Border Hacker


Book Description

An unlikely friendship, a four-thousand-mile voyage, and an impenetrable frontier—this dramatic odyssey reveals the chaos and cruelty US immigration policies have unleashed beyond our borders. Axel Kirschner was a lifelong New Yorker, all Queens hustle and bravado. But he was also undocumented. After a minor traffic violation while driving his son to kindergarten, Axel was deported to Guatemala, a country he swore he had not lived in since he was a baby. While fighting his way back through Mexico on a migrant caravan, Axel met Levi Vonk, a young anthropologist and journalist from the US. That chance encounter would change both of their lives forever. Levi soon discovered that Axel was no ordinary migrant. He was harboring a secret: Axel was a hacker. This secret would launch the two friends on a dangerous adventure far beyond what either of them could have imagined. While Axel’s abilities gave him an edge in a system that denied his existence, they would also ensnare him in a tangled underground network of human traffickers, corrupt priests, and anti-government guerillas eager to exploit his talents for their own ends. And along the way, Axel’s secret only raised more questions for Levi about his past. How had Axel learned to hack? What did he want? And was Axel really who he said he was? Border Hacker is at once an adventure saga—the story of a man who would do anything to return to his family, and the friend who would do anything to help him—and a profound parable about the violence of American immigration policy told through a single, extraordinary life.




Border Hacker


Book Description

An unlikely friendship, a four-thousand-mile voyage, and an impenetrable frontier--this dramatic odyssey reveals the chaos and cruelty US immigration policies have unleashed beyond our borders. Axel Kirschner was a lifelong New Yorker, all Queens hustle and bravado. But he was also undocumented. After a minor traffic violation while driving his son to kindergarten, Axel was deported to Guatemala, a country he swore he had not lived in since he was a baby. While fighting his way back through Mexico on a migrant caravan, Axel met Levi Vonk, a young anthropologist and journalist from the US. That chance encounter would change both of their lives forever. Levi soon discovered that Axel was no ordinary migrant. He was harboring a secret: Axel was a hacker. This secret would launch the two friends on a dangerous adventure far beyond what either of them could have imagined. While Axel's abilities gave him an edge in a system that denied his existence, they would also ensnare him in a tangled underground network of human traffickers, corrupt priests, and anti-government guerillas eager to exploit his talents for their own ends. And along the way, Axel's secret only raised more questions for Levi about his past. How had Axel learned to hack? What did he want? And was Axel really who he said he was? Border Hacker is at once an adventure saga--the story of a man who would do anything to return to his family, and the friend who would do anything to help him--and a profound parable about the violence of American immigration policy told through a single, extraordinary life.




Code Work


Book Description

How Mexican and Latinx hackers apply concepts from coding to their lived experiences In Code Work, Héctor Beltrán examines Mexican and Latinx coders’ personal strategies of self-making as they navigate a transnational economy of tech work. Beltrán shows how these hackers apply concepts from the code worlds to their lived experiences, deploying batches, loose coupling, iterative processing (looping), hacking, prototyping, and full-stack development in their daily social interactions—at home, in the workplace, on the dating scene, and in their understanding of the economy, culture, and geopolitics. Merging ethnographic analysis with systems thinking, he draws on his eight years of research in México and the United States—during which he participated in and observed hackathons, hacker schools, and tech entrepreneurship conferences—to unpack the conundrums faced by workers in a tech economy that stretches from villages in rural México to Silicon Valley. Beltrán chronicles the tension between the transformative promise of hacking—the idea that coding will reconfigure the boundaries of race, ethnicity, class, and gender—and the reality of a neoliberal capitalist economy divided and structured by the US/México border. Young hackers, many of whom approach coding in a spirit of playfulness and exploration, are encouraged to appropriate the discourses of flexibility and self-management even as they remain outside formal employment. Beltrán explores the ways that “innovative culture” is seen as central in curing México’s social ills, showing that when innovation is linked to technological development, other kinds of development are neglected. Beltrán’s highly original, wide-ranging analysis uniquely connects technology studies, the anthropology of capitalism, and Latinx and Latin American studies.




Hacker's Guide to Visual FoxPro 6.0


Book Description

An irreverent look at how Visual FoxPro really works. Tells you the inside scoop on every command, function, property, event and method of "Tahoe." The eagerly awaited revision to the Hacker's Guide for Visual FoxPro 3.0, this completely updated book is the one you'll keep by your side for as long as you develop in Visual FoxPro.




Hackers & Painters


Book Description

The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.




