Best of
Technology
2014
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos - 2014
Whether you're building the next killer app, investing in a startup, or simply curious about the technology, this practical book is essential reading.Bitcoin, the first successful decentralized digital currency, is still in its infancy and it's already spawned a multi-billion dollar global economy. This economy is open to anyone with the knowledge and passion to participate. Mastering Bitcoin provides you with the knowledge you need (passion not included).This book includes:A broad introduction to bitcoin--ideal for non-technical users, investors, and business executivesAn explanation of the technical foundations of bitcoin and cryptographic currencies for developers, engineers, and software and systems architectsDetails of the bitcoin decentralized network, peer-to-peer architecture, transaction lifecycle, and security principlesOffshoots of the bitcoin and blockchain inventions, including alternative chains, currencies, and applicationsUser stories, analogies, examples, and code snippets illustrating key technical concepts
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
Al Sweigart - 2014
But what if you could have your computer do them for you?In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple filesCreate, update, move, and rename files and foldersSearch the Web and download online contentUpdate and format data in Excel spreadsheets of any sizeSplit, merge, watermark, and encrypt PDFsSend reminder emails and text notificationsFill out online formsStep-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks.Don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work. Learn how in "Automate the Boring Stuff with Python.""
Web Design with Html, Css, JavaScript and Jquery Set
Jon Duckett - 2014
Together these two books form an ideal platform for anyone who wants to master HTML and CSS before stepping up to JavaScript and jQuery.HTML & CSS covers structure, text, links, images, tables, forms, useful options, adding style with CSS, fonts, colors, thinking in boxes, styling lists and tables, layouts, grids, and even SEO, Google analytics, ftp, and HTML5. JavaScript & jQuery offers an excellent combined introduction to these two technologies using a clear and simple visual approach using diagrams, infographics, and photographs.A handy two-book set that uniquely combines related technologies Highly visual format and accessible language makes these books highly effective learning tools Perfect for beginning web designers and front-end developers
Building Microservices: Designing Fine-Grained Systems
Sam Newman - 2014
But developing these systems brings its own set of headaches. With lots of examples and practical advice, this book takes a holistic view of the topics that system architects and administrators must consider when building, managing, and evolving microservice architectures.Microservice technologies are moving quickly. Author Sam Newman provides you with a firm grounding in the concepts while diving into current solutions for modeling, integrating, testing, deploying, and monitoring your own autonomous services. You'll follow a fictional company throughout the book to learn how building a microservice architecture affects a single domain.Discover how microservices allow you to align your system design with your organization's goalsLearn options for integrating a service with the rest of your systemTake an incremental approach when splitting monolithic codebasesDeploy individual microservices through continuous integrationExamine the complexities of testing and monitoring distributed servicesManage security with user-to-service and service-to-service modelsUnderstand the challenges of scaling microservice architectures
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Lean Enterprise: How High Performance Organizations Innovate at Scale
Jez Humble - 2014
Adopting Lean will take time and commitment, but it’s vital for harnessing the cultural and technical forces that are accelerating the rate of innovation.* Discover how Lean focuses on people and teamwork at every level, in contrast to traditional management practices* Approach problem-solving experimentally, by exploring solutions, testing assumptions, and getting feedback from real users* Lead and manage large-scale programs in a way that empowers employees, increases the speed and quality of delivery, and lowers costs* Learn how to implement ideas from the DevOps and Lean Startup movements even in complex, regulated environments
CSS Secrets: Better Solutions to Everyday Web Design Problems
Lea Verou - 2014
Based on two popular talks from author Lea Verou--including "CSS3 Secrets: 10 things you may not know about CSS"--this practical guide provides intermediate to advanced CSS developers with more than 40 undocumented techniques and tips for using CSS3 to create better websites.The talks that spawned this book have been top-rated by attendees in every conference they were presented, and praised in industry media such as ."net" magazine.Get information you won't find in any other bookLearn through small, easily digestible chaptersHelps you understand CSS more deeply so you can improve your own solutionsApply Lea's techniques to practically every CSS problem you faceGain tips from a rockstar author who serves as an Invited Expert in W3C's CSS Working Group
The Revolt of the Public and the Crisis of Authority
Martin Gurri - 2014
In the words of economist and scholar Arnold Kling, Martin Gurri saw it coming.Technology has categorically reversed the information balance of power between the public and the elites who manage the great hierarchical institutions of the industrial age government, political parties, the media.The Revolt of the Public tells the story of how insurgencies, enabled by digital devices and a vast information sphere, have mobilized millions of ordinary people around the world.Originally published in 2014, this updated edition of The Revolt of the Public includes an extensive analysis of Donald Trump's improbable rise to the presidency and the electoral triumphs of Brexit and concludes with a speculative look forward, pondering whether the current elite class can bring about a reformation of the democratic process and whether new organizing principles, adapted to a digital world, can arise out of the present political turbulence.
Spare Parts: Four Undocumented Teenagers, One Ugly Robot, and the Battle for the American Dream
Joshua Davis - 2014
In 2004, four Latino teenagers arrived at the Marine Advanced Technology Education Robotics Competition at the University of California, Santa Barbara. They were born in Mexico but raised in Phoenix, Arizona, where they attended an underfunded public high school. No one had ever suggested to Oscar, Cristian, Luis, or Lorenzo that they might amount to much - but two inspiring science teachers had convinced these impoverished, undocumented kids from the desert who had never even seen the ocean that they should try to build an underwater robot. And build a robot they did. Their robot wasn't pretty, especially compared to those of the competition. They were going up against some of the best collegiate engineers in the country, including a team from MIT backed by a $10,000 grant from ExxonMobil. The Phoenix teenagers had scraped together less than $1,000 and built their robot out of scavenged parts. This was never a level competition—and yet, against all odds... they won! But this is just the beginning for these four, whose story—which became a key inspiration to the DREAMers movement—will go on to include first-generation college graduations, deportation, bean-picking in Mexico, and service in Afghanistan. Joshua Davis' Spare Parts is a story about overcoming insurmountable odds and four young men who proved they were among the most patriotic and talented Americans in this country—even as the country tried to kick them out.
How We Got to Now: Six Innovations That Made the Modern World
Steven Johnson - 2014
Filled with surprising stories of accidental genius and brilliant mistakes—from the French publisher who invented the phonograph before Edison but forgot to include playback, to the Hollywood movie star who helped invent the technology behind Wi-Fi and Bluetooth—How We Got to Now investigates the secret history behind the everyday objects of contemporary life. In his trademark style, Johnson examines unexpected connections between seemingly unrelated fields: how the invention of air-conditioning enabled the largest migration of human beings in the history of the species—to cities such as Dubai or Phoenix, which would otherwise be virtually uninhabitable; how pendulum clocks helped trigger the industrial revolution; and how clean water made it possible to manufacture computer chips. Accompanied by a major six-part television series on PBS, How We Got to Now is the story of collaborative networks building the modern world, written in the provocative, informative, and engaging style that has earned Johnson fans around the globe.
Ry's Git Tutorial
Ryan Hodson - 2014
Its popularity among open-source developers makes Git a necessary tool for professional programmers, but it can also do wonders for your personal coding workflow. You’ll be able to experiment with new ideas, radically refactor existing code, and efficiently share changes with other developers—all without the slightest worry towards breaking your project.This comprehensive guide will walk you through the entire Git library, writing code and executing commands every step of the way. You'll create commits, revert snapshots, navigate branches, communicate with remote repositories, and experience core Git concepts first-hand.Designed for newcomers to distributed development, Ry's Git Tutorial presents this complex subject in simple terms that anyone can understand. Beginner and veteran programmers alike will find this book to be a fun, fast, and friendly introduction to Git-based revision control.
Red Team Field Manual
Ben Clark - 2014
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.
Adaptive Code Via C#: Agile Coding with Design Patterns and Solid Principles
Gary McLean Hall - 2014
Your process may be agile, but are you building agility directly into the code base? This book teaches .NET programmers how to give code the flexibility to adapt to changing requirements and customer demands by applying cutting-edge techniques, including SOLID principles, design patterns, and other industry best practices.Understand why composition is preferable to inheritance and how flexible the interface really can be Gain deep knowledge of key design patterns and anti-patterns, when to apply them, and how to give their code agility Bridge the gap between the theory behind SOLID principles, design patterns, and industry best practices by pragmatically solving real-world problems Get code samples written in upcoming version of Microsoft Visual C# Topics include: Agile with Scrum process; dependencies and layering; the interface; patterns and anti-patterns; introduction to SOLID principles, including open/closed and dependency interjection; and using application templates
CompTIA A+ Certification All-in-One Exam Guide, Exams 220-901 & 220-902
Mike Meyers - 2014
New topics include managing and maintaining cellular devices, including tablets; configuring operating systems, including Windows 8, Android, and iOS; and enhanced, mobile-centered security and troubleshooting procedures. The All-in-One Exam Guide enables you to take the test with complete confidence. It also serves as a practical reference for IT support and technical personnel.
Bonus electronic content includes:
Practice exams with hundreds of accurate questions More than an hour of video training featuring Mike Meyers Performance-based simulations that prepare you for the performance-based questions on the exam A collection of Mike's favorite free PC tools
Key Features include:
Written with the “in the trenches” voice and clarity Mike Meyers is known for Features pre-assessment tests, exam tips, and “Try This!” sections to reinforce difficult topics Includes a coupon for 10% off of the exam fee, a $37 value
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Glenn Greenwald - 2014
That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy.Now Greenwald fits all the pieces together, recounting his high-intensity eleven-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with documents from the Snowden archive. Fearless and incisive, No Place to Hide has already sparked outrage around the globe and been hailed by voices across the political spectrum as an essential contribution to our understanding of the U.S. surveillance state.
How to Build a Billion Dollar App
George Berkowski - 2014
Essential reading for anyone trying to build the next must-have app' Michael Acton Smith, Founder and CEO, Mind CandyApps have changed the way we communicate, shop, play, interact and travel and their phenomenal popularity has presented possibly the biggest business opportunity in history.In How to Build a Billion Dollar App, serial tech entrepreneur George Berkowski gives you exclusive access to the secrets behind the success of the select group of apps that have achieved billion-dollar success.Berkowski draws exclusively on the inside stories of the billion-dollar app club members, including Instagram, Whatsapp, Snapchat, Candy Crush and Uber to provide all the information you need to create your own spectacularly successful mobile business. He guides you through each step, from an idea scribbled on the back of an envelope, through to finding a cofounder, building a team, attracting (and keeping) millions of users, all the way through to juggling the pressures of being CEO of a billion-dollar company (and still staying ahead of the competition).If you've ever dreamed of quitting your nine to five job to launch your own company, you're a gifted developer, seasoned entrepreneur or just intrigued by mobile technology, How to Build a Billion Dollar App will show you what it really takes to create your own billion-dollar, mobile business.
