The Hackable City


Book Description

This open access book presents a selection of the best contributions to the Digital Cities 9 Workshop held in Limerick in 2015, combining a number of the latest academic insights into new collaborative modes of city making that are firmly rooted in empirical findings about the actual practices of citizens, designers and policy makers. It explores the affordances of new media technologies for empowering citizens in the process of city making, relating examples of bottom-up or participatory practices to reflections about the changing roles of professional practitioners in the processes, as well as issues of governance and institutional policymaking.




Hackable


Book Description

If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application. However, you may be uncertain about what works, what doesn't, how hackers exploit applications, or how much to spend. Or maybe you think you do know, but don't realize what you're doing wrong. To defend against attackers, you must think like them. As a leader of ethical hackers, Ted Harrington helps the world's foremost companies secure their technology. Hackable teaches you exactly how. You'll learn how to eradicate security vulnerabilities, establish a threat model, and build security into the development process. You'll build better, more secure products. You'll gain a competitive edge, earn trust, and win sales.




TiVo Hacks


Book Description

Krikorian offers 100 "industrial strength" tips and tools for using Tivo in this ultimate guide to the digital personal video recorder that's reinventing the way people view TV.




Hacked


Book Description

Themes: Cyber Crime, Hacking, Nonfiction, Tween, Emergent Reader, Chapter Book, Hi-Lo, Hi-Lo Books, Hi-Lo Solutions, High-Low Books, Hi-Low Books, ELL, EL, ESL, Struggling Learner, Struggling Reader, Special Education, SPED, Newcomers, Reading, Learning, Education, Educational, Educational Books. Look out! Your computer data is not safe. There are hackers who will steal it. Sell it. Or destroy it. The hackers are getting smarter. They leave little trace as to their identities. And there are dangerous consequences for individuals, corporations, and governments. Engage your most struggling readers in grades 4-7 with Red Rhino Nonfiction! This new series features high-interest topics in every content area. Visually appealing full-color photographs and illustrations, fun facts, and short chapters keep emerging readers focused. Written at a 1.5-1.9 readability level, these books include pre-reading comprehension questions and a 20-word glossary for comprehension support.




Playable Cities


Book Description

This book addresses the topic of playable cities, which use the ‘smartness’ of digital cities to offer their citizens playful events and activities. The contributions presented here examine various aspects of playable cities, including developments in pervasive and urban games, the use of urban data to design games and playful applications, architecture design and playability, and mischief and humor in playable cities. The smartness of digital cities can be found in the sensors and actuators that are embedded in their environment. This smartness allows them to monitor, anticipate and support our activities and increases the efficiency of the cities and our activities. These urban smart technologies can offer citizens playful interactions with streets, buildings, street furniture, traffic, public art and entertainment, large public displays and public events.




PC Hacks


Book Description

Covering both Windows and Linux, 'PC Hacks' combines the Hacks series style with popular computing hardware, including advice on reusing an old PC to off-load work from newer systems as well as ways to prevent security hacks.




4D Hyperlocal


Book Description

4D Hyperlocal: A Cultural Tool Kit for the Open-source City The evolution of digital tools is revolutionising urban design, planning and community engagement. This is enabling a new ‘hyperlocal’ mode of design made possible by geolocation technologies and GPS-enabled mobile devices that support connectivity through open-source applications. Real-time analysis of environments and individuals’ input and feedback bring a new immediacy and responsiveness. Established linear design methods are being replaced by adaptable mapping processes, real-time data streams and experiential means, fostering more dynamic spatial analysis and public feedback. This shifts the emphasis in urban design from the creation of objects and spaces to collaboration with users, and from centralised to distributed participatory systems. Hyperlocal tools foster dynamic relational spatial analysis, making their deployment in urban and rural contexts challenged by transformation particularly significant. How can hyperlocal methods, solutions – including enterprise-driven uses of technology for bioclimatic design – and contexts influence each other and support the evolution of participatory architectural design? What issues, for example, arise from using real-time data to test scenarios and shape environments through 3D digital visualisation and simulation methods? What are the advantages of using GIS – with its integrative and visualising capacities and relational, flexible definition of scale – with GPS for multi-scalar mapping? Contributors: Saskia Beer, Moritz Behrens, John Bingham-Hall, Mark Burry, Will Gowland and Samantha Lee, Adam Greenfield, Usman Haque, Bess Krietemeyer, Laura Kurgan, Lev Manovich and Agustin Indaco, Claudia Pasquero and Marco Poletto, Raffaele Pe, José Luis de Vicente, Martijn de Waal, Michiel de Lange and Matthijs Bouw, Katharine Willis, and Alejandro Zaera-Polo. Featured architects and designers: AZPML, ecoLogicStudio, Foster + Partners, Interactive Design and Visualization Lab/Syracuse University Center of Excellence for Environmental Energy Systems, Software Studies Initiative/City University of New York (CUNY), Spatial Information Design Lab/Columbia University, Umbrellium, and Universal Assembly Unit.




Hacking Multifactor Authentication


Book Description

Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.




Urban Play


Book Description

Why technology is most transformative when it is playful, and innovative spatial design happens only when designers are both tinkerers and dreamers. In Urban Play, Fábio Duarte and Ricardo Álvarez argue that the merely functional aspects of technology may undermine its transformative power. Technology is powerful not when it becomes optimally functional, but while it is still playful and open to experimentation. It is through play--in the sense of acting for one's own enjoyment rather than to achieve a goal--that we explore new territories, create new devices and languages, and transform ourselves. Only then can innovative spatial design create resonant spaces that go beyond functionalism to evoke an emotional response in those who use them. The authors show how creativity emerges in moments of instability, when a new technology overthrows an established one, or when internal factors change a technology until it becomes a different technology. Exploring the role of fantasy in design, they examine Disney World and its outsize influence on design and on forms of social interaction beyond the entertainment world. They also consider Las Vegas and Dubai, desert cities that combine technology with fantasies of pleasure and wealth. Video games and interactive media, they show, infuse the design process with interactivity and participatory dynamics, leaving spaces open to variations depending on the users' behavior. Throughout, they pinpoint the critical moments when technology plays a key role in reshaping how we design and experience spaces.




(Dis)Obedience in Digital Societies


Book Description

Algorithms are not to be regarded as a technical structure but as a social phenomenon - they embed themselves, currently still very subtle, into our political and social system. Algorithms shape human behavior on various levels: they influence not only the aesthetic reception of the world but also the well-being and social interaction of their users. They act and intervene in a political and social context. As algorithms influence individual behavior in these social and political situations, their power should be the subject of critical discourse - or even lead to active disobedience and to the need for appropriate tools and methods which can be used to break the algorithmic power.