Library Catalogue

Amazon cover image
Image from Amazon.com
Image from Google Jackets

Defend Dissent Glencora Borradaile

Contributor(s): Material type: TextTextSeries: Open textbook libraryDistributor: Minneapolis, MN Open Textbook LibraryPublisher: Corvallis, Oregon Oregon State University [2021]Copyright date: ©2021Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781955101059
Subject(s): LOC classification:
  • QA76
Online resources:
Contents:
Introduction: Why Digital Security? -- Part 1: An Introduction to Cryptography -- Part 2: Digital Suppression of Social Movements (in the US) -- Part 3: Defending Social Movements (in the US) -- Conclusion: Selecting Digital Security Tools
Subject: Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s.This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Introduction: Why Digital Security? -- Part 1: An Introduction to Cryptography -- Part 2: Digital Suppression of Social Movements (in the US) -- Part 3: Defending Social Movements (in the US) -- Conclusion: Selecting Digital Security Tools

Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s.This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next.

Attribution-NonCommercial

In English.

Description based on print resource

There are no comments on this title.

to post a comment.

© 2024, Kenya Medical Training College | All Rights Reserved