The Intel Trinity: How Robert Noyce, Gordon Moore, and Andy Grove Built the World's Most Important Company
Michael S. Malone - 2014
The legendary inventors of the microprocessor-the single most important product in the modern world-Intel today builds the tiny “engines” that power almost every intelligent electronic device on the planet.But the true story of Intel is the human story of the trio of geniuses behind it. Michael S. Malone reveals how each brought different things to Intel, and at different times. Noyce, the most respected high tech figure of his generation, brought credibility (and money) to the company’s founding; Moore made Intel the world’s technological leader; and Grove, has relentlessly driven the company to ever-higher levels of success and competitiveness. Without any one of these figures, Intel would never have achieved its historic success; with them, Intel made possible the personal computer, Internet, telecommunications, and the personal electronics revolutions.The Intel Trinity is not just the story of Intel’s legendary past; it also offers an analysis of the formidable challenges that lie ahead as the company struggles to maintain its dominance, its culture, and its legacy.With eight pages of black-and-white photos.
Exponential Organizations: Why New Organizations Are Ten Times Better, Faster, Cheaper Than Yours (and What To Do About It)
Salim Ismail - 2014
In performance, how you organize can be the key to growth. In the past five years, the business world has seen the birth of a new breed of company - the Exponential Organization - that has revolutionized how a company can accelerate its growth by using technology.
Java Performance: The Definitive Guide
Scott Oaks - 2014
Multicore machines and 64-bit operating systems are now standard even for casual users, and Java itself has introduced new features to manage applications. The base JVM has kept pace with those developments and offers a very different performance profile in its current versions. By guiding you through this changing landscape, Java Performance: The Definitive Guide helps you gain the best performance from your Java applications.You’ll explore JVM features that traditionally affected performance—including the just-in-time compiler, garbage collection, and language features—before diving in to aspects of Java 7 and 8 designed for maximum performance in today's applications. You’ll learn features such as the G1 garbage collector to maximize your application’s throughput without causing it to pause, and the Java Flight Recorder, which enables you to see application performance details without the need for separate, specialized profiling tools.Whether you’re new to Java and need to understand the basics of tuning the JVM, or a seasoned developer looking to eek out that last 10% of application performance, this is the book you want.
How Google Works
Eric Schmidt - 2014
As they helped grow Google from a young start-up to a global icon, they relearned everything they knew about management. How Google Works is the sum of those experiences distilled into a fun, easy-to-read primer on corporate culture, strategy, talent, decision-making, communication, innovation, and dealing with disruption.The authors explain how the confluence of three seismic changes - the internet, mobile, and cloud computing - has shifted the balance of power from companies to consumers. The companies that will thrive in this ever-changing landscape will be the ones that create superior products and attract a new breed of multifaceted employees whom the authors dub 'smart creatives'. The management maxims ('Consensus requires dissension', 'Exile knaves but fight for divas', 'Think 10X, not 10%') are illustrated with previously unreported anecdotes from Google's corporate history.'Back in 2010, Eric and I created an internal class for Google managers,' says Rosenberg. 'The class slides all read 'Google confidential' until an employee suggested we uphold the spirit of openness and share them with the world. This book codifies the recipe for our secret sauce: how Google innovates and how it empowers employees to succeed.'
The Practice of Cloud System Administration: Devops and Sre Practices for Web Services, Volume 2
Thomas A. Limoncelli - 2014
Unsatisfied with books that cover either design or operations in isolation, the authors created this authoritative reference centered on a comprehensive approach. Case studies and examples from Google, Etsy, Twitter, Facebook, Netflix, Amazon, and other industry giants are explained in practical ways that are useful to all enterprises. The new companion to the best-selling first volume, The Practice of System and Network Administration, Second Edition, this guide offers expert coverage of the following and many other crucial topics: Designing and building modern web and distributed systemsFundamentals of large system design Understand the new software engineering implications of cloud administration Make systems that are resilient to failure and grow and scale dynamically Implement DevOps principles and cultural changes IaaS/PaaS/SaaS and virtual platform selection Operating and running systems using the latest DevOps/SRE strategiesUpgrade production systems with zero down-time What and how to automate; how to decide what not to automate On-call best practices that improve uptime Why distributed systems require fundamentally different system administration techniques Identify and resolve resiliency problems before they surprise you Assessing and evaluating your team's operational effectivenessManage the scientific process of continuous improvement A forty-page, pain-free assessment system you can start using today
Flask Web Development: Developing Web Applications with Python
Miguel Grinberg - 2014
With this hands-on book, you’ll learn Flask from the ground up by developing a complete social blogging application step-by-step. Author Miguel Grinberg walks you through the framework’s core functionality, and shows you how to extend applications with advanced web techniques such as database migration and web service communication.Rather than impose development guidelines as other frameworks do, Flask leaves the business of extensions up to you. If you have Python experience, this book shows you how to take advantage of that creative freedom.- Learn Flask’s basic application structure and write an example app- Work with must-have components—templates, databases, web forms, and email support- Use packages and modules to structure a large application that scales- Implement user authentication, roles, and profiles- Build a blogging feature by reusing templates, paginating item lists, and working with rich text- Use a Flask-based RESTful API to expose app functionality to smartphones, tablets, and other third-party clients- Learn how to run unit tests and enhance application performance- Explore options for deploying your web app to a production server
Mars Rover Curiosity: An Inside Account from Curiosity's Chief Engineer
Rob Manning - 2014
Manning and his team at NASA's Jet Propulsion Laboratory, tasked with designing a lander many times larger and more complex than any before, faced technical setbacks, fights over inadequate resources, and the challenges of leading an army of brilliant, passionate, and often frustrated experts.Manning's fascinating personal account--which includes information from his exclusive interviews with leading Curiosity scientists--is packed with tales of revolutionary feats of science, technology, and engineering. Readers experience firsthand the disappointment at encountering persistent technical problems, the agony of near defeat, the sense of victory at finding innovative solutions to these problems, the sheer terror of staking careers and reputations on a lander that couldn't be tested on Earth, and the rush of triumph at its successful touchdown on Mars on August 5, 2012. This is the story of persistence, dedication, and unrelenting curiosity.
SEO 2014: Learn Search Engine Optimization with Smart Internet Marketing Strategies
Adam Clarke - 2014
But first, let me tell you a little secret about SEO marketing... Most of the search engine optimization advice on the Internet is just plain wrong!If you've sifted through the torrents of search engine optimization advice online, you may have noticed two things: - Most of the knowledge on SEO is either completely outdated or just dead-wrong.- Google's constant updates have rendered many well known SEO strategies completely useless.Why is this so? Google are constantly evolving, making it extremely difficult to know what currently works. Some recent changes: 1. August, 2014 - Google announced sites secured with SSL certificates will get an advantage in search engines.2. July, 2014 - Google released a big update dramatically affecting how often the local business listings appear in the search results.3. May, 2014 - Google announced a game changing update, punishing sites with poor quality content and user experience.SEO 2014 walks you through the above updates and more. This book also reveals industry secrets about Google's algorithm, so you can learn SEO from a fundamental level, achieve top rankings in Google, and generate hundreds, or even thousands of new customers to your site. Sidestep the feared 2014 Google updatesContrary to Internet marketing chatter, problems caused by Google updates are hardly irrecoverable or unavoidable—but you need the right knowledge. This book reveals in granular detail: - Recent Google updates—Panda 4.0, Pigeon, Hummingbird and beyond.- Steps required to recover from a Google penalty.- How to avoid being penalised in 2014 and beyond.Discover powerful link building techniques experts use to get top rankings and generate massive trafficLink building is simply the strongest factor for ranking high in Google. Unfortunately, most widely-used methods just plain suck! This chapter walkers you through the most powerful techniques that work wonders and won't get you in hot-water with Google. You will also discover: 1. How to leverage social media to skyrocket traffic to your site.2. How to find "money" keywords that will send customers to your site.3. The dirty secret about link-building.4. Sneaky tricks to get local businesses ranking high with local search engine optimization.5. How to get expert SEO or internet marketing advice, completely free.6. The new meta technology search engines love, schema.org, and how to use it to get more traffic.You will also learn the little-known search engine optimization tools top internet marketing experts useThe SEO tools chapter lists 20+ of the powerful tools top internet marketing experts are using to automate their search engine optimization, saving weeks of time, and creating bigger results... and most of the tools are free! And read the very special bonus chapter on pay-per-click advertisingIn this special bonus chapter, learn how to quickly and effectively setup a pay-per-click advertising campaign with Google AdWords, and send more traffic and customers to your website overnight. As one of the most advanced and comprehensive SEO books ever published, SEO 2014 contains everything you need to learn SEO and dominate search engines in 2014. Purchase from Amazon and get started right away!
The Swift Programming Language
Apple Inc. - 2014
Swift builds on the best of C and Objective-C, without the constraints of C compatibility. Swift adopts safe programming patterns and adds modern features to make programming easier, more flexible, and more fun. Swift’s clean slate, backed by the mature and much-loved Cocoa and Cocoa Touch frameworks, is an opportunity to reimagine how software development works.
Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications
Ivan Ristic - 2014
Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a comprehensive assessment tool running on the SSL Labs website (https://www.ssllabs.com), and assessing most of the public SSL servers on the Internet. The assessment tool helped many site owners identify and solve issues with their SSL deployments. The intent of this book is to provide a definitive reference for SSL deployment that is full of practical and relevant information.
