Murach's PHP and MySQL
Joel Murach - 2010
Teaches developers how to build database-driven web applications using two of today's most popular open-source software tools, PHP and MySQL.
Deep Fakes and the Infocalypse: What You Urgently Need To Know
Nina Schick - 2020
When combined with powerful voice AI, the results are utterly convincing.So-called 'Deep Fakes' are not only a real threat for democracy but they take the manipulation of voters to new levels. They will also affect ordinary people. This crisis of misinformation we are facing has been dubbed the 'Infocalypse'.Using her expertise from working in the field, Nina Schick reveals shocking examples of Deep Fakery and explains the dangerous political consequences of the Infocalypse, both in terms of national security and what it means for public trust in politics. She also unveils what it means for us as individuals, how Deep Fakes will be used to intimidate and to silence, for revenge and fraud, and how unprepared governments and tech companies are.As a political advisor to select technology firms, Schick tells us what we need to do to prepare and protect ourselves. Too often we build the cool technology and ignore what bad guys can do with it before we start playing catch-up. But when it comes to Deep Fakes, we urgently need to be on the front foot.
The Sciences of the Artificial
Herbert A. Simon - 1969
There are updates throughout the book as well. These take into account important advances in cognitive psychology and the science of design while confirming and extending the book's basic thesis: that a physical symbol system has the necessary and sufficient means for intelligent action. The chapter "Economic Reality" has also been revised to reflect a change in emphasis in Simon's thinking about the respective roles of organizations and markets in economic systems."People sometimes ask me what they should read to find out about artificial intelligence. Herbert Simon's book The Sciences of the Artificial is always on the list I give them. Every page issues a challenge to conventional thinking, and the layman who digests it well will certainly understand what the field of artificial intelligence hopes to accomplish. I recommend it in the same spirit that I recommend Freud to people who ask about psychoanalysis, or Piaget to those who ask about child psychology: If you want to learn about a subject, start by reading its founding fathers." -- George A. Miller
The Best of 2600: A Hacker Odyssey
Emmanuel Goldstein - 2008
Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.
Pragmatic Version Control Using Git
Travis Swicegood - 2008
High-profile projects such as the Linux Kernel, Mozilla, Gnome, and Ruby on Rails are now using Distributed Version Control Systems (DVCS) instead of the old stand-bys of CVS or Subversion.Git is a modern, fast, DVCS. But understanding how it fits into your development can be a daunting task without an introduction to the new concepts. Whether you're just starting out as a professional programmer or are an old hand, this book will get you started using Git in this new distributed world. Whether you're making the switch from a traditional centralized version control system or are a new programmer just getting started, this book prepares you to start using Git in your everyday programming.Pragmatic Version Control Using Git starts with an overview of version control systems, and shows how being distributed enables you to work more efficiently in our increasingly mobile society. It then progresses through the basics necessary to get started using Git.You'll get a thorough overview of how to take advantage of Git. By the time you finish this book you'll have a firm grounding in how to use Git, both by yourself and as part of a team.Learn how to use how to use Git to protect all the pieces of your project Work collaboratively in a distributed environment Learn how to use Git's cheap branches to streamline your development Install and administer a Git server to share your repository
Grouped: How Small Groups of Friends Are the Key to Influence on the Social Web
Paul Adams - 2011
It is moving away from its current structure of documents and pages linked together, and towards a new structure that is built around people. This is a profound change that will affect how we create business strategy, design, marketing, and advertising. The reason for this shift is simple. For tens of thousands of years we've been social animals. The web, which is only 20 years old, is simply catching up with offline life.From travel to news to commerce, smart businesses are reorienting their efforts around people-around the social behavior of their customers and potential customers. In order to be successful, businesses will need to understand how people are connected, how their social network influences them, how the people closest to them influence them the most, and how it's more important for marketers to focus on small, connected groups of friends rather than looking for overly influential individuals.This book pulls together the latest research from leading universities and technology companies to describe how people are connected, and how ideas and brand messages spread through social networks. It shows readers how to rebuild their business around social behavior, and create products that people tell their friends about.
The Aging Brain: Proven Steps to Prevent Dementia and Sharpen Your Mind
Timothy R. Jennings - 2018
The choices we make now can help us to maintain our vitality, a sharp mind, and our independence as we age.Filled with simple, everyday actions we can take to avoid disease, promote vitality, and prevent dementia and late onset Alzheimer's, The Aging Brain is an easy-to-use guide to maintaining brain and body health throughout our lives. Based on solid, up-to-date scientific research, the interventions explained in this book not only prevent progression toward dementia even in those who have already shown mild cognitive impairment, they also reduce disability and depression and keep people living independently longer than those who do not practice these methods.For anyone hoping to slow the aging process, as well as anyone who acts as a caregiver to someone at risk of or already beginning to suffer from dementia and other age-related diseases, this book offers a hopeful, healthy way forward.