Public Health Aspects of HIV/AIDS in Low and Middle Income Countries


Book Description

It has now been 25 years since the apocryphal report in the CDC Morbidity and Mortality Weekly Report dated June 5, 1981 entitled, “Pneumocystis Pneumonia - Los Angeles”, which announced what was to become HIV/AIDS. HIV has now affected virtually all countries that have looked for it and has had a devastating impact on the public health and medical care infrastructure around the world. HIV/AIDS has also disproportionately affected nations with the least capacity to confront it, especially the developing world nations in Sub-Saharan Africa, South and Southeast Asia, and the emerging republics of Eastern and Central Asia. The pandemic, unlike any other disease of our time, has had profound impacts on the practice of public health itself: bringing affected communities into decision making; demanding North-South partnerships and collaborations; and changing the basic conduct of clinical and prevention trials research. While much has been written in scholarly publications for medical, epidemiologic and disease control specialists, there is no comprehensive review of the public health impact and response to HIV/AIDS in the developing world. This edited volume seeks to systematically describe the emergence and form of the epidemics (epidemiology), the social, community and political response, and the various measures to confront and control the epidemic, with varying levels of success. Of particular importance are strategies that appear to have been useful in ameliorating the epidemic, while contrasting the situation in a neighboring country or region where contrasting prevention or care initiatives have had a deleterious outcome. Common to all responses has been the international multi-sectoral response represented by the Global Fund for HIV/AIDS, Malaria and Tuberculosis, the President's Emergency Plan for AIDS Relief, and the Gates Foundation, among others, to promote HIV pharmacologic therapy in resource-poor settings. The chapter authors will explore the political challenges in meeting HIV/AIDS prevention and care in concert with the public health realities in specific country and regional context.




Visions of Invasion


Book Description

Visions of Invasion: Alien Affects, Cinema, and Citizenship in Settler Colonies explores how the US government mobilizes media and surveillance technologies to operate a highly networked, multidimensional system for controlling migrants. Author Michael Lechuga focuses on three arenas where a citizenship control assemblage manufactures alienhood: Hollywood extraterrestrial invasion film, federal antimigration and border security legislation, and various immigration enforcement protocols implemented along the Mexico–United States border. Building on rhetorical studies, settler colonial studies, and media studies, Visions of Invasion offers a glimpse at how the processes of alien-making contribute to an ongoing settler colonial project in the US. Lechuga demonstrates that popular films—The War of the Worlds, Predator, Men in Black, and more—participate in the production of migrants as subjective terrorists, felons, and other noncitizen personae vilified in public discourse. Beyond just tracing how alien invasion narratives circulate in popular media, Lechuga describes how the logics motivating early US colonists materialize in both the US’s citizenship control policy and in some of the country’s most popular texts. Beneath each of the film franchises and antimigrant political expressions described in Visions of Invasion lies an anxious colonial logic in which the settler way of life is seemingly threated by false narratives of imminent invasion from abroad. The volume offers a deep dive into how the rhetorical figure of the alien has been manufactured as a political subjectivity, one that plays out the anxieties, guilts, and fears of colonialism in today’s science fiction landscape.




Encyclopedia of Frontier Biography: G-O


Book Description

Includes biographical information on 4,500 individuals associated with the frontier




The Electronic Intrusion Threat to National Security and Emergency Preparedness Telecommunications


Book Description

Summarizes the current and historical electronic intrusion threat to U.S. national security and emergency preparedness (NS/EP) telecommunications, identifying and analyzing the threat that electronic intrusion represents to the Public Switched Network. Contents: electronic intruders (skills and techniques, insiders, industrial spies, foreign intelligence services); targeted technologies and services (data networks, international gateways, signaling networks, wireless systems, other emerging technologies); potential NS/EP implications (disruption of service, etc.); reaction strategies. Diagrams. Glossary.




LulzSec: How A Handful Of Hackers Brought The US Government To Its Knees


Book Description

LulzSec is a group of Web hackers who made themselves famous for their barrage of attacks and their sarcastic taunting of victims during the summer of 2011. Members of LulzSec, short for Lulz Security, committed many well-publicized online attacks in the span of several weeks. The successful attacks included publicizing hundreds of thousands of passwords and user names from customers of supposedly secure Web sites. LulzSec’s history is a short, busy one. The group’s first known attack occurred in May 2011. By July 2011, 50 days after its first publicized hack, Lulz Security released a statement saying it would be disbanding. In between, LulzSec was in the news almost daily. LulzSec: 50 Days of Lulz is a book that offers an eye-opening account of the headline-grabbing hacker group. In this eBook, you'll learn what motivated LulzSec, what methods they used, and how their attacks affected the world.