Exploring Internet
Sai Satish - 2014
Exploring InternetBook target is to explore useful resources in internet for Researchers,Entrepreneurs,Students,TeachersDescriptionExploring Internet Order it online 1. Ch 1 Internet Introduction2. Ch 2 Communication tools3. Ch 3 internet for research4. Ch 4 Career booster5. Ch 5 Entrepreneur6. Ch 6 Build your website now7. Ch 7 SEO SNO8. Ch 8 Earning Money online9. Ch 9 Internet for U10. Ch 10 hidden resources11. Ch 11 Online Frauds12. Ch 12 Additional Chapter13. Ch 13 Tips n tricks
Clean Disruption of Energy and Transportation: How Silicon Valley Will Make Oil, Nuclear, Natural Gas, Coal, Electric Utilities and Conventional Cars Obsolete by 2030
Tony Seba - 2014
Maybe before. Exponentially improving technologies such as solar, electric vehicles, and autonomous (self-driving) cars will disrupt and sweep away the energy and transportation industries as we know it. The same Silicon Valley ecosystem that created bit-based technologies that have disrupted atom-based industries is now creating bit- and electron-based technologies that will disrupt atom-based energy industries. Clean Disruption projections (based on technology cost curves, business model innovation as well as product innovation) show that by 2030: - All new energy will be provided by solar or wind. - All new mass-market vehicles will be electric. - All of these vehicles will be autonomous (self-driving) or semi-autonomous. - The new car market will shrink by 80%. - Even assuming that EVs don't kill the gasoline car by 2030, the self-driving car will shrink the new car market by 80%. - Gasoline will be obsolete. Nuclear is already obsolete. - Up to 80% of highways will be redundant. - Up to 80% of parking spaces will be redundant. - The concept of individual car ownership will be obsolete. - The Car Insurance industry will be disrupted. The Stone Age did not end because we ran out of rocks. It ended because a disruptive technology ushered in the Bronze Age. The era of centralized, command-and-control, extraction-resource-based energy sources (oil, gas, coal and nuclear) will not end because we run out of petroleum, natural gas, coal, or uranium. It will end because these energy sources, the business models they employ, and the products that sustain them will be disrupted by superior technologies, product architectures, and business models. This is a technology-based disruption reminiscent of how the cell phone, Internet, and personal computer swept away industries such as landline telephony, publishing, and mainframe computers. Just like those technology disruptions flipped the architecture of information and brought abundant, cheap and participatory information, the clean disruption will flip the architecture of energy and bring abundant, cheap and participatory energy. Just like those previous technology disruptions, the clean disruption is inevitable and it will be swift.
How to Fly a Horse: The Secret History of Creation, Invention, and Discovery
Kevin Ashton - 2014
Now, in a tour-de-force narrative twenty years in the making, Ashton leads us on a journey through humanity’s greatest creations to uncover the surprising truth behind who creates and how they do it. From the crystallographer’s laboratory where the secrets of DNA were first revealed by a long forgotten woman, to the electromagnetic chamber where the stealth bomber was born on a twenty-five-cent bet, to the Ohio bicycle shop where the Wright brothers set out to “fly a horse,” Ashton showcases the seemingly unremarkable individuals, gradual steps, multiple failures, and countless ordinary and usually uncredited acts that lead to our most astounding breakthroughs.Creators, he shows, apply in particular ways the everyday, ordinary thinking of which we are all capable, taking thousands of small steps and working in an endless loop of problem and solution. He examines why innovators meet resistance and how they overcome it, why most organizations stifle creative people, and how the most creative organizations work. Drawing on examples from art, science, business, and invention, from Mozart to the Muppets, Archimedes to Apple, Kandinsky to a can of Coke, How to Fly a Horse is a passionate and immensely rewarding exploration of how “new” comes to be.
Predator: The Secret Origins of the Drone Revolution
Richard Whittle - 2014
As Richard Whittle shows in Predator, it was one of the most profound developments in the history of military and aerospace technology.Once considered fragile toys, drones were long thought to be of limited utility. The Predator itself was resisted at nearly every turn by the military establishment, but a few iconoclasts refused to see this new technology smothered at birth. The remarkable cast of characters responsible for developing the Predator includes a former Israeli inventor who turned his Los Angeles garage into a drone laboratory, two billionaire brothers marketing a futuristic weapon to help combat Communism, a pair of fighter pilots willing to buck their white-scarf fraternity, a cunning Pentagon operator nicknamed "Snake," and a secretive Air Force organization known as Big Safari. When an Air Force team unleashed the first lethal drone strikes in 2001 for the CIA, the military's view of drones changed nearly overnight.Based on five years of research and hundreds of interviews, Predator reveals the dramatic inside story of the creation of a revolutionary weapon that forever changed the way we wage war and opened the door to a new age in aviation.
The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto
Phil Champagne - 2014
Not supported by any government or central bank, completely electronic, Bitcoin is a virtual currency based on advanced cryptographic systems. Like the currency he created, the identity of Bitcoin's creator Satoshi Nakamoto is virtual, existing only online. The Nakamoto persona, which may represent an individual or a group, exists only in the online publications that introduced and explained Bitcoin during its earliest days. Here, collected and professionally published for the first time are the essential writings that detail Bitcoin's creation. Included are:-Satoshi Nakamoto Emails and Posts on Computer Forums Presented in Chronological Order -Bitcoin Fundamentals Presented in Layman's Terms -Bitcoin's Potential and Profound Economic Implications -The Seminal Paper Which Started It All The Book of Satoshi provides a convenient way to parse through what Bitcoin's creator wrote over the span of the two years that constituted his "public life" before he disappeared from the Internet . . . at least under the name Satoshi Nakamoto. Beginning on November 1st 2009 with the publication of the seminal paper describing Bitcoin, this public life ends at about the time PC World speculated as to a possible link between Bitcoin and WikiLeaks, the infamous website that publishes leaked classified materials. Was there a connection? You be the judge. Nakamoto's true identity may never be known. Therefore the writings reproduced here are probably all the world will ever hear from him concerning Bitcoin's creation, workings, and theoretical basis. Want to learn more about Bitcoin? Go directly to the source-the writings of the creator himself, Satoshi Nakamoto!
Technocracy Rising: The Trojan Horse of Global Transformation
Patrick M Wood - 2014
It is Technocracy.With meticulous detail and an abundance of original research, Patrick M. Wood uses Technocracy Rising to connect the dots of modern globalization in a way that has never been seen before so that the reader can clearly understand the globalization plan, its perpetrators and its intended endgame.In the heat of the Great Depression during the 1930s, prominent scientists and engineers proposed a utopian energy-based economic system called Technocracy that would be run by those same scientists and engineers instead of elected politicians. Although this radical movement lost momentum by 1940, it regained status when it was conceptually adopted by the elitist Trilateral Commission (co-founded by Zbigniew Brzezinski and David Rockefeller) in 1973 to be become its so-called "New International Economic Order."In the ensuing 41 years, the modern expression of Technocracy and the New International Economic Order is clearly seen in global programs such as Agenda 21, Sustainable Development, Green Economy, Councils of Governments, Smart Growth, Smart Grid, Total Awareness surveillance initiatives and more.Wood contends that the only logical outcome of Technocracy is Scientific Dictatorship, as already seen in dystopian literature such as Brave New World by Aldous Huxley (1932) and Nineteen Eighty-Four by George Orwell (1948), both of whom looked straight into the face of Technocracy when it was still in its infancy.With over 250 footnotes, an extensive bibliography and clarity of writing style, Wood challenges the reader to new levels of insight and understanding into the clear and present danger of Technocracy, and how Americans might be able to reject it once again.
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Michael Hale Ligh - 2014
As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.
If Hemingway Wrote JavaScript
Angus Croll - 2014
The result is a peculiar and charming combination of prose, poetry, and programming.The best authors are those who obsess about language--and the same goes for JavaScript developers. To master either craft, you must experiment with language to develop your own style, your own idioms, and your own expressions. To that end, If Hemingway Wrote JavaScript playfully bridges the worlds of programming and literature for the literary geek in all of us.Featuring original artwork by Miran Lipovaca.
OS X 10.10 Yosemite: The Ars Technica Review
John Siracusa - 2014
Siracusa's overview, wrap-up, and critique of everything new in OS X 10.10 Yosemite.
Designing for Scalability with Erlang/OTP: Implementing Robust, Fault-Tolerant Systems
Francesco Cesarini - 2014
With this hands-on book, you’ll learn how to apply OTP libraries and techniques to develop concurrent, fault-tolerant systems with no single point of failure.Written by the authors of O'Reilly's Erlang Programming, including a member of OTP’s R1 release team, this guide takes you through the basics of OTP and Erlang Design Patterns, and demonstrates how the platform can be used in a wide range of industries. If you have Erlang experience, you’ll learn how to overcome key obstacles in OTP that have thwarted many other developers.
Adobe Premiere Pro CC Classroom in a Book (2019 Release)
Maxim Jago - 2014
Adobe Premiere Pro CC Classroom in a Book contains 19 lessons that cover the basics, providing countless tips and techniques to help you become more productive with the program. You can follow the book from start to finish or choose only those lessons that interest you. In addition to learning the key elements of the Adobe Premiere Pro interface, this completely revised CC (2014 release) edition covers new features, including "scratch" track recording, Master Clip effects, and masking and tracking visual effects. Access to all of the project files used in the book's lessons are included with purchase of the book. Print editions come bundled with a DVD containing the lesson files, and students who purchase an eBook edition receive a code that lets them download the lesson files from their account page on peachpit.com. Both print and eBook users also get access to downloadable updates that cover new features that Adobe releases for Creative Cloud members. "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students." Barbara Binder, Adobe Certified InstructorRocky Mountain Training
The Lego Mindstorms Ev3 Idea Book: 181 Simple Machines and Clever Contraptions
Yoshihito Isogawa - 2014
Each model includes a list of the required parts, minimal text, and colorful photographs from multiple angles so you can re-create it without the need for step-by-step instructions.You'll learn to build cars with real suspension, steerable crawlers, ball-shooters, grasping robotic arms, and other creative marvels. Each model demonstrates simple mechanical principles that you can use as building blocks for your own creations.Best of all, every part you need to build these machines comes in one LEGO set (#31313)!
Information Doesn't Want to Be Free: Laws for the Internet Age
Cory Doctorow - 2014
Can small artists still thrive in the Internet era? Can giant record labels avoid alienating their audiences? This is a book about the pitfalls and the opportunities that creative industries (and individuals) are confronting today — about how the old models have failed or found new footing, and about what might soon replace them. An essential read for anyone with a stake in the future of the arts, Information Doesn’t Want to Be Free offers a vivid guide to the ways creativity and the Internet interact today, and to what might be coming next.
Trash Can Nights: The Saga Continues
Teddy Steinkellner - 2014
Facing unwanted attention from both foes and fanatics, Jake is out to make some changes-for better, or for worse.On the Eastside of town, Jake's former best friend, Danny Uribe, has stepped up in the ranks of the local gang, the Raiders. Now that Danny is calling the shots, he has to start making some tough decisions. Life as a Raider may not be all that Danny thought it would be.Meanwhile, Hannah Schwartz is starting a new school year at Costa Blanca Preparatory Academy. No longer perched at the top of the social ladder, Hannah must fight for her position on the popularity pole. But frenemies have set their sights on Hannah, and they won't make it easy for her to get ahead.And as for Dorothy Wu, no one is as excited as she is about starting the eighth grade. With her new drama class friends and her boyfriend, Prince Jacobim, by her side, what else could a Wu ask for? But Dorothy has never navigated rocky relationship waters before. Can she help save Jake from the moody blues? Or will Dorothy end up dumped in the trash can, too?In this remarkable follow-up to Trash Can Days, Teddy Steinkellner delivers a contemporary story that is as hysterically funny as it is heartbreaking. In the end, there will be epic dance-offs, stunning sleepover secrets, life-changing spin-the-bottle sessions, and-oh yes-lots and lots of cats.
