This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
ci2010:blown_to_bits [2010/03/04 09:45] Chris Mayfield added more PDF tips |
ci2010:blown_to_bits [2010/03/04 10:23] Chris Mayfield added 190 vs BtB table |
||
---|---|---|---|
Line 4: | Line 4: | ||
This book is available online as a pdf for free at http://www.bitsbook.com/excerpts/ and the related website with additional material is at http://www.bitsbook.com/. In particular, you may find [[http://www.bitsbook.com/blog/|their blog]] interesting and relevant to your work. | This book is available online as a pdf for free at http://www.bitsbook.com/excerpts/ and the related website with additional material is at http://www.bitsbook.com/. In particular, you may find [[http://www.bitsbook.com/blog/|their blog]] interesting and relevant to your work. | ||
- | To help you navigate the book, the following table summarizes which lecture topics correspond to which chapters. You are of course free to select any chapter, regardless what was covered in class. | + | To help you navigate the book, the following table summarizes which lecture topics //loosely correspond// to which chapters. You are of course free to select any chapter (or related sections from multiple chapters), regardless what was covered in class. |
- | ^ CS 190 Topic ^ Blown to Bits ^ | + | ^ CS 190 Topic ^ Blown to Bits ^ |
- | | ... | ... | | + | | The Internet | Appendix: \\ The Internet as System and Spirit | |
- | | ... | ... | | + | | Social Networking | Chapter 2: Naked in the Sunlight: \\ Privacy Lost, Privacy Abandoned | |
- | | ... | ... | | + | | Security | Chapter 5: Secret Bits: \\ How Codes Became Unbreakable | |
+ | | Ethics | Chapter 7: You Can’t Say That on the Internet: \\ Guarding the Frontiers of Digital Expression | | ||
+ | | Intellectual Property | Chapter 6: Balance Toppled: \\ Who Owns the Bits? | | ||
+ | | Digital Divide | | | ||
+ | | Gaming | | | ||
+ | | History & Computation | Chapter 1: Digital Explosion: \\ Why Is It Happening, and What Is at Stake? | | ||
+ | ^ Other Topics ^ ^ | ||
+ | | Digital Documents | Chapter 3: Ghosts in the Machine: \\ Secrets and Surprises of Electronic Documents | | ||
+ | | Search Engines | Chapter 4: Needles in the Haystack: \\ Google and Other Brokers in the Bits Bazaar | | ||
+ | | Censorship/Regulation | Chapter 8: Bits in the Air: \\ Old Metaphors, New Technologies, and Free Speech | | ||
Specific instructions and guidelines: | Specific instructions and guidelines: |