iWoz: Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It


Steve Wozniak - 2006
    individual whose contributions to the scientific, business and cultural realms are extensive."—BookpageBefore slim laptops that fit into briefcases, computers looked like strange, alien vending machines. But in "the most staggering burst of technical invention by a single person in high-tech history" (BusinessWeek​) Steve Wozniak invented the first true personal computer. Wozniak teamed up with Steve Jobs, and Apple Computer was born, igniting the computer revolution and transforming the world. Here, thirty years later, the mischievous genius with the low profile treats readers to a rollicking, no-holds-barred account of his life—for once, in the voice of the wizard himself.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory


Michael Hale Ligh - 2014
    As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

Machine Learning for Hackers


Drew Conway - 2012
    Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you'll learn how to analyze sample datasets and write simple machine learning algorithms. "Machine Learning for Hackers" is ideal for programmers from any background, including business, government, and academic research.Develop a naive Bayesian classifier to determine if an email is spam, based only on its textUse linear regression to predict the number of page views for the top 1,000 websitesLearn optimization techniques by attempting to break a simple letter cipherCompare and contrast U.S. Senators statistically, based on their voting recordsBuild a "whom to follow" recommendation system from Twitter data

Worm: The First Digital World War


Mark Bowden - 2011
    Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.

Introduction to Machine Learning with Python: A Guide for Data Scientists


Andreas C. Müller - 2015
    If you use Python, even as a beginner, this book will teach you practical ways to build your own machine learning solutions. With all the data available today, machine learning applications are limited only by your imagination.You'll learn the steps necessary to create a successful machine-learning application with Python and the scikit-learn library. Authors Andreas Muller and Sarah Guido focus on the practical aspects of using machine learning algorithms, rather than the math behind them. Familiarity with the NumPy and matplotlib libraries will help you get even more from this book.With this book, you'll learn:Fundamental concepts and applications of machine learningAdvantages and shortcomings of widely used machine learning algorithmsHow to represent data processed by machine learning, including which data aspects to focus onAdvanced methods for model evaluation and parameter tuningThe concept of pipelines for chaining models and encapsulating your workflowMethods for working with text data, including text-specific processing techniquesSuggestions for improving your machine learning and data science skills

Please God Let it Be Herpes: A Heartfelt Quest For Love and Companionship


Carlos Kotkin - 2012
    His trouble with females usually begins upon opening his mouth.Here, Carlos shares his ups and mostly downs of bachelorhood, including romantic conquests with a slew of childhood crushes, insane yogis, a Playboy vixen, a STD host, the flaky, the deaf, and the just plain dumb. His unique mating style is not to be duplicated, but it will definitely make readers laugh-and want to get tested ASAP.

Problem Solving with C++: The Object of Programming


Walter J. Savitch - 1995
    It introduces the use of classes; shows how to write ADTs that maximize the perfomance of C++ in creating reusable code; and provides coverage of all important OO functions, including inheritance, polymorphism and encapsulation.

Raw: My 100% Grade-A, Unfiltered, Inside Look at Sports


Colin Cowherd - 2015
    But Colin Cowherd knows what really goes on—and he’s not afraid to share the vivid details of everything ESPN doesn’t show. From hotel parties for athletes and other industry professionals, to gossip from the road between games, to what happens behind closed doors, Cowherd—who has interviewed everyone from President Barack Obama to Kate Upton—draws on personal experiences to offer you an exclusive look into the rarefied, outrageous, ego-mad sports world. With unparalleled candor and the signature, brazen voice his fans have come to know and love, Cowherd offers a unique vantage point of places and events otherwise curtained to the general sports audience, while weaving in his opinions on aspects of competition, tradition, and all things refereed. If you want honest, unvarnished opinions on current sports rivalries, scandals, and statistics, it’s all in Raw—from one of America’s most outspoken sports broadcasters on air today.