Startupland: How Three Guys Risked Everything to Turn an Idea into a Global Business
Mikkel Svane - 2014
Conventional wisdom says most startups need to be in Silicon Valley, started by young engineers around a sexy new idea, and backed by VC funding. But as Mikkel Svane reveals in Startupland, the story of founding Zendesk was anything but conventional.Founded in a Copenhagen loft by three thirty-something friends looking to break free from corporate doldrums, Zendesk Inc. is now one of the hottest enterprise software companies, still rapidly growing with customers in 150 countries. But its success was anything but predestined. With revealing stories both funny and frank, Mikkel shares how he and his friends bravely left secure jobs to start something on their own, how he almost went broke several times, how they picked up themselves and their families to travel across the world to California and the unknown, and how the three friends were miraculously still together for Zendesk's IPO and (still growing) success.Much like Zendesk's mission itself--to remove friction, barriers, and mystery in order to make customer service easier and more approachable--Startupland removes some of the myths about startups and startup founders. Mikkel's advice, hard-won through experience, often bucks conventional wisdom and entrepreneurial tropes. He shares why failure (whether fast or slow) is awful, why a seemingly boring product or idea can be the most exciting, why giving back to the community is as important as the bottom line. From how to hire right (look for people who are not offended by swearing) to which personas generate the highest response rates, Mikkel answers the most pressing questions from the perspective of someone still in the trenches and willing to share the hard truth, warts and all.While there are books by consultants who tell you how to build businesses, or by entrepreneurs now running billion-dollar businesses, there are few books from people still in the trenches who acutely remember the difficult daily decisions, the thrill (and fears) of the early days, the problems that scale with growing a business, and the reason why they all went on the adventure in the first place. Startupland is indispensable reading for all entrepreneurs who want to make their ideas the next big thing. The book will inspire and empower you to follow your own dream and create your own story.
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Don Murdoch - 2014
The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience," so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way.
Virtual Economies: Design and Analysis
Vili Lehdonvirta - 2014
Digital game players happily pay for avatars, power-ups, and other game items. But behind every virtual sale, there is a virtual economy, simple or complex. In this book, Vili Lehdonvirta and Edward Castronova introduce the basic concepts of economics into the game developer's and game designer's toolkits. Lehdonvirta and Castronova explain how the fundamentals of economics—markets, institutions, and money—can be used to create or analyze economies based on artificially scarce virtual goods. They focus on virtual economies in digital games, but also touch on serious digital currencies such as Bitcoin as well as virtual economies that emerge in social media around points, likes, and followers. The theoretical emphasis is on elementary microeconomic theory, with some discussion of behavioral economics, macroeconomics, sociology of consumption, and other social science theories relevant to economic behavior.Topics include the rational choice model of economic decision making; information goods versus virtual goods; supply, demand, and market equilibrium; monopoly power; setting prices; and externalities. The book will enable developers and designers to create and maintain successful virtual economies, introduce social scientists and policy makers to the power of virtual economies, and provide a useful guide to economic fundamentals for students in other disciplines.
Mastering Metasploit
Nipun Jaswal - 2014
If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an indepth understanding of object-oriented programming languages.
Marketing the Moon: The Selling of the Apollo Lunar Program
David Meerman Scott - 2014
How did space exploration, once the purview of rocket scientists, reach a larger audience than "My Three Sons"? Why did a government program whose standard operating procedure had been secrecy turn its greatest achievement into a communal experience? In " Marketing the Moon," David Meerman Scott and Richard Jurek tell the story of one of the most successful marketing and public relations campaigns in history: the selling of the Apollo program.Primed by science fiction, magazine articles, and appearances by Wernher von Braun on the "Tomorrowland" segments of the "Disneyland" prime time television show, Americans were a receptive audience for NASA's pioneering "brand journalism." Scott and Jurek describe sophisticated efforts by NASA and its many contractors to market the facts about space travel -- through press releases, bylined articles, lavishly detailed background materials, and fully produced radio and television features -- rather than push an agenda. American astronauts, who signed exclusive agreements with Life magazine, became the heroic and patriotic faces of the program. And there was some judicious product placement: Hasselblad was the "first camera on the moon"; Sony cassette recorders and supplies of Tang were on board the capsule; and astronauts were equipped with the Exer-Genie personal exerciser. Everyone wanted a place on the bandwagon.Generously illustrated with vintage photographs, artwork, and advertisements, many never published before, "Marketing the Moon" shows that when Neil Armstrong took that giant leap for mankind, it was a triumph not just for American engineering and rocketry but for American marketing and public relations.
Learn to Program with Scratch: A Visual Introduction to Programming with Art, Science, Math and Games
Majed Marji - 2014
Its playful, intuitive interface uses colorful programming blocks and cartoon sprites to make real programming more approachable. Learn to Program with Scratchshows just how much you can do with Scratch and teaches you essential, universal programming concepts along the way.In Learn to Program with Scratch, author Majed Marji takes you on a tour through Scratch's surprisingly powerful features to teach programming concepts like procedures, variables, loops, recursion, decision making, and lists. You will use your new-found skills to create science simulations, math projects, and even some fun arcade games! Each chapter offers a summary and practice exercises at the end to make sure the lessons stick.Scratch is an incredibly fun and easy language to learn, plus you can do some seriously potent programming with it. Learn to Program with Scratch will help you get the most out of Scratch and begin your journey into the world of programming.
Fearless Genius: The Digital Revolution in Silicon Valley 1985-2000
Doug Menuez - 2014
At the same time, Steve Jobs was being forced out of his beloved Apple and starting over with a new company, NeXT Computer. His goal was to build a supercomputer with the power to transform education. Menuez had found his story: he proposed to photograph Jobs and his extraordinary team as they built this new computer, from conception to product launch. In an amazing act of trust, Jobs granted Menuez unlimited access to the company, and, for the next three years, Menuez was able to get on film the spirit and substance of innovation through the day-to-day actions of the world’s top technology guru. From there, the project expanded to include the most trailblazing companies in Silicon Valley, all of which granted Menuez the same complete access that Jobs had. Menuez photographed behind the scenes with John Warnock at Adobe, John Sculley at Apple, Bill Gates at Microsoft, John Doerr at Kleiner Perkins, Bill Joy at Sun Microsystems, Gordon Moore and Andy Grove at Intel, Marc Andreessen at Netscape, and more than seventy other leading companies and innovators. It would be fifteen years before Menuez stopped taking pictures, just as the dotcom bubble burst. An extraordinary era was coming to its close. With his singular behind-the-scenes access to these notoriously insular companies, Menuez was present for moments of heartbreaking failure and unexpected success, moments that made history, and moments that revealed the everyday lives of the individuals who made it happen. This period of rapid, radical change would affect almost every aspect of our culture and our lives in ways both large and small and would also create more jobs and wealth than any other time in human history. And Doug Menuez was there, a witness to a revolution. In more than a hundred photographs and accompanying commentary, Fearless Genius captures the human face of innovation and shows what it takes to transform powerful ideas into reality.
Troubleshooting with Wireshark: Locate the Source of Performance Problems (Wireshark Solution Series)
Laura A. Chappell - 2014
Learn insider tips and tricks to quickly detect the cause of poor network performance. This book consists of troubleshooting labs to walk you through the process of measuring client/server/network delays, detecting application error responses, catching delayed responses, locating the point of packet loss, spotting TCP receiver congestion, and more. Key topics include: path delays, client delays, server delays, connection refusals, service refusals, receive buffer overload, rate throttling, packet loss, redirections, queueing along a path, resolution failures, small MTU sizes, port number reuse, missing support for TCP SACK/Window Scaling, misbehaving infrastructure devices, weak signals (WLAN), and more. Book supplements include sample trace files, Laura's Wireshark troubleshooting profile, and a troubleshooting checklist.
CCNP Routing and Switching Switch 300-115 Official Cert Guide
David Hucaby - 2014
Expert engineer David Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam "Do I Know This Already?" quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports More than 60 minutes of personal video mentoring from the author on important exam topics A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success. David Hucaby, CCIE(R) No. 4594, is a lead network engineer for the University of Kentucky, where he works with a large healthcare network based on the Cisco product lines. David holds bachelor's and master's degrees in electrical engineering from the University of Kentucky. He is the author of several Cisco Press titles, including CCNA Wireless Cert Guide, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, Cisco Firewall Video Mentor, and Cisco LAN Switching Video Mentor. The official study guide helps you master topics on the CCNP R&S SWITCH 300-115 exam, including the following: Enterprise campus design Switch operation Switch port configuration VLANs, trunks, and VLAN Trunking Protocol (VTP) Spanning Tree Protocol (STP), RSTP, and MSTP Protecting the STP topology Aggregating switch links Multilayer switching Configuring DHCP Logging switch activity and managing switches with SNMP Monitoring performance and traffic High availability Securing switched networks The CD-ROM contains more than 200 practice questions for the exam, memory table exercises and answer keys, a study planner tool, and more than 60 minutes of video. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test Pearson IT Certification Practice Test minimum system requirements: Windows Vista (SP2), Windows 7, or Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases
Tesla Motors: How Elon Musk and Company Made Electric Cars Cool, and Sparked the Next Tech Revolution
Charles Morris - 2014
The most trusted sources in the auto industry have called its Model S the most advanced, safest and best-performing car ever built - and it doesn’t use a drop of gasoline. Tesla has changed the way the public perceives electric vehicles, and inspired the major automakers to revive their own dormant efforts to sell EVs. However, even amidst the avalanche of media coverage that followed the triumph of the Model S, few have grasped the true significance of what is happening. Tesla has redefined the automobile, sparked a new wave of innovation comparable to the internet and mobile computing revolutions, and unleashed forces that will transform not just the auto industry, but every aspect of society. The Tesla story is one part of an ongoing tide of change driven by the use of information technology to eliminate “friction” such as geographic distance, middlemen and outdated regulations. Tesla is simply applying the new order to the auto industry, but the automobile is such a pervasive influence in our lives that redefining how it is designed, built, driven and sold will have sweeping effects in unexpected areas. Just as Tesla built the Model S as an electric vehicle “from the ground up,” it has taken an outsider’s approach to the way it markets its cars. Its direct sales model has drawn legal challenges from entrenched auto dealers, who fear that their outdated business model will be destroyed. Its systems approach to the software and electronics in its cars has highlighted how far behind the technological times the major automakers are. It’s easy to see why readers find Tesla irresistible. CEO Elon Musk is a superstar entrepreneur, a “nauseatingly pro-US” immigrant and the leader of two other cutting-edge companies. Tesla dares to challenge the establishment behemoths and, so far at least, has handily beaten them at their own game. In this history of the 21st century’s most exciting startup, Charles Morris begins with a brief history of EVs and a biography of Tesla’s driving force, Elon Musk. He then details the history of the company, told in the words of the Silicon Valley entrepreneurs who made it happen. There are many fascinating stories here: Martin Eberhard’s realization that there were many like himself, who loved fast cars but wanted to help the environment and bring about the post-oil age; the freewheeling first days, reminiscent of the early internet era; the incredible ingenuity of the team who built the Roadster; Tesla’s near-death experience and miraculous resurrection; the spiteful split between the company’s larger-than-life leaders; the gloves-off battles with hostile media such as Top Gear and the New York Times; and the media’s ironic about-face when the magnificent Model S won the industry’s highest honors, and naysayers became cheerleaders overnight. And the story is just beginning: Tesla has breathtakingly ambitious plans for the future.This book was updated May 1, 2015 to include the latest on the Gigafactory and the D package.
