 The Reality Business

8 Rendition: From Experience to Data

9 Rendition from the Depths

10 Make Them Dance

11 The Right to the Future Tense

PART III

INSTRUMENTARIAN POWER FOR A THIRD MODERNITY

12 Two Species of Power

13 Big Other and the Rise of Instrumentarian Power

14 A Utopia of Certainty

15 The Instrumentarian Collective

16 Of Life in the Hive

17 The Right to Sanctuary

CONCLUSION

18 A Coup from Above

Acknowledgments

About the Author

Praise for The Age of Surveillance Capitalism

Detailed Table of Contents

Notes

Index

Privacy: Anonymity vs Privacy vs Security, Private, Security, Cybersecurity, Data Privacy, Advertising, Right to Privacy, Privacy Rights, Self-Hosted, Anonymity-Anonymous, Security, Data Collection, You are the Product, Privacy Bibliography, Manning Privacy Series, One Nation, Under Surveillance - Privacy from the Watchful Eye, Surveillance Valley - The Rise of the Military-Digital Complex, GitHub Privacy, Awesome Privacy. (navbar_privacy - see also navbar_security, navbar_bigtech, navbar_advertising)

Cybersecurity: DevSecOps - Security Automation, Cloud Security - Cloud Native Security (AWS Security - Azure Security - GCP Security - IBM Cloud Security - Oracle Cloud Security, Container Security, Docker Security, Podman Security, Kubernetes Security, Google Anthos Security, Red Hat OpenShift Security); Identity and Access Management (IAM), OS Security, Java Security, Security, (Mobile Security: Android Security - Kotlin Security - Java Security, iOS Security - Swift Security; Windows Security - Windows Server Security, Linux Security (Ubuntu Security, Debian Security, RHEL Security, Fedora Security), UNIX Security (FreeBSD Security), IBM z Mainframe Security, Passwords, Linux Passwords, Windows Passwords), Passkeys, Hacking (Ethical Hacking, White Hat, Black Hat, Grey Hat), Pentesting (Red Team - Blue Team - Purple Team), Cybersecurity Certifications (CEH, GIAC, CISM, CompTIA Security Plus, CISSP), Mitre Framework, Common Vulnerabilities and Exposures (CVE), Cybersecurity Bibliography, Cybersecurity Courses, Firewalls, Cybersecurity CI/CD, Functional Programming and Cybersecurity, Cybersecurity and Concurrency, Cybersecurity and Data Science - Cybersecurity and Databases, Cybersecurity and Machine Learning, Cybersecurity Glossary (RFC 4949 Internet Security Glossary), Awesome Cybersecurity, Cybersecurity GitHub, Cybersecurity Topics (navbar_security - see also navbar_aws_security, navbar_azure_security, navbar_gcp_security, navbar_k8s_security, navbar_docker_security, navbar_podman_security, navbar_mainframe_security, navbar_ibm_cloud_security, navbar_oracle_cloud_security, navbar_database_security, navbar_windows_security, navbar_linux_security, navbar_macos_security, navbar_android_security, navbar_ios_security, navbar_os_security, navbar_firewalls, navbar_encryption, navbar_passwords, navbar_iam, navbar_pentesting, navbar_privacy)


© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers

SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.


age_of_surveillance_capitalism_table_of_contents.txt · Last modified: 2024/04/28 03:51 (external edit)