Book picks similar to
Gigabit Ethernet Technology & Applications for Hith-Speed LANs by Rich Seifert
electronics
internet
j
computers
Go To: The Story of the Math Majors, Bridge Players, Engineers, Chess Wizards, Maverick Scientists, and Iconoclasts-- the Programmers Who Created the Software Revolution
Steve Lohr - 2001
Lohr maps out the unique seductions of programming, and gives us an intimate portrait of the peculiar kind of genius that is drawn to this blend of art, science, and engineering, introducing us to the movers and shakers of the 1950s and the open-source movement of today. With original reporting and deft storytelling, Steve Lohr shows us how software transformed the world, and what it holds in store for our future.
Where Wizards Stay Up Late: The Origins of the Internet
Katie Hafner - 1996
Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960's, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.
Professional PHP Programming
Sascha Schumann - 1999
PHP is a server-side, HTML-embedded scripting language. It is an open source technology, rapidly gaining popularity as a scripting language for people running dynamic websites. One of its major attractions over Perl, JavaScript and other scripting languages is that PHP has a built-in database integration layer and seamless IP connectivity, with LDAP and TCP as well as the IMAP mail interface. Features; Real world, practical experience and techniques From installation and configuration of the PHP engine to advanced dynamic application design Definitive coverage of core PHP language and database addressing: MySQL is covered in depth. Practical e-commerce and business scripting including database application development, together with PHP and XML applications. LDAP connectivity addressed.
Microsoft Windows Internals: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer)
Mark E. Russinovich - 2004
This classic guidefully updated for Windows Server 2003, Windows XP, and Windows 2000, including 64-bit extensionsdescribes the architecture and internals of the Windows operating system. You’ll find hands-on experiments you can use to experience Windows internal behavior firsthand, along with advanced troubleshooting information to help you keep your systems running smoothly and efficiently. Whether you’re a developer or a system administrator, you’ll find critical architectural insights that you can quickly apply for better design, debugging, performance, and support.Get in-depth, inside knowledge of the Windows operating system: Understand the key mechanisms that configure and control Windows, including dispatching, startup and shutdown, and the registry Explore the Windows security model, including access, privileges, and auditing Investigate internal system architecture using the kernel debugger and other tools Examine the data structures and algorithms that deal with processes, threads, and jobs Observe how Windows manages virtual and physical memory Understand the operation and format of NTFS, and troubleshoot file system access problems View the Windows networking stack from top to bottom, including mapping, APIs, name resolution, and protocol drivers Troubleshoot boot problems and perform crash analysis
Free Culture: The Nature and Future of Creativity
Lawrence Lessig - 2004
Never before have the cultural powers- that-be been able to exert such control over what we can and can't do with the culture around us. Our society defends free markets and free speech; why then does it permit such top-down control? To lose our long tradition of free culture, Lawrence Lessig shows us, is to lose our freedom to create, our freedom to build, and, ultimately, our freedom to imagine.
The Definitive ANTLR 4 Reference
Terence Parr - 2012
Whether it's a data format like JSON, a network protocol like SMTP, a server configuration file for Apache, a PostScript/PDF file, or a simple spreadsheet macro language--ANTLR v4 and this book will demystify the process. ANTLR v4 has been rewritten from scratch to make it easier than ever to build parsers and the language applications built on top. This completely rewritten new edition of the bestselling Definitive ANTLR Reference shows you how to take advantage of these new features. Build your own languages with ANTLR v4, using ANTLR's new advanced parsing technology. In this book, you'll learn how ANTLR automatically builds a data structure representing the input (parse tree) and generates code that can walk the tree (visitor). You can use that combination to implement data readers, language interpreters, and translators. You'll start by learning how to identify grammar patterns in language reference manuals and then slowly start building increasingly complex grammars. Next, you'll build applications based upon those grammars by walking the automatically generated parse trees. Then you'll tackle some nasty language problems by parsing files containing more than one language (such as XML, Java, and Javadoc). You'll also see how to take absolute control over parsing by embedding Java actions into the grammar. You'll learn directly from well-known parsing expert Terence Parr, the ANTLR creator and project lead. You'll master ANTLR grammar construction and learn how to build language tools using the built-in parse tree visitor mechanism. The book teaches using real-world examples and shows you how to use ANTLR to build such things as a data file reader, a JSON to XML translator, an R parser, and a Java class->interface extractor. This book is your ticket to becoming a parsing guru!What You Need: ANTLR 4.0 and above. Java development tools. Ant build system optional (needed for building ANTLR from source)
Overconnected: The Promise and Threat of the Internet
William H. Davidow - 2010
pThe benefits of our recently arrived-at state of connectivity have been myriad from the ease with which it has been possible to buy a new house to the convenience of borrowing and investing money profitably. But the luxuries of the connected age have taken on a momentum all of their own. By counter-intuitively anatomizing how being overconnected tends to create systems of positive feedback that have largely negative consequences, Davidow explains everything from the recent Subprime mortgage crisis to the meltdown of Iceland, from the loss of people s privacy to the spectacular fall of the stock market. All because we were so miraculously wired together.pExplaining how such symptoms of Internet connection as unforeseeable accidents and how thought contagions acted to accelerate the downfall and make us permanently vulnerable to catastrophe, Davidow places our recent experience in historical perspective and offers a set of practical steps to minimize similar disasters in the future.pWilliam Davidow is a successful Silicon Valley venture capitalist, philanthropist, and author, and as a senior vice-president of Intel Corporation, he was responsible for the design of the Intel microprocessor chip. He has written three previous books Marketing High Technology (The Free Press, 1986) and Total Customer Service (Harper, 1989), both with Bro Uttal, and The Virtual Corporation" (Harper, 1992), with Michael Malone as well as columns for Forbes and numerous op-ed pieces. He graduated from Dartmouth College, has a masters degree from the California Institute of Technology, and a Ph.D. from Stanford University. He serves on the boards of Cal Tech, the California Nature Conservancy, and the Stanford Institute for Economic Policy Research.