Adventures in Minecraft
David Whale - 2014
Adventures in Minecraft, like other books in the highly successful Adventures series, is written especially for 11- to 15-year-olds. With this book you will learn new programming skills while having fun with Minecraft!Minecraft programming experts David Whale and Martin O'Hanlon walk you step-by-step through everything you need to know to:Get started writing Minecraft programs in Python on your PC, Mac, or Raspberry Pi Build houses and other structures in the blink of an eye, and make a 3D duplicating machine Write interactive games like a field that charges you rent, and a treasure hunt using magic vanishing bridges Build custom game control panels using simple electronic circuits Easily build huge 2D and 3D structures such as spheres and pyramids Build intelligent objects like a massive Minecraft clock, and program an alien invasion Plan and write a complete interactive arena game Using the programming skills you learn from this book, writing Minecraft programs offers endless possibilities to create anything you can imagine.To make your journey that much easier, the Adventures in Minecraft companion website supplies you with a video for each adventure in the book, downloadable code files, helpful programming reference tables, a bonus adventure, and badges to collect for your Minecraft accomplishments.By day, David Whale and Martin O'Hanlon are software engineers who design computer products. By night, they play Minecraft and develop exciting new programs that interact with the Minecraft world. They both work regularly with young people in schools, computing clubs and at community events, giving talks about Minecraft programming and running programming workshops.
Pro SQL Server Internals
Dmitri Korotkevitch - 2014
This is the practical book with a large number of examples that will show you how various design and implementation decisions affect the behavior and performance of your systems.Pro SQL Server Internals covers a multiple SQL Server versions starting with SQL Server 2005 all the way up to the recently released SQL Server 2014. You ll learn about new SQL Server 2014 features including the new Cardinality Estimator, In-Memory OLTP Engine (codename Hekaton), and Clustered Columnstore Indexes. With Pro SQL Server Internals, you have a solid roadmap for understanding the depth and power of the SQL Server database backend, regardless of the version and edition of SQL Server you use.Pro SQL Server Internals does the following:Explains how to design efficient database schema, indexing, and transaction strategies.Shows how various database objects and technologies are implemented internally and when they should or should not be used.Demonstrates how SQL Server executes queries and works with data and transaction logs."
Understanding Greek and Roman Technology: From Catapult to the Pantheon
NOT A BOOK - 2014
24 Lectures1 Technology in the Classical World2 The Substance of Technology—Materials3 From Quarry to Temple—Building in Stone4 Stone Masonry Perfected—The Greek Temple5 From Temple to Basilica—Timber Roof Systems6 Construction Revolution—Arches and Concrete7 Construction in Transition—The Colosseum8 The Genesis of a New Imperial Architecture9 The Most Celebrated Edifice—The Pantheon10 Cities by Design—The Rise of Urban Planning11 Connecting the Empire—Roads and Bridges12 From Source to City—Water Supply Systems13 Engineering a Roman Aqueduct14 Go with the Flow—Urban Water Distribution15 Paradigm and Paragon—Imperial Roman Baths16 Harnessing Animal Power—Land Transportation17 Leveraging Human Power—Construction Cranes18 Lifting Water with Human Power19 Milling Grain with Water Power20 Machines at War—Siege Towers and Rams21 Machines at War—Evolution of the Catapult22 Machines at Sea—Ancient Ships23 Reconstructing the Greek Trireme24 The Modern Legacy of Ancient Technology
The Guide to the Future of Medicine: Technology AND The Human Touch
Bertalan Meskó - 2014
A Whole New Engineer: The Coming Revolution in Engineering Education
David Edward Goldberg - 2014
Olin College of Engineering, a small startup in Needham, Massachusetts, with aspirations to be a beacon to engineering education everywhere, and the iFoundry incubator at the University of Illinois, an unfunded pilot program with aspirations to change engi- neering at a large public university that wasn’t particularly interested in changing. That either one survived is story enough, but what they found out together changes the course of education transformation forever:*How joy, trust, openness, and connec- tion are the keys to unleashing young, courageous engineers.*How engineers educated in narrow technical terms with a fixed mindset need an education that actively engages six minds—analytical, design, people, linguistic, body, and mindful— using a growth mindset.*How emotion and culture are the crucial elements of change, not content, curriculum, and pedagogy.*How four technologies of trust are well established and widely available to promote more rapid academic change.*How all stakeholders can join together in a movement of open innovation to accelerate collaborative disruption of the status quo.Read this book and get a glimpse inside the coming revolution in engineering. Feel the engaging stories in this book and understand the depth of change that is coming. Use this book to help select, shape, demand, and create educational experiences aligned with the creative imperative of the twenty-first century.
Cloud Design Patterns: Prescriptive Architecture Guidance for Cloud Applications (Microsoft patterns & practices)
Alex Homer - 2014
They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to protect services from malicious attacks, and elastic in order to respond to an ever changing workload. This guide demonstrates design patterns that can help you to solve the problems you might encounter in many different areas of cloud application development. Each pattern discusses design considerations, and explains how you can implement it using the features of Windows Azure. The patterns are grouped into categories: availability, data management, design and implementation, messaging, performance and scalability, resilience, management and monitoring, and security. You will also see more general guidance related to these areas of concern. It explains key concepts such as data consistency and asynchronous messaging. In addition, there is useful guidance and explanation of the key considerations for designing features such as data partitioning, telemetry, and hosting in multiple datacenters. These patterns and guidance can help you to improve the quality of applications and services you create, and make the development process more efficient. Enjoy!
Logic Pro X For Dummies
Graham English - 2014
It's a professional-level tool with a user-friendly interface and loads of new features to keep you more organized so you can focus on creating rather than computing. Record live audio and MIDI tracks and edit faster with the new Mixer. Create your own drum kit, or work with the native virtual session drummer. Add flavor to your sound with new Pedalboard stompboxes, and fine-tune it all with Flex Pitch. You'll let loose with Logic Pro X and let your creativity flow with help from For Dummies.Written by veteran music and audio professional Graham English, Logic Pro X For Dummies jumps right in to using Apple's high-end recording software so you can focus on doing what you do best—making music. From navigating the user interface to working with real and virtual instruments, recording tracks, editing audio, adding plug-ins, and everything in between, you'll learn how to turn your musical inspiration into a fully-engineered and mastered demo.
Shows you how to create a project, record live audio and MIDI tracks, import video, and mix songs like a pro
Covers editing audio and adding effects and plug-ins to achieve your ideal sound
Walks you through the entire audio engineering process from mix-down to mastering and exporting your final cut
Includes information on how to use iPad and its touch interface to create amazing sound
If you're serious about your sound, Logic Pro X For Dummies is your ultimate guide to achieving the quality you've been dreaming of and turning the volume up on all your musical endeavors.
Applied Predictive Analytics: Principles and Techniques for the Professional Data Analyst
Dean Abbott - 2014
Written by a leading expert in the field, this guide examines the science of the underlying algorithms as well as the principles and best practices that govern the art of predictive analytics. It clearly explains the theory behind predictive analytics, teaches the methods, principles, and techniques for conducting predictive analytics projects, and offers tips and tricks that are essential for successful predictive modeling. Hands-on examples and case studies are included.The ability to successfully apply predictive analytics enables businesses to effectively interpret big data; essential for competition today This guide teaches not only the principles of predictive analytics, but also how to apply them to achieve real, pragmatic solutions Explains methods, principles, and techniques for conducting predictive analytics projects from start to finish Illustrates each technique with hands-on examples and includes as series of in-depth case studies that apply predictive analytics to common business scenarios A companion website provides all the data sets used to generate the examples as well as a free trial version of software Applied Predictive Analytics arms data and business analysts and business managers with the tools they need to interpret and capitalize on big data.
The Singularity is Coming: The Artificial Intelligence Explosion
Tony Thorne - 2014
Will humanity survive? Many scientists predict that as early as 2024 an unprecedented event will happen that will completely change our lives. They aren’t talking about global warming or nuclear war, but technological singularity. They predict that a computer with artificial general intelligence (AGI) will be able to program its own software and redesign itself. This superintelligence will exceed all human understanding and will be beyond our control. In non-technical language,
The Singularity is Coming
clarifies what may happen and speculates about how it may affect us. It is a compilation of information that includes comments from experts, news announcements of the latest developments, and a comprehensive reading list.In the Facts to Prophetic Fiction section is a collection of speculative science fiction pieces and short stories including:
GODLIKE: The ideal companion for lonely emigrant.
EQUALITY: The laws say robots must protect humans, always...?
BE HAPPY WHEN WE TAKE OVER: Know your limitations.
Are we on the threshold of a new golden age? Some scientists are optimistic about the singularity and predict the new intelligence will create amazing advances. It may bring about longer, healthier lives, an end to crime, and a solution to world hunger. Others wonder where our place would be in the new order. Will this superintelligence include benevolence? Are we on the verge of a new beginning for humanity, or the end of life as we know it? Read
The Singularity is Coming
now and decide for yourself.
Albert Michelson's Harmonic Analyzer: A Visual Tour of a Nineteenth Century Machine That Performs Fourier Analysis
Bill Hammack - 2014
One hundred and fifty color photos reveal the analyzer’s beauty though full-page spreads, lush close-ups of its components, and archival photos of other Michelson-inspired analyzers. The book includes sample output from the machine and a reproduction of an 1898 journal article by Michelson, which first detailed the analyzer. The book is the official companion volume to the popular YouTube video series created by the authors.
