The CryptoParty Handbook (2012)

4 October 2012, dusan

This handbook is designed to help those with no prior experience to protect their basic human right to Privacy in networked, digital domains. By covering a broad array of topics and use contexts it is written to help anyone wishing to understand and then quickly mitigate many kinds of vulnerability using free, open-source tools. Most importantly however this handbook is intended as a reference for use during Crypto Parties.

Facilitated by Adam Hyde
Core Team: Marta Peirano, Asher Wolf, Julian Oliver, Danja Vasiliev, Malte Dik, Brendan Howell, Jan Gerber, Brian Newbold,
Assisted by Teresa Dillon, AT, Carola Hesse, Chris Pinchen, ‘LiamO’, ‘l3lackEyedAngels’, ‘Story89’, Travis Tueffel
Creative Commons BY-SA 4.0 Unported license
386+ pages
via Julian Oliver

discussion and criticism (Liberationtech list)

authors and more information

Download the latest edition
Contribute (via GitHub)
Contribute (via Booki)

Cryptomorphosis (2012)

9 March 2012, dusan

This is a basic intro to hacktivism, the surveillance industry, online anonymity, encryption, filesharing, and darknets mainly intended for activists, occupiers, and all others passionate about using code and information for social change or just avoiding the seemingly all-seeing eye of the authorities.

Published in January 2012
BY-NC license
54 pages

PDF
View online (Scribd.com)

Shen, Yu, Buford, Akon (eds.): Handbook of Peer-to-Peer Networking (2010)

24 February 2012, dusan

The handbook offers elaborate discussions on fundamentals of peer-to-peer computing models, networks and applications, and provides a comprehensive study on recent advancements, crucial design choices, open problems, and possible solution strategies. It is written by a team of leading international researchers and professionals

Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. In addition, a large range of new applications are under development or being proposed. The underlying architectures share features including decentralization, end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. Trends in information and network technology such as increased performance and deployment of broadband networking, wireless networking, and mobile devices are synergistic with and reinforce the capabilities of this P2P paradigm.

The Handbook of Peer-to-Peer Networking is dedicated to discussions on P2P networks and their applications, thus providing an exhaustive view of the state-of-the-art of the P2P networking field. Written by leading international experts, the volume contains fifty chapters dedicated to the following topics:

• Introduction to Peer-to-Peer Networking
• Unstructured P2P Overlay Architectures
• Structured P2P Overlay Architectures
• Search and Query Processing
• Incentive Mechanisms
• Trust, Anonymity, and Privacy
• Broadcast and Multicast Services
• Multimedia Content Delivery
• Mobile P2P
• Fault Tolerance in P2P Networks
• Measurement and P2P Traffic Characteristics
• Advanced P2P Computing and Networking

This comprehensive volume serves as an essential reference for researchers and professionals, The book is also suitable for computer science and engineering students at the advanced undergraduate level or higher who are familiar with networking, network protocol concepts, and basic ideas about algorithms.

Edited by Xuemin Shen, Heather Yu, John Buford, Mursalin Akon
Publisher Springer New York Dordrecht Heidelberg London
ISBN 978-0-387-09750-3
1421 pages

publisher

PDF