The Infinite Machine: How an Army of Crypto-hackers Is Building the Next Internet with Ethereum
Camila Russo - 2020
He convinced a crack group of coders to join him in his quest to make a super-charged, global computer.The Infinite Machine introduces Vitalik’s ingenious idea and unfolds Ethereum’s chaotic beginnings. It then explores the brilliant innovation and reckless greed the platform—an infinitely adaptable foundation for experimentation and new applications—has unleashed and the consequences that resulted as the frenzy surrounding it grew: increased regulatory scrutiny, incipient Wall Street interest, and the founding team’s effort to get the Ethereum platform to scale so it can eventually be accessible to the masses.Financial journalist and cryptocurrency expert Camila Russo details the wild and often hapless adventures of a team of hippy-anarchists, reluctantly led by an ambivalent visionary, and lays out how this new foundation for the internet will spur both transformation and fraud—turning some into millionaires and others into felons—and revolutionize our ideas about money.
The Problem with Software: Why Smart Engineers Write Bad Code
Adam Barr - 2018
As the size and complexity of commercial software have grown, the gap between academic computer science and industry has widened. It's an open secret that there is little engineering in software engineering, which continues to rely not on codified scientific knowledge but on intuition and experience.Barr, who worked as a programmer for more than twenty years, describes how the industry has evolved, from the era of mainframes and Fortran to today's embrace of the cloud. He explains bugs and why software has so many of them, and why today's interconnected computers offer fertile ground for viruses and worms. The difference between good and bad software can be a single line of code, and Barr includes code to illustrate the consequences of seemingly inconsequential choices by programmers. Looking to the future, Barr writes that the best prospect for improving software engineering is the move to the cloud. When software is a service and not a product, companies will have more incentive to make it good rather than "good enough to ship."
It's Never Too Late to Sleep Train: The Low-Stress Way to High-Quality Sleep for Babies, Kids, and Parents
Craig Canapari - 2019
Craig Canapari became a father, he realized that all his years of 36-hour hospital shifts didn't even come close to preparing him for the sleep deprivation that comes with parenthood. The difference is that parents don’t get a break—it’s hard to know if there’s a night of uninterrupted sleep anywhere in the foreseeable future. Sleepless nights for kids mean sleepless nights for the rest of the family—and a grumpy group around the breakfast table in the morning. In It's Never Too Late to Sleep Train, Canapari helps parents harness the power of habit to chart a clear path to high-quality sleep for their children. The result is a streamlined two-step sleep training plan that focuses on cues and consequences, the two elements that shape all habits and that take on special importance when it comes to kids’ bedtime routines. Dr. Canapari distills years of clinical research and experience to make sleep training simple and stress-free. Even if you’ve been told that you’ve missed the optimal "window" for sleep training, Dr. Canapari is here to prove that it's never too late, whether your child is 6 months or 6 years old. He's on your side in the battle against bedtime, and with his advice, parents and children alike can expect a lifetime of healthy sleep.
Stop the Fight!: An Illustrated Guide for Couples: How to Break Free from the 12 Most Common Arguments and Build a Relationship That Lasts
Michelle Brody - 2015
In her 20 years of working with couples, clinical psychologist Michelle Brody found a way to make change simpler. Her secret: clear and lighthearted illustrations that help couples literally see what’s driving their battles and blocking their bond, so they can chart a course together to stop the fights.The Money Fight “You’re such a cheapskate!” “You spend way too much!”The Sex Fight “Not tonight. I’m not in the mood.” “You haven’t been in the mood since 1975!”The Parenting Differences Fight “You’re too overprotective!” “Is skydiving next?!”Stop the Fight! includes more than 300 illustrations to help couples unlock the destructive cycles that drive the birthday fight, the difficult relatives fight, and other familiar battles. Going beyond common relationship advice, the tools in Stop the Fight! will help you understand the big picture and create lifelong change.
Staff Engineer: Leadership Beyond the Management Track
Will Larson - 2021
At that career level, you’ll no longer be required to work towards the next promotion, and being promoted beyond it is exceptional rather than expected. At that point your career path will branch, and you have to decide between remaining at your current level, continuing down the path of technical excellence to become a Staff Engineer, or switching into engineering management. Of course, the specific titles vary by company, and you can replace “Senior Engineer” and “Staff Engineer” with whatever titles your company prefers. Over the past few years we’ve seen a flurry of books unlocking the engineering management career path, like Camille Fournier’s The Manager’s Path, Julie Zhuo’s The Making of a Manager, Lara Hogan’s Resilient Management and my own, An Elegant Puzzle. The management career isn’t an easy one, but increasingly there are maps available for navigating it. On the other hand, the transition into Staff Engineer, and its further evolutions like Principal and Distinguished Engineer, remains challenging and undocumented. What are the skills you need to develop to reach Staff Engineer? Are technical abilities alone sufficient to reach and succeed in that role? How do most folks reach this role? What is your manager’s role in helping you along the way? Will you enjoy being a Staff Engineer or you will toil for years to achieve a role that doesn’t suit you? "Staff Engineer: Leadership beyond the management track" is a pragmatic look at attaining and operating in these Staff-plus roles.
