Screen Shots


Book Description

In the last two decades, amid the global spread of smartphones, state killings of civilians have increasingly been captured on the cameras of both bystanders and police. Screen Shots studies this phenomenon from the vantage point of the Israeli occupation of Palestinian territories. Here, cameras have proliferated as political tools in the hands of a broad range of actors and institutions, including Palestinian activists, Israeli soldiers, Jewish settlers, and human rights workers. All trained their lens on Israeli state violence, propelled by a shared dream: that advances in digital photography—closer, sharper, faster—would advance their respective political agendas. Most would be let down. Drawing on ethnographic work, Rebecca L. Stein chronicles Palestinian video-activists seeking justice, Israeli soldiers laboring to perfect the military's image, and Zionist conspiracy theorists accusing Palestinians of "playing dead." Writing against techno-optimism, Stein investigates what camera dreams and disillusionment across these political divides reveal about the Israeli and Palestinian colonial present, and the shifting terms of power and struggle in the smartphone age.




Screenshot


Book Description

We are launching our exciting new Point Paperbacks imprint with this novel from acclaimed author Donna Cooner, about the way we live our lives -- and lies -- on social media. Skye's social media game is always on point. Until her best friend, Asha, films an embarrassing video of Skye at a sleepover and posts it online. But Asha quickly deletes the post, so everything's okay. Right?Then Skye gets an anonymous message. Someone has texted her a screenshot from the video. This person threatens to share the shocking photo online . . . unless Skye does whatever they say. Skye's perfect image -- and privacy -- are suddenly in jeopardy. What will Skye do to keep the screenshot under wraps? And who is trying to ruin her life?




Book Design Made Simple


Book Description

Book Design Made Simple gives DIY authors, small presses, and graphic designers--novices and experts alike--the power to design their own books. It's the first comprehensive book of its kind, explaining every step from installing Adobe(R) InDesign(R) right through to sending the files to press. For those who want to design their own books but have little idea how to proceed, Book Design Made Simple is a semester of book design instruction plus a publishing class rolled into one. Let two experts guide you through the process with easy step-by-step instructions, resulting in a professional-looking top-quality book







Web Design In Simple Steps


Book Description




Cisco Router and Switch Forensics


Book Description

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book currently covers forensic analysis of Cisco network devices in any detail. Cisco Router and Switch Forensics is the first book devoted to criminal attacks, incident response, data collection, and legal testimony on the market leader in network devices, including routers, switches, and wireless access points. Why is this focus on network devices necessary? Because criminals are targeting networks, and network devices require a fundamentally different approach than the process taken with traditional forensics. By hacking a router, an attacker can bypass a network's firewalls, issue a denial of service (DoS) attack to disable the network, monitor and record all outgoing and incoming traffic, or redirect that communication anywhere they like. But capturing this criminal activity cannot be accomplished with the tools and techniques of traditional forensics. While forensic analysis of computers or other traditional media typically involves immediate shut-down of the target machine, creation of a duplicate, and analysis of static data, this process rarely recovers live system data. So, when an investigation focuses on live network activity, this traditional approach obviously fails. Investigators must recover data as it is transferred via the router or switch, because it is destroyed when the network device is powered down. In this case, following the traditional approach outlined in books on general computer forensics techniques is not only insufficient, but also essentially harmful to an investigation.Jargon buster: A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). A router is a more sophisticated network device that joins multiple wired or wireless networks together. - The only book devoted to forensic analysis of routers and switches, focusing on the operating system that runs the vast majority of network devices in the enterprise and on the Internet - Outlines the fundamental differences between router forensics and traditional forensics, a critical distinction for responders in an investigation targeting network activity - Details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony




Mobile Sensing in Psychology


Book Description

How can large-scale, real-time, and real-world data on people’s behaviors, interactions, and environments improve psychological measurement, or lead to customized psychological interventions? Written expressly for social and behavioral scientists, this cutting-edge handbook describes the key concepts and tools of mobile sensing and explains how to plan and conduct a mobile sensing study. Renowned experts address the whats, whys, and how-tos of collecting "big data" using smartphones and other wearables, and explore which research questions can best be addressed with these tools. Modern statistical methods for analyzing mobile sensing data are described--for example, dynamic structural equation modeling, network modeling, and machine learning, including deep neural networks. The book includes best-practice research examples of applications in clinical psychology, aging, neuroscience, health, emotions, relationships, personality, the workplace, and other areas. Key methodological challenges and ethical/privacy issues are highlighted throughout.




Advancing Digital Humanities


Book Description

Advancing Digital Humanities moves beyond definition of this dynamic and fast growing field to show how its arguments, analyses, findings and theories are pioneering new directions in the humanities globally.




Ageing with Smartphones in Urban China


Book Description

If we want to understand contemporary China, the key is through understanding the older generation. This is the generation in China whose life courses almost perfectly synchronised with the emergence and growth of the ‘New China’ under the rule of the Communist Party (1949). People in their 70s and 80s have double the life expectancy of their parents’ generation. The current eldest generation in Shanghai was born in a time when the average household could not afford electric lights, but today they can turn their lights off via their smartphone apps. Based on 16-month ethnographic fieldwork in Shanghai, Ageing with Smartphones in Urban China tackles the intersection between the ‘two revolutions’ experienced by the older generation in Shanghai: the contemporary smartphone-based digital revolution and the earlier communist revolutions. We find that we can only explain the smartphone revolution if we first appreciate the long-term consequences of these people’s experiences during the communist revolutions. The context of this book is a wide range of drastic social transformations in China, from the Cultural Revolution to the individualism and Confucianism in Digital China. Supported by detailed ethnographic material, the observations and analysis provide a panorama view of the social landscape of contemporary China, including topics such as the digital and everyday life, ageing and healthcare, intergenerational relations and family development, community building and grassroots organizations, collective memories and political attitudes among ordinary Chinese people.




Self-Publishing: Process and Tools


Book Description

A personal journey through the process of self-publishing and the tools used to do it. Details the exhilaration and frustration; the errors and corrections and finally...the end product...3 self-published books.