Search (3 results, page 1 of 1)

  • × year_i:[2020 TO 2030}
  • × type_ss:"m"
  1. Gellman, B.: ¬Der dunkle Spiegel : Edward Snowden und die globale Überwachungsindustrie (2020) 0.02
    0.021944785 = product of:
      0.04388957 = sum of:
        0.04388957 = product of:
          0.08777914 = sum of:
            0.08777914 = weight(_text_:dokumente in 5991) [ClassicSimilarity], result of:
              0.08777914 = score(doc=5991,freq=2.0), product of:
                0.25999573 = queryWeight, product of:
                  5.092943 = idf(docFreq=737, maxDocs=44218)
                  0.05105019 = queryNorm
                0.33761764 = fieldWeight in 5991, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  5.092943 = idf(docFreq=737, maxDocs=44218)
                  0.046875 = fieldNorm(doc=5991)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Der Journalist Barton Gellman erhielt vom Whistleblower Edward Snowden eine Fülle streng geheimer Dokumente. Seitdem wird er von der US-Regierung überwacht. In seinem neuen Buch berichtet der Pulitzer-Preisträger, wie er mit der Überwachung umgeht und was das mit ihm macht. »Verax« - unter diesem Namen kontaktierte ein geheimnisvoller Informant Barton Gellman. Der Journalist konnte nicht ahnen, dass sich dahinter Edward Snowden verbarg - und der größte Überwachungsskandal aller Zeiten. Jetzt legt der dreifache Pulitzer-Preisträger die definitive Gesamtdarstellung der globalen Überwachung vor. »Der dunkle Spiegel« ist alles zusammen: Spionage-Thriller, Insider-Bericht, investigative Reportage - und ein einzigartiges Zeugnis der unersetzlichen Rolle des Journalismus. Wie in einem Krimi erzählt Gellman von Snowdens Leak bis zum heutigen Überwachungskapitalismus des Silicon Valley die ganze Geschichte. Gegen den Widerstand von Geheimdiensten der ganzen Welt gelingt es ihm, die Puzzleteile zusammenzusetzen. Als sein Rechner vor seinen eigenen Augen gehackt wird, ist ihm klar: Hier sind Mächte am Werk, die kaum zu kontrollieren sind. Doch wer spioniert uns aus und warum? Sein Buch ist die Antwort auf diese Fragen.
  2. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.01
    0.006916596 = product of:
      0.013833192 = sum of:
        0.013833192 = product of:
          0.027666384 = sum of:
            0.027666384 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.027666384 = score(doc=566,freq=2.0), product of:
                0.17876907 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.05105019 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
  3. Boczkowski, P.; Mitchelstein, E.: ¬The digital environment : How we live, learn, work, and play now (2021) 0.01
    0.006916596 = product of:
      0.013833192 = sum of:
        0.013833192 = product of:
          0.027666384 = sum of:
            0.027666384 = weight(_text_:22 in 1003) [ClassicSimilarity], result of:
              0.027666384 = score(doc=1003,freq=2.0), product of:
                0.17876907 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.05105019 = queryNorm
                0.15476047 = fieldWeight in 1003, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=1003)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Date
    22. 6.2023 18:25:18