地球村與低頭族

地球村與低頭族
ISBN-10
7552630922
ISBN-13
9787552630923
Category
Computers / Networking / General
Pages
179
Language
Chinese
Published
2018-01-01
Publisher
寧波出版社
Author
詹緒武

Description

總書記在2016年4月網路安全和資訊化工作座談會上指出:用社會主義核心價值觀和人類優秀文明成果滋養人、滋養社會,做到正能量充沛、主旋律高昂,為廣大線民特別是青少年營造一個風清氣正的網路空間。我國青少年一代是在互聯網環境下成長起來的,對青少年進行網路媒介素養教育,一是讓青少年正確認識、使用及發展互聯網,成為網路文明的傳播者、踐行者,二是通過小手拉大手,帶動全社會的網路文明建設。
本叢書共六冊,分別圍繞六個主題展開。本書《地球村與低頭族》描述和剖析互聯網時代地球村與低頭族這兩大社會景觀的面貌,提出低頭族實現主體性回歸,擺脫技術奴役,做到德性生存的建議。
本叢書除了普及相關哲學社會科學知識,進行媒介素養教育以外,還始終滲透了社會主義核心價值觀的主題教育。全書融合了多學科知識,通過案例分析和問題討論,努力做到青少年網路素養教育的通俗化、生活化、體系化

Similar books

  • Voice Over IP
    By Uyless D. Black

    Voice Over IP is the #1 guide for professionals planning or running VoIP applications. Uyless Black covers every current technical standard, protocol, and interoperability solution.

  • Electronic Communications Systems
    By William C. House

    The men responsible for turning such possibilities into realities are Phillip Whittaker , the president of S.B.s. , and John E. Fox , director of marketing and business planning . Whittaker , fifty - eight , is a silver - haired veteran ...

  • Computer Networking Illuminated
    By Todd King, Diane Barrett

    Included are numerous Challenge Exercises, which allow students to gain hands-on experience with networking related tools and utilities, and Challenge Scenarios.

  • Cisco IOS Configuration Fundamentals
    By Cisco Systems, Inc

    Cisco Systems, Inc. Modify the current configuration register setting to reflect the way in which you want to load a system image . To do so , change the least significant hexadecimal digit to one of the following : • 0 to load the ...

  • From Millwrights to Shipwrights to the Twenty-first Century: Explorations in a History of Technical Communication in the United States
    By R. John Brockmann

    The millwrights ' and millers ' resistance to Evans's message was so great that their first recorded reaction was : “ It will not do ! it cannot do !! it is impossible that it should do !!! " 9 Nevertheless , Evans persisted in his ...

  • Principles, Protocols, and Architecture
    By Douglas Comer, David L. Stevens

    Principles, Protocols, and Architecture

  • Network Security Illustrated
    By Jason Albanese, Wes Sonnenreich

    The device has a chin rest , a keypad , and a card - swiping receptacle that resembles those used in retail stores . Steve places his chin on the rest , at which time his retina is scanned .

  • XML: Designing XML internet applications
    By David Megginson

    XML: Designing XML internet applications

  • Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
    By Bill Pennington, David Pollino, Tony Bradley

    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network.

  • 软件定义网络核心原理与应用实践
    By 刘江, 魏亮, 黄韬

    本书分为核心原理和应用实践两大部分, 对软件定义网络(SDN)技术进行了剖析和解读. 第一部分首先阐述了SDN的设计思想与体系架构, ...