Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Exploitation
  • Language: en
  • Pages: 336

Exploitation

With this volume, Professor Wertheimer discusses when a transaction can be properly regarded as exploitative - as opposed to some other moral deficiency - and explores the moral weight of taking unfair advantage.

Augmented Exploitation
  • Language: en
  • Pages: 253

Augmented Exploitation

  • Type: Book
  • -
  • Published: 2021
  • -
  • Publisher: Unknown

Artificial intelligence should be changing society, not reinforcing capitalist notions of work.

Labour and Value: Rethinking Marx’s Theory of Exploitation
  • Language: en
  • Pages: 124

Labour and Value: Rethinking Marx’s Theory of Exploitation

In this book Ernesto Screpanti provides a rigorous examination of Marx’s theory of exploitation, one of the cornerstones of Marxist thought. With precision and clarity, he identifies the holes in traditional readings of Marx’s theory before advancing his own original interpretation, drawing on contemporary philosophy and economic theory to provide a refreshingly interdisciplinary exegesis. Screpanti’s arguments are delivered with perspicuity and verve: this is a book that aims to spark a debate. He exposes ambiguities present in Marx’s exposition of his own theory, especially when dealing with the employment contract and the notions of ‘abstract labor’ and ‘labor value’, and ...

Child Exploitation and Trafficking
  • Language: en
  • Pages: 445

Child Exploitation and Trafficking

  • Categories: Law

Each year, more than two million children around the world fall victim to commercial sexual exploitation. The numbers of children sexually abused for non-commercial purposes are even higher. Put simply, the growing, increasingly-organized epidemic of child exploitation demands a coordinated response. The aim of this book is to bring some fresh thinking to this complicated area of the law, and to help erase some of its counterproductive mythology. The book provides the first comprehensive, practical introduction to the history and present-day reality of child sexual exploitation, as well as to the interconnected web of domestic and transnational federal laws and law enforcement efforts launch...

A Guide to Kernel Exploitation
  • Language: en
  • Pages: 466

A Guide to Kernel Exploitation

  • Type: Book
  • -
  • Published: 2010-10-28
  • -
  • Publisher: Elsevier

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build t...

Understanding and Responding to Child Sexual Exploitation
  • Language: en
  • Pages: 138

Understanding and Responding to Child Sexual Exploitation

The issue of child sexual exploitation (CSE) has received intense scrutiny in recent years, following a number of high profile legal cases, serious case reviews and inquiries. This has resulted in increasing expectations that those working in the field will know how to appropriately manage and respond to this form of abuse. Of course, this is no easy task given the widely acknowledged difficulties of identifying and responding to sexual abuse and the particular complexities associated with the gain dynamic within CSE and the predominantly older age of children affected by it. This edited collection draws on the latest research evidence and academic thinking around CSE to consider issues of u...

Hacking- The art Of Exploitation
  • Language: en
  • Pages: 214

Hacking- The art Of Exploitation

This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.

Labour Exploitation and Work-Based Harm
  • Language: en
  • Pages: 296

Labour Exploitation and Work-Based Harm

  • Type: Book
  • -
  • Published: 2017-04-19
  • -
  • Publisher: Policy Press

Labour exploitation is a highly topical though complex issue that has international resonance for those concerned with social justice and social welfare, but there is a lack of research available about it. This book, part of the Studies in Social Harm series, is the first to look at labour exploitation from a social harm perspective, arguing that, as a global social problem, it should be located within the broader study of work-based harm. Written by an expert in policy orientated research, he critiques existing approaches to the study of workplace exploitation, abuse and forced labour. Mapping out a new sub-discipline, this innovative book aims to shift power from employers to workers to reduce levels of labour exploitation and work-based harm. It is relevant to academics from many fields as well as legislators, policy makers, politicians, employers, union officials, activists and consumers.

Exploitation
  • Language: en
  • Pages: 299

Exploitation

Contemporary theoretical discussions of exploitation are dominated by thinkers in the liberal and Marxian traditions. Exploitation: From Practice to Theory, pushes past these traditional and binary explanations, to focus on unjust practises that both depend on and perpetuate inequalities central to exploitation. Using real-world examples, the chapters in this collection address key questions, including, in what ways are exploitation practices globalised, racialized and gendered? How do cases of organ selling, price gouging and commercial gestational surrogacy change our understandings of exploitation? What possible social and economic remedies do these new conceptions prescribe? Case studies in this volume span the globe, dealing with developed and developing countries alike and in a variety of national and transnational contexts.

Network Attacks and Exploitation
  • Language: en
  • Pages: 231

Network Attacks and Exploitation

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance t...