Materials for Design
Chris Lefteri - 2014
This new book provides much-needed information on the raw materials, and the 'low-down' on what these materials can be used for.The information provided in the book allows professional designers and students from a range of disciplines – but focusing on product design – to understand in simple, exciting, thought-provoking, visual terms different qualities and features of materials. The subject is presented from the perspective of design, and relevant case studies are used to inspire designers into new ways of thinking about materials. As well as standard and widely available materials, the book also contains emerging materials such as smart materials and self-healing plastics, offering a comprehensive guide to material selection for designers.
BDD in Action: Behavior-driven development for the whole software lifecycle
John Ferguson Smart - 2014
First you'll learn how to apply BDD to requirements analysis to define features that focus your development efforts on underlying business goals. Then, you'll discover how to automate acceptance criteria and use tests to guide and report on the development process. Along the way, you'll apply BDD principles at the coding level to write more maintainable and better documented code.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyYou can't write good software if you don't understand what it's supposed to do. Behavior-Driven Development (BDD) encourages teams to use conversation and concrete examples to build up a shared understanding of how an application should work and which features really matter. With an emerging body of best practices and sophisticated new tools that assist in requirement analysis and test automation, BDD has become a hot, mainstream practice.About the BookBDD in Action teaches you BDD principles and practices and shows you how to integrate them into your existing development process, no matter what language you use. First, you'll apply BDD to requirements analysis so you can focus your development efforts on underlying business goals. Then, you'll discover how to automate acceptance criteria and use tests to guide and report on the development process. Along the way, you'll apply BDD principles at the coding level to write more maintainable and better documented code. No prior experience with BDD is required.What's InsideBDD theory and practiceHow BDD will affect your teamBDD for acceptance, integration, and unit testingExamples in Java, .NET, JavaScript, and moreReporting and living documentationAbout the AuthorJohn Ferguson Smart is a specialist in BDD, automated testing, and software lifecycle development optimization. Table of ContentsPART 1: FIRST STEPSBuilding software that makes a differenceBDD—the whirlwind tourPART 2: WHAT DO I WANT? DEFINING REQUIREMENTS USING BDDUnderstanding the business goals: Feature Injection and related techniquesDefining and illustrating featuresFrom examples to executable specificationsAutomating the scenariosPART 3: HOW DO I BUILD IT? CODING THE BDD WAYFrom executable specifications to rock-solid automated acceptance testsAutomating acceptance criteria for the UI layerAutomating acceptance criteria for non-UI requirementsBDD and unit testingPART 4: TAKING BDD FURTHERLiving Documentation: reporting and project managementBDD in the build process
Conquering the Electron: The Geniuses, Visionaries, Egomaniacs, and Scoundrels Who Built Our Electronic Age
Derek Cheung - 2014
This book shows the interconnection of each advance to the next on the long journey to our modern-day technologies. Exploring the combination of genius, infighting, and luck that powered the creation of today's electronic age, Conquering the Electron debunks the hero worship so often plaguing the stories of great advances. Want to know how AT&T's Bell Labs developed semiconductor technology--and how its leading scientists almost came to blows in the process? Want to understand how radio and television work--and why RCA drove their inventors to financial ruin and early graves? Conquering the Electron offers these stories and more, presenting each revolutionary technological advance right alongside blow-by-blow personal battles that all too often took place.
Variations on Normal
Dominic Wilcox - 2014
The bath, the fridge, the lamp post, the bicycle, the tree. so far, so humdrum.But not if you are Dominic Wilcox. Dominic sees things a little differently. For him, inside each of these everyday things are hundreds of surprising ideas waiting to be discovered.The Portable Bottom Seat, the Sick Bag Beard, Wrist Nets for the Butterfingered - Dominic's unexpected inventions, conflations and modifications promise to make your life that little bit easier, or at least more amusing.Normal will never seem quite so normal again.
Routing and Switching Essentials Companion Guide
Cisco Systems Inc. - 2014
This course describes the architecture, components, and operations of routers and switches in a small network. You learn how to configure a router and a switch for basic functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with RIPv1, RIPv2, single-area and multi-area OSPF, virtual LANs, and inter-VLAN routing in both IPv4 and IPv6 networks. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book's features help you focus on important concepts to succeed in this course:Chapter objectives-Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms-Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. Glossary-Consult the comprehensive Glossary with more than 200 terms. Summary of Activities and Labs-Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding-Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. Related Title: Routing and Switching Essentials Lab Manual How To-Look for this icon to study the steps you need to learn to perform certain tasks. Interactive Activities-Reinforce your understanding of topics by doing all the exercises from the online course identified throughout the book with this icon. Videos-Watch the videos embedded within the online course. Packet Tracer Activities-Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters. Hands-on Labs-Work through all the course labs and additional Class Activities that are included in the course and published in the separate Lab Manual.
Growing Up Social: Raising Relational Kids in a Screen-Driven World
Gary Chapman - 2014
While technology can benefit us, it can also erode a sense of togetherness and hinder a child’s emotional and social development.In Growing Up Social, Gary Chapman and Arlene Pellicane will empower you with the tools you need to make positive changes . . . starting today. Through stories, wit, and wisdom, you’ll discover how to take back your home from an overdependence on screens. Plus, you’ll learn to teach the five A+ skills that every child needs to master: affection, appreciation, anger management, apology, and attention.Learn how to:Replace mindless screen time with meaningful family timeEstablish simple boundaries that make a huge differenceDiscover what's working for families that have become screen savvyEquip your child to be relationally rich in a digital worldLearn healthy ways to occupy your child while you get things doneNow is the time to equip your child with a healthy involvement with screens and an even healthier involvement with others.
40 Likely to Die Before 40: An Introduction to Alt Lit
Cameron Pierce - 2014
According to Stein that means Alt Lit will finally be considered 'classic.'" --Christopher Higgs Featuring work by Sam Pink (1.), Chelsea Martin (2.), Megan Boyle (3.), Beach Sloth (4.), Diana Salier (5.), Guillaume Morissette (6.), Jordan Castro (7.), Gabby Bess (8.), Alexander J Allison (9.), Janey Smith (10.), Michael Heald (11.), Juliet Escoria (12.), Jereme Dean (13.), Noah Cicero (14.), Mike Bushnell (15.), Tara Wray (16.), Spencer Madsen (17.), Laura Marie Marciano (18.), Jackson Nieuwland (19.), Carolyn DeCarlo (20.), Heiko Julien (21.), Stephen Tully Dierks (22.), Lucy Tiven (23.), Timothy Willis Sanders (24.), Ana Carrete (25.), Chris Dankland (26.), Oscar Schwartz (27.), Steve Roggenbuck (28.), Luna Miguel (29.), Crispin Best (30.), Lucy K Shaw (31.), Andrew Duncan Worthington (32.), Frank Hinton (33.), Sarah Jean Alexander (34.), Willis Plummer (35.), Keegan Crawford (36.), Richard Chiem (37.), Tao Lin (38.), Mira Gonzalez (39.), and Scott McClanahan (40.) Also included--"Poetry and the Image Macro" by Michael Hessel-Miel and an Afterword by Christopher Higgs.
Cracking the Tech Career: Insider Advice on Landing a Job at Google, Microsoft, Apple, or any Top Tech Company
Gayle Laakmann McDowell - 2014
A follow-up to The Google Resume, this book provides new information on what these companies want, and how to show them you have what it takes to succeed in the role. Early planners will learn what to study, and established professionals will discover how to make their skillset and experience set them apart from the crowd. Author Gayle Laakmann McDowell worked in engineering at Google, and interviewed over 120 candidates as a member of the hiring committee – in this book, she shares her perspectives on what works and what doesn't, what makes you desirable, and what gets your resume saved or deleted. Apple, Microsoft, and Google are the coveted companies in the current job market. They field hundreds of resumes every day, and have their pick of the cream of the crop when it comes to selecting new hires. If you think the right alma mater is all it takes, you need to update your thinking. Top companies, especially in the tech sector, are looking for more. This book is the complete guide to becoming the candidate they just cannot turn away. Discover the career paths that run through the top tech firms Learn how to craft the prefect resume and prepare for the interview Find ways to make yourself stand out from the hordes of other applicants Understand what the top companies are looking for, and how to demonstrate that you're it These companies need certain skillsets, but they also want a great culture fit. Grades aren't everything, experience matters, and a certain type of applicant tends to succeed. Cracking the Tech Career reveals what the hiring committee wants, and shows you how to get it.
Incredible Lego Technic: Cars, Trucks, Robots & More!
Paweł "Sariel" Kmieć - 2014
You'll find some of the world's best fan-created LEGO supercars, construction equipment, monster trucks, watercraft, and more, along with design notes and breakaway views of the truly incredible mechanisms inside.Look closely, and you'll learn how expert builders use differentials, suspensions, linkages, and complex gearing systems in their creations.Whether you're a beginning builder or a longtime LEGO fan, Incredible LEGO Technic offers a unique look at the artistry and engineering that can make your LEGO creations come alive.
The Computing Universe: A Journey Through a Revolution
Tony Hey - 2014
How did this happen in such a short time? And this is just the beginning. . . . In this book, Tony Hey and Gyuri P�pay lead us on a journey from the early days of computers in the 1930s to the cutting-edge research of the present day that will shape computing in the coming decades. Along the way, they explain the ideas behind hardware, software, algorithms, Moore's Law, the birth of the personal computer, the Internet and the Web, the Turing Test, Jeopardy's Watson, World of Warcraft, spyware, Google, Facebook, and quantum computing. This book also introduces the fascinating cast of dreamers and inventors who brought these great technological developments into every corner of the modern world. This exciting and accessible introduction will open up the universe of computing to anyone who has ever wondered where his or her smartphone came from.
Apps For All: Coding Accessible Web Applications
Heydon Pickering - 2014
There’s rarely a good reason to lock people out when openness is a foundational principle of the web.
Digital Wilderness
F.L. Ciano - 2014
His biggest stress is dodging the growing pressure he has been getting from Gabriella, his long-time girlfriend. She wants him to settle down, get married and have kids. Life is good, but is he ready for the big commitment?The stakes change drastically when Edward accepts a sudden promotion to the corporate headquarters in Boston, taking him away from his tough personal decisions while introducing him to the mysterious Human Augmentation Digital Interface project. At first, HADI appears to be the perfect software for the evolution of humanity, touted to help the disabled walk again, allow the deaf to hear and the blind to see.Then, Edward meets Noc. Suddenly, he discovers that this benevolent technology has a steep price and he is thrown into a lethal game of corporate espionage that leads to a nationwide manhunt for a deadly spy, a charge his enemies are intent to pin on him.Edward must sacrifice his freedom and risk everything he loves if he hopes to thwart Virton’s psychotic mastermind and save humanity from an insidious tool that will be able to control our very minds.
Java in a Nutshell: A Desktop Quick Reference
Benjamin J. Evans - 2014
Chock full of examples that demonstrate how to take complete advantage of modern Java APIs and development best practices, the first section of this thoroughly updated book provides a fast-paced, no-fluff introduction to the Java programming language and the core runtime aspects of the Java platform.The second section is a reference to core concepts and APIs that shows you how to perform real programming work in the Java environment. Get up to speed on language details, including Java 8 changes Learn object-oriented programming, using basic Java syntax Explore generics, enumerations, annotations, and lambda expressions Understand basic techniques used in object-oriented design Examine concurrency and memory, and how they’re intertwined Work with Java collections and handle common data formats Delve into Java’s latest I/O APIs, including asynchronous channels Use Nashorn to execute JavaScript on the Java Virtual Machine Become familiar with development tools in OpenJDK
DAX Patterns 2015
Alberto Ferrari - 2014
This book is a collection of ready-to-use data models and formulas in DAX, that you can use in Power Pivot for Excel and in Microsoft Analysis Services Tabular. Create your data model faster by using a DAX pattern!
Encyclopædia Moronica: Volume I
G. Ambatte - 2014
The Encyclopædia Moronica consists of 26 tales of the trials and tribulations endured by technical wizards in a world of users, apprentices, supervisors, managers and even CEOs, whose only magical power seems to be their superhuman ability to break things.
How to Build a Motorcycle: A racing adventure of mechanics, teamwork, and friendship
Saskia Lacey - 2014
Detailed illustrations explain the overall functions of the engine, clutch, brakes, distributors, as well as many other parts of the motorcycle. Through hard work and perseverance, the three friends learn about mechanics and teamwork as they work together to build a miniature motorcycle.
Deployment Fundamentals, Vol. 5: Building a Real-World Infrastructure with Windows Server 2012 R2, MDT 2013, and PowerShell
Johan Arwidmark - 2014
In the modern datacenter, everything is about automation, repeatable processes, and well-designed and documented infrastructure. This can be accomplished with PowerShell and MDT 2013. In this book, you learn how to install and configure the core infrastructure components in Windows Server 2012 R2. You start from absolutely nothing, and using the book and its sample scripts, build a complete real-world, production-ready infrastructure.
100 Ideas that Changed the Web
Jim Boulton - 2014
Later ideas look at the origins of social networking and the latest developments on the Web, such as The Cloud and the Semantic Web.Following the design of the previous titles in the series, this book is in a new, smaller format. It provides an informed and fascinating illustrated history of our most used and fastest-developing technology.
When Computing Got Personal: A history of the desktop computer
Matt Nicholson - 2014
It is a tale not only of extraordinary innovation and vision but also of cunning business deals, boardroom tantrums and acrimonious lawsuits. Here you will find some of the most intelligent and eccentric people you could hope to meet, including wide-eyed hippies, subversive students, computer nerds, entrepreneurs, hackers, crackers and financial backers. Some lost out and some became millionaires, but all played a part in transforming our world.
Iron-Clad Java: Building Secure Web Applications
Jim Manico - 2014
Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource, you'll gain valuable secure software engineering skills.Establish secure authentication and session management processesImplement a robust access control design for multi-tenant web applicationsDefend against cross-site scripting, cross-site request forgery, and clickjackingProtect sensitive data while it is stored or in transitPrevent SQL injection and other injection attacksEnsure safe file I/O and uploadUse effective logging, error handling, and intrusion detection methodsFollow a comprehensive secure software development lifecycleIn this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. A significant amount of thought was given to include the most useful and relevant security content for designers to defend their applications. This is not a book about security theories, it's the hard lessons learned from those who have been exploited, turned into actionable items for application designers, and condensed into print. ―From the Foreword by Milton Smith, Oracle Senior Principal Security Product Manager, Java
Thinking in HTML
Aravind Shenoy - 2014
Instead of wandering through loads of theory, we will understand HTML practically so that we can semantically define the markup and structure of a webpage. We have used Notepad for the examples in this book. Alternatively, you can also use Notepad++ or any advanced editor. All you need to do is copy the code and paste it into Notepad. Upon execution, you will get the output as depicted in the screenshots. Screenshots are provided for each sample code. Coding improves with practice. The examples in this book are compatible with almost every modern browser such as Mozilla Firefox, Opera or Google Chrome to name a few. Instead of using the verbatim code, you can modify the code and see the change in the output, thereby understanding the subtle nuances of HTML. By the end of the book, with practice, you can achieve better things as you get to grips with HTML.
Android Studio Development Essentials
Neil Smyth - 2014
For coverage of the Android 6 SDK and the latest version of Android Studio we recommend Android Studio Development Essentials: Android 6 Edition.Beginning with the basics, this book provides an outline of the steps necessary to set up an Android Studio based development and testing environment.An overview of Android Studio is included covering areas such as tool windows, the code editor and the user interface Designer tool. An introduction to the architecture of Android is followed by an in-depth look at the design of Android applications and user interfaces using Android Studio.More advanced topics such as database management, content providers and intents are also covered, as are touch screen handling, gesture recognition, camera access and the playback and recording of both video and audio. This edition of the book also covers features introduced with Android 4.4 including printing, transitions and cloud-based file storage.In addition to covering general Android development techniques, the book also includes Google Play specific topics such as implementing maps using the Google Maps Android API, in-app billing and submitting apps to the Google Play Developer Console.Chapters also cover advanced features of Android Studio such as Gradle build configuration and the implementation of build variants to target multiple Android device types from a single project code base.Assuming you already have some Java programming experience, are ready to download Android Studio and the Android SDK, have access to a Windows, Mac or Linux system and ideas for some apps to develop, you are ready to get started.
Microsoft SQL Server 2014 Query Tuning & Optimization
Benjamin Nevarez - 2014
The book describes the inner workings of the query processor so you can write better queries and provide the query processor with the quality information it needs to produce efficient execution plans. You'll also get tips for troubleshooting underperforming queries. In-Memory OLTP (Hekaton), a key new feature of SQL Server 2014, is fully covered in this practical guide.Understand how the query optimizer works Troubleshoot queries using extended events, SQL trace, dynamic management views (DMVs), the data collector, and other tools Work with query operators for data access, joins, aggregations, parallelism, and updates Speed up queries and dramatically improve application performance by creating the right indexes Understand statistics and how to detect and fix cardinality estimation errors Maximize OLTP query performance using In-Memory OLTP (Hekaton) features, including memory-optimized tables and natively compiled stored procedures Monitor and promote plan caching and reuse to improve application performance Improve the performance of data warehouse queries using columnstore indexes Handle query processor limitations with hints and other methods
Pro-Blogging Secrets: Strategies, Tips, and Answers You Need to Grow Your Blog and Earn More Money (Blogging Guide Book 2)
Bob Lotich - 2014
**** Download the first book for FREE at EfficientBlogging.com **** Learn how Bob and his team: - Gained 20,000+ legit Facebook fans in less than 7 months, - Increased earnings by $1,000/m with a 5-minute exercise, - Hire extremely qualified workers who share the vision, - Used an Adsense provided tool to increase ad revenue by 80%, - Took the necessary steps to formalize the blog into a legitimate business, - Continue to come up with new blog post ideas - even after writing over 2,000. Are you looking to grow your blog's audience? Use social media effectively? Increase your earnings? This book provides these answers as well as: - Step-by-step tutorials of strategies that have proved successful (with over 30 screenshots). - Secrets used to increase earnings that haven't been shared before. - Traffic generating techniques that yielded over 22,000,000 visitors to his blog over the last 7 years. Bob also uses his 7+ years of blogging experience to share: - 3 simple article ideas guaranteed to get shared. - His checklist of things to do AFTER hitting “publish” - What to do when your blog earnings reach a plateau. - His most helpful 10 Wordpress plugins that he can’t live without. - How to avoid a silly mistake many bloggers make that is just inviting lawsuits. - The 5 most common traits of professional bloggers. Have you ever wondered? - How do I protect you site from Hackers and other threats? - How to get a logo that looks like I paid $1,000 for it? - What your chances are of becoming a pro-blogger? - If you really have to include your home address in all your emails to your subscribers? - How to keep people from stealing your content? - How to keep inappropriate ads off your site? - How to keep email from eating up all your time? All these questions are answered and much more!
System Center 2012 R2 Configuration Manager: Mastering the Fundamentals
Kent Agerlund - 2014
This is the ultimate source for the working IT Professional who wants to design and implement System Center 2012 R2 Configuration Manager in a midsize- or small-business environment. Enterprise administrators also will find a lot of inspiration, as many of the features and scenarios discussed fit all three environments. The book is packed with real-world scenarios taken from 17 years of experience with SMS and ConfigMgr projects. By following the book from A-Z, you will end up with a ConfigMgr environment that is based on best practices and production ready.
Articulations. On the Utilisation and Meanings of Psychedelics
Julian Palmer - 2014
Drawing upon 15 years of profound research, Articulations is an illuminating inquiry into the many different plants and compounds available in the modern day, conducive ‘mindsets’ and understandings regarding how psychedelics can be most constructively utilised. Articulations presents an uncompromising and clear analysis of the psychedelic state, intricately exploring the origins of the visions, the nature of the beings, and how authentic healing can most effectively proceed through the conscious use of psychedelics.
Mobile for Good: A How-To Fundraising Guide for Nonprofits
Heather Mansfield - 2014
Build, Discover, Survive! Mastering Minecraft Strategy Guide
Brady Games - 2014
This essential guide teaches you to master its world! All you need in 1 book, over 200 pages of tips and strategies for players of any skill level.Complete "Minecraft "coverage.Basic to advanced tacticsFrom your first world to large-scale projectsEasy to FollowExamples presented in clear languageEvery game mode, all forms of building.Mining & farmingBrewing & enchantingMonsters & defensesUsing Redstone, and much more!That s Not All!Game modsTexture packs Joining & creating servers "
Mobile Learning
Spotlight on Digital Media & Learning - 2014
This collection of news stories and interviews with digital media experts and scholars shows how widespread adoption of mobile devices provides an opportunity to rethink student-teacher and student-to-student interaction. It also includes practical information on how teachers are transforming their courses using mobile technology, and looks at efforts to alter school policies to allow students to use mobile devices, from phones to GPS trackers, to bring more hands-on experience to the learning process.