Mistaking Africa: Curiosities and Inventions of the American Mind


Curtis A. Keim - 1980
    Although the occasional newspaper headline alerts us to genocide, AIDS, malaria, or civil war in Africa, most of us know very little about the continent. However we still carry strong mental images of Africa, which are reflected in American advertising, movies, amusement parks, cartoons, and many other corners of our society.Few think to question these perceptions or how they came to be so deeply lodged in the collective American consciousness. Curtis Keim’s Mistaking Africa looks at the historical evolution of this mindset and examines the role that popular media play in the creation of our mental images of Africa. Keim addresses the most prevalent myths and preconceptions and demonstrates how these prevent a true understanding of the enormously diverse peoples and cultures of Africa. Updated throughout, the second edition includes an entirely revised chapter on Africa in images, which analyzes portrayals of Africa in popular media, including print advertising by corporations such as Dow Chemical, ExxonMobil, IBM, Vogue magazine, Honda, and Snapple. New to the second edition as well is an appendix on learning more about Africa.ContentsPart One: Introduction1. Changing Our Mind about Africa2. How We LearnPart Two: Evolutionism3. The Origins of “Darkest Africa”4. “Our Living Ancestors”: Twentieth-Century Evolutionism5. Real Africa, Wise Africa6. We Should Help ThemPart Three: Further Misperceptions7. Cannibalism: No Accounting for Taste8. Africans Live in Tribes, Don’t They?9. Safari: Beyond Our Wildest Dreams10. Africa in ImagesPart Four: New Directions11. Race and Culture: The Same and the Other12. From Imagination to DialogueAppendix: Learning More

Fundamentals of Database Systems


Ramez Elmasri - 1989
    It features excellent examples and access to Addison Wesley's database Web site that includes further teaching, tutorials and many useful student resources.

Computer Networks and Internets [With CDROM and Companion Website Access Code Card]


Douglas E. Comer - 1996
    Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today's Internet to support applications ranging from web browsing to telephony and multimedia. This Fifth Edition has been thoroughly reorganized, revised, and updated: it includes extensive new coverage of topics ranging from wireless protocols to network performance, while reducing or eliminating coverage of older protocols and technologies. Comer begins by illuminating the applications and facilities offered by today's Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible: low-level data communications; packet switching, LAN, and WAN technologies; and Internet protocols such as TCP, IP, UDP, and IPv6. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, "not" mathematical proofs.

802.11 Wireless Networks: The Definitive Guide


Matthew S. Gast - 2002
    Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

SUNBURST and LUMINARY - An Apollo Memoir


Don Eyles - 2018
    His assignment is to program the complex lunar landing phase in the Lunar Module's onboard computer. As he masters his art the reader learns about the computer, the mission, and a bit about spacecraft navigation and meets a cast of interesting characters along the way. As Apollo 11 approaches, the author flies lunar landings in simulators and meets the astronauts who will fly the LM for real. He explains the computer alarms that almost prevented Neil Armstrong from landing and describes a narrow escape from another dangerous problem. He helps Pete Conrad achieve a pinpoint landing on Apollo 12, and works with Apollo 16 commander John Young on a technique for landing even more precisely. On Apollo 14 he devises a workaround when a faulty pushbutton threatens Alan Shepard's mission, earning a NASA award, a story in Rolling Stone, and a few lines in the history books. Along the way the author hits the high points of his eclectic personal life, as he enters adulthood in the 1960s. He writes for students of the Apollo project, for whom the development of the flight software is still largely unexplored territory, but also for the young coders of the current digital culture, who will get the author's observations on the art of programming and who may identify as he explores sex, drugs, and the other excitements of the era. The underlying thesis is that the American space program in the 1960s was successful not in spite of, but in large measure because of the idealism, the freedom of thought, and the sense of exploration, inner and outer, that prevailed in the culture during that period. The memoir concludes in a party atmosphere at the spectacular night launch of Apollo 17 before a glittery crowd an occasion that marked the high water mark, so far, of human space exploration.

The Old Farmer's Almanac 2017: Special Anniversary Edition


Old Farmer's Almanac - 2016
    What is 225 years old yet always of the moment? The Old Farmer’s Almanac! America’s oldest continuously published periodical, beloved by generations for being “useful, with a pleasant degree of humor,” celebrates its unique history with a special edition and more readers than ever before!   As the nation’s iconic calendar, the 2017 edition will predict and mark notable events; glance back and look forward, with historic perspectives on food, people, and businesses; salute legendary customs and folklore; hail celestial events; explore, forage, and cultivate the natural world; forecast traditionally 80 percent–accurate weather; inspire giggles and perhaps romance; and more—too much more to mention—all in the inimitably useful and humorous way it has done since 1792.