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Joseph Menn - 2010
His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government.Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought—and why the Internet might not survive.
The Information Diet: A Case for Conscious Consumption
Clay A. Johnson - 2011
Not eating, but gorging on information ceaselessly spewed from the screens and speakers we hold dear. Just as we have grown morbidly obese on sugar, fat, and flour—so, too, have we become gluttons for texts, instant messages, emails, RSS feeds, downloads, videos, status updates, and tweets.We're all battling a storm of distractions, buffeted with notifications and tempted by tasty tidbits of information. And just as too much junk food can lead to obesity, too much junk information can lead to cluelessness. The Information Diet shows you how to thrive in this information glut—what to look for, what to avoid, and how to be selective. In the process, author Clay Johnson explains the role information has played throughout history, and why following his prescribed diet is essential for everyone who strives to be smart, productive, and sane.In The Information Diet, you will:Discover why eminent scholars are worried about our state of attention and general intelligenceExamine how today’s media—Big Info—give us exactly what we want: content that confirms our beliefsLearn to take steps to develop data literacy, attention fitness, and a healthy sense of humorBecome engaged in the economics of information by learning how to reward good information providersJust like a normal, healthy food diet, The Information Diet is not about consuming less—it’s about finding a healthy balance that works for you
Public Parts: How Sharing in the Digital Age is Revolutionizing Life, Business, and Society
Jeff Jarvis - 2011
More than 750 million people (and half of all Americans) use Facebook, where we share a billion times a day. The collective voice of Twitter echoes instantly 100 million times daily, from Tahrir Square to the Mall of America, on subjects that range from democratic reform to unfolding natural disasters to celebrity gossip. New tools let us share our photos, videos, purchases, knowledge, friendships, locations, and lives.Yet change brings fear, and many people--nostalgic for a more homogeneous mass culture and provoked by well-meaning advocates for privacy--despair that the internet and how we share there is making us dumber, crasser, distracted, and vulnerable to threats of all kinds. But not Jeff Jarvis.In this shibboleth-destroying book, "Public Parts "argues persuasively and personally that the internet and our new sense of publicness are, in fact, doing the opposite. Jarvis travels back in time to show the amazing parallels of fear and resistance that met the advent of other innovations such as the camera and the printing press. The internet, he argues, will change business, society, and life as profoundly as Gutenberg's invention, shifting power from old institutions to us all.Based on extensive interviews, "Public Parts "introduces us to the men and women building a new industry based on sharing. Some of them have become household names--Facebook's Mark Zuckerberg, Google's Eric Schmidt, and Twitter's Evan Williams. Others may soon be recognized as the industrialists, philosophers, and designers of our future. Jarvis explores the promising ways in which the internet and publicness allow us to collaborate, think, ways--how we manufacture and market, buy and sell, organize and govern, teach and learn. He also examines the necessity as well as the limits of privacy in an effort to understand and thus protect it. This new and open era has already profoundly disrupted economies, industries, laws, ethics, childhood, and many other facets of our daily lives. But the change has just begun. The shape of the future is not assured. The amazing new tools of publicness can be used to good ends and bad. The choices--and the responsibilities--lie with us. Jarvis makes an urgent case that the future of the internet--what one technologist calls "the eighth continent"--requires as much protection as the physical space we share, the air we breathe, and the rights we afford one another. It is a space of the public, for the public, and by the public. It needs protection and respect from all of us. As Secretary of State Hillary Clinton said in the wake of the uprisings in the Middle East, "If people around the world are going to come together every day online and have a safe and productive experience, we need a shared vision to guide us." Jeff Jarvis has that vision and will be that guide.
Darwin Among The Machines: The Evolution Of Global Intelligence
George Dyson - 1997
Dyson traces the course of the information revolution, illuminating the lives and work of visionaries - from the time of Thomas Hobbes to the time of John von Neumann - who foresaw the development of artificial intelligence, artificial life, and artificial mind. This book derives both its title and its outlook from Samuel Butler's 1863 essay "Darwin Among the Machines." Observing the beginnings of miniaturization, self-reproduction, and telecommunication among machines, Butler predicted that nature's intelligence, only temporarily subservient to technology, would resurface to claim our creations as her own. Weaving a cohesive narrative among his brilliant predecessors, Dyson constructs a straightforward, convincing, and occasionally frightening view of the evolution of mind in the global network, on a level transcending our own. Dyson concludes that we are in the midst of an experiment that echoes the prehistory of human intelligence and the origins of life. Just as the exchange of coded molecular instructions brought life as we know it to the early earth's primordial soup, and as language and mind combined to form the culture in which we live, so, in the digital universe, are computer programs and worldwide networks combining to produce an evolutionary theater in which the distinctions between nature and technology are increasingly obscured. Nature, believes Dyson, is on the side of the machines.
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski - 2005
Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
The 8051 Microcontroller And Embedded Systems: Using Assembly And C
Muhammad Ali Mazidi - 2008
The first uses high-performance microprocessors while in the second category, issues of space, power and rapid development are more critical. Intended for those with no background as well as those with prior Assembly language experience, this book looks at Assembly language programming.
Prediction Machines: The Simple Economics of Artificial Intelligence
Ajay Agrawal - 2018
But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In the face of such uncertainty, many analysts either cower in fear or predict an impossibly sunny future.But in Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.When AI is framed as cheap prediction, its