Learn Python in One Day and Learn It Well: Python for Beginners with Hands-on Project
Jamie Chan - 2014
Master Python Programming with a unique Hands-On Project Have you always wanted to learn computer programming but are afraid it'll be too difficult for you? Or perhaps you know other programming languages but are interested in learning the Python language fast? This book is for you. You no longer have to waste your time and money learning Python from lengthy books, expensive online courses or complicated Python tutorials. What this book offers... Python for Beginners Complex concepts are broken down into simple steps to ensure that you can easily master the Python language even if you have never coded before. Carefully Chosen Python Examples Examples are carefully chosen to illustrate all concepts. In addition, the output for all examples are provided immediately so you do not have to wait till you have access to your computer to test the examples. Careful selection of topics Topics are carefully selected to give you a broad exposure to Python, while not overwhelming you with information overload. These topics include object-oriented programming concepts, error handling techniques, file handling techniques and more. Learn The Python Programming Language Fast Concepts are presented in a "to-the-point" style to cater to the busy individual. With this book, you can learn Python in just one day and start coding immediately. How is this book different... The best way to learn Python is by doing. This book includes a complete project at the end of the book that requires the application of all the concepts taught previously. Working through the project will not only give you an immense sense of achievement, it"ll also help you retain the knowledge and master the language. Are you ready to dip your toes into the exciting world of Python coding? This book is for you. With the first edition of this book being a #1 best-selling programming ebook on Amazon for more than a year, you can rest assured that this new and improved edition is the perfect book for you to learn the Python programming language fast. Click the BUY button and download it now. What you'll learn: - What is Python? - What software you need to code and run Python programs? - What are variables? - What are the common data types in Python? - What are Lists and Tuples? - How to format strings - How to accept user inputs and display outputs - How to control the flow of program with loops - How to handle errors and exceptions - What are functions and modules? - How to define your own functions and modules - How to work with external files - What are objects and classes - How to write your own class - What is inheritance - What are properties - What is name mangling .. and more... Finally, you'll be guided through a hands-on project that requires the application of all the topics covered. Click the BUY button and download the book now to start learning Python. Learn it fast and learn it well. Tags: ------------ Python, Object-oriented Python, Python course, Python book, learning Python, Python language, Python examples, Python tutorials, Python programming language, Python coding, Pyth
Intellectual Privacy: Rethinking Civil Liberties in the Digital Age
Neil Richards - 2014
Courts all over the world have struggled with how to reconcile the problems of media gossip with our commitment to free and open public debate for over a century. The rise of the Internet has made this problem more urgent. We live in an age of corporate and government surveillance of our lives. And our free speech culture has created an anything-goes environment on the web, where offensive and hurtful speech about others is rife. How should we think about the problems of privacy and free speech? In Intellectual Privacy, Neil Richards offers a different solution, one that ensures that our ideas and values keep pace with our technologies. Because of the importance of free speech to free and open societies, he argues that when privacy and free speech truly conflict, free speech should almost always win. Only when disclosures of truly horrible information are made (such as sex tapes) should privacy be able to trump our commitment to free expression. But in sharp contrast to conventional wisdom, Richards argues that speech and privacy are only rarely in conflict. America's obsession with celebrity culture has blinded us to more important aspects of how privacy and speech fit together. Celebrity gossip might be a price we pay for a free press, but the privacy of ordinary people need not be. True invasions of privacy like peeping toms or electronic surveillance will rarely merit protection as free speech. And critically, Richards shows how most of the law we enact to protect online privacy pose no serious burden to public debate, and how protecting the privacy of our data is not censorship. More fundamentally, Richards shows how privacy and free speech are often essential to each other. He explains the importance of 'intellectual privacy, ' protection from surveillance or interference when we are engaged in the processes of generating ideas - thinking, reading, and speaking with confidantes before our ideas are ready for public consumption. In our digital age, in which we increasingly communicate, read, and think with the help of technologies that track us, increased protection for intellectual privacy has become an imperative. What we must do, then, is to worry less about barring tabloid gossip, and worry much more about corporate and government surveillance into the minds, conversations, reading habits, and political beliefs of ordinary people. A timely and provocative book on a subject that affects us all, Intellectual Privacy will radically reshape the debate about privacy and free speech in our digital age.
The Decline and Fall of Nokia
David J. Cord - 2014
The book deals with the decline and fall of the Nokia company.
Professional Microsoft SQL Server 2014 Integration Services
Brian Knight - 2014
The increased functionality will streamline your ETL processes and smooth out your workflow, but the catch is that your workflow must change. New tools come with new best practices, and "Professional Microsoft SQL Server 2014 Integration Services" will keep you ahead of the curve. SQL Server MVP Brian Knight is the most respected name in the business, and your ultimate guide to navigating the changes to use Microsoft SQL Server Integration Services 2014 to your utmost advantage.Implement new best practices for effective use of SSISWork through tutorials for hands-on learning of complex techniquesRead case studies that illustrate the more advanced conceptsLearn directly from the foremost authority on SSISSQL Server Integration Services is a complex tool, but it's the lifeblood of your work. You need to know it inside out, and you must understand the full potential of its capabilities in order to use it effectively. You need to make sure the right architecture is in place. "Professional Microsoft SQL Server 2014 Integration Services" is your roadmap to understanding SSIS on a fundamental level, and setting yourself up for success.
Raspberry Pi Cookbook for Python Programmers
Tim Cox - 2014
The aim of this book is to bring you a broad range of Python 3 examples and practical ideas which you can develop to suit your own requirements. By modifying and combining the examples to create your own projects you learn far more effectively with a much greater understanding. Each chapter is designed to become a foundation for further experimentation and discovery of the topic, providing you with the tools and information to jump right in. Readers are expected to be familiar with programming concepts and Python (where possible Python 3 is used), although beginners should manage with the help of a good Python reference book and background reading. No prior knowledge of the Raspberry Pi or electronics is required; however for the hardware sections you will need some basic electronic components/household tools to build some of the projects.
IPv6 Address Planning: Designing an Address Plan for the Future
Tom Coffeen - 2014
Meanwhile, IPv6 adoption is surging. More than half of the traffic on the nation's largest mobile network is over IPv6 while a social networking giant plans to no longer use IPv4 internally within 18 months. No matter where you work, as a networking professional, IPv6 adoption is in your future.Along with that adoption comes the need for an IPv6 address plan. This guide provides a comprehensive overview of how to create one. In three sections--preparation, design, and maintenance--enterprise IT network architects, engineers, and administrators will learn the current best-practices for designing, deploying, and maintaining an effective IPv6 addressing plan.
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
Peter N Hansteen - 2014
With more and more services placing high demands on bandwidth and an increasingly hostile Internet environment, no sysadmin can afford to be without PF expertise.The third edition of The Book of PF covers the most up-to-date developments in PF, including new content on IPv6, dual stack configurations, the "queues and priorities" traffic-shaping system, NAT and redirection, wireless networking, spam fighting, failover provision ing, logging, and more.You'll also learn how to:Create rule sets for all kinds of network traffic, whether crossing a simple LAN, hiding behind NAT, traversing DMZs, or spanning bridges or wider networksSet up wireless networks with access points, and lock them down using authpf and special access restrictionsMaximize flexibility and service availability via CARP, relayd, and redirectionBuild adaptive firewalls to proactively defend against attackers and spammersHarness OpenBSD's latest traffic-shaping system to keep your network responsive, and convert your existing ALTQ configurations to the new systemStay in control of your traffic with monitoring and visualization tools (including NetFlow)The Book of PF is the essential guide to building a secure network with PF. With a little effort and this book, you'll be well prepared to unlock PF's full potential.
Programming in D
Ali Çehreli - 2014
It pragmatically combines efficiency, control, and modeling power, with safety and programmer productivity.Programming in D, by Ali Çehreli, is an introduction and complete reference to the D programming language. Covering almost every language feature in D, Programming in D starts with the famous Hello World program, and then goes on to explain structs, classes, interfaces, conditional compilation, contracts, ranges, concurrency, and much more. Each section is ended with a series of exercises, based on real world problems, that force you to completely understand the subject of the chapter before moving on.
Bitcoin for the Befuddled
Conrad Barski - 2014
Already used by people and companies around the world, many forecast that Bitcoin could radically transform the global economy. The value of a bitcoin has soared from less than a dollar in 2011 to well over $1000 in 2013, with many spikes and crashes along the way. The rise in value has brought Bitcoin into the public eye, but the cryptocurrency still confuses many people. Bitcoin for the Befuddled covers everything you need to know about Bitcoin—what it is, how it works, and how to acquire, store, and use bitcoins safely and securely. You'll also learn about Bitcoin's history, its complex cryptography, and its potential impact on trade and commerce. The book includes a humorous, full-color comic explaining Bitcoin concepts, plus a glossary of terms for easy reference.
Kindle Unlimited: What to Know Before You Pay & How to Maximize Your Kindle Unlimited Subscription
Jeremy Simmons - 2014
Voracious readers can get lost in a bookstore for hours perusing titles and adding books to their to read list. Once you have been bitten by the eBook bug, you will get the chance to live in a technological bookstore without ever leaving your house or getting out of your pajamas. It is a new, exciting world and with millions of books being made available in digital format, books you have struggled to find are all available with the touch of a button. With the world turning to eBooks, there are plenty of services that cater to bookworms. What if you could have unlimited access to hundreds of thousands of eBooks for one low monthly fee? We have fallen in love with services like Pandora and Netflix that satisfy our music and television needs, it only makes sense an unlimited book service would be next. Imagine being able to read 20 books a month for under $10. There are several services out there waiting for you to give them a try. Kindle Unlimited is one of the leaders in the eBook subscription service, but is it right for you? Is there a better option? You will learn all you need to know about Kindle Unlimited and its competitors in this book. This book will help you make the decision about a subscription book service and which is right for you. Learn about the pros and the inevitable cons of Kindle Unlimited. Is it worth the monthly fee? There are a lot of questions you need to get answered before you hand over your credit card. Do yourself a favor and make this book the one you read before signing up for any service.
Engaging Students Through Social Media: Evidence-Based Practices for Use in Student Affairs
Reynol Junco - 2014
Author Reynol Junco, associate professor at Purdue University and fellow at the Harvard Berkman Center for Internet & Society, has been widely cited for his research on the impact of social technology on students. In Engaging Students through Social Media: Evidence-Based Practice for Use in Student Affairs, he offers a practical plan for implementing effective social media strategies within higher education settings.The book bridges the gap between a desire to use social media and the process knowledge needed to actually implement and assess effective social media interventions, providing a research-based understanding of how students use social media and the ways it can be used to enhance student learning.Discover how social media can be used to enhance student development and improves academic outcomes Learn appropriate strategies for social media use and how they contribute to student success in both formal and informal learning settings Dispel popular myths about how social media use affects students Learn to use social media as a way to engage students, teach online civil discourse, and support student development The benefits of social media engagement include improvements in critical thinking skills, content knowledge, diversity appreciation, interpersonal skills, leadership skills, community engagement, and student persistence. This resource helps higher education professionals understand the value of using social media, and offers research-based strategies for implementing it effectively.