I Heart Logs: Event Data, Stream Processing, and Data Integration
Jay Kreps - 2014
Even though most engineers don't think much about them, this short book shows you why logs are worthy of your attention.Based on his popular blog posts, LinkedIn principal engineer Jay Kreps shows you how logs work in distributed systems, and then delivers practical applications of these concepts in a variety of common uses--data integration, enterprise architecture, real-time stream processing, data system design, and abstract computing models.Go ahead and take the plunge with logs; you're going love them.Learn how logs are used for programmatic access in databases and distributed systemsDiscover solutions to the huge data integration problem when more data of more varieties meet more systemsUnderstand why logs are at the heart of real-time stream processingLearn the role of a log in the internals of online data systemsExplore how Jay Kreps applies these ideas to his own work on data infrastructure systems at LinkedIn
Male vs. Man: How to Honor Women, Teach Children, and Elevate Men to Change the World
Dondré T. Whitfield - 2020
Men look to be of service. Emmy Award–nominated actor best known for his role on Queen Sugar and transformational speaker Dondré Whitfield challenges us to be real men in this provocative look at the power found in serving others.Too many males abuse the power they have.Often those males grow up without healthy role models and so, while they look like men, they act like boys. Only now there are adult consequences to their actions.And many of us are caught in the shifting cultural ideas about manhood, unsure of how to make sound decisions or truly be a man. Every day we find evidence that the role of men at home, at work, and out in the world is deeply misinterpreted.In Male vs. Man, Dondré Whitfield equips us to become men rather than simply "grown males." Men are healthy and productive servant-leaders who bring positive change to their communities. Males are self-serving and stuck in negative cycles that we hear and read about daily. They create chaos instead of cultivating calm.Male vs. Man is an uplifting playbook for men who want to level up. It will help men and women alike understand what real manhood is, based on biblical wisdom as well as hard-earned lessons from someone who has been there. With practical guidance and a strong spiritual foundation, Dondré shows how to cultivate the life-changing spiritual, emotional, and psychological attributes of servant leadership at home, at work, and in our communities.
The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online
Mary Aiken - 2016
Levitt, co-author of Freakonomics - One of the best books of the year--NatureMary Aiken, the world's leading expert in forensic cyberpsychology, offers a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, privacy, and our perception of the world. Drawing on her own research and extensive experience with law enforcement, Aiken covers a wide range of subjects, from the impact of screens on the developing child to the explosion of teen sexting and the acceleration of compulsive and addictive behaviors online. Aiken provides surprising statistics and incredible-but-true case studies of hidden trends that are shaping our culture and raising troubling questions about where the digital revolution is taking us.Praise for The Cyber Effect"How to guide kids in a hyperconnected world is one of the biggest challenges for today's parents. Mary Aiken clearly and calmly separates reality from myth. She clearly lays out the issues we really need to be concerned about and calmly instructs us on how to keep our kids safe and healthy in their digital lives."--Peggy Orenstein, author of the New York Times bestseller Girls & Sex"[A] fresh voice and a uniquely compelling perspective that draws from the murky, fascinating depths of her criminal case file and her insight as a cyber-psychologist . . . This is Aiken's cyber cri de coeur as a forensic scientist, and she wants everyone on the case."--The Washington Post"Fascinating . . . If you have children, stop what you are doing and pick up a copy of The Cyber Effect."--The Times (UK)"An incisive tour of sociotechnology and its discontents."--Nature"Just as Rachel Carson launched the modern environmental movement with her Silent Spring, Mary Aiken delivers a deeply disturbing, utterly penetrating, and urgently timed investigation into the perils of the largest unregulated social experiment of our time."--Bob Woodward"Mary Aiken takes us on a fascinating, thought-provoking, and at times scary journey down the rabbit hole to witness how the Internet is changing the human psyche. A must-read for anyone who wants to understand the temptations and tragedies of cyberspace."--John R. Suler, PhD, author of The Psychology of Cyberspace"Drawing on a fascinating and mind-boggling range of research and knowledge, Mary Aiken has written a great, important book that terrifies then consoles by pointing a way forward so that our experience online might not outstrip our common sense."--Steven D. Levitt"Having worked with law enforcement groups from INTERPOL and Europol as well as the U.S. government, Aiken knows firsthand how today's digital tools can be exploited by criminals lurking in the Internet's Dark Net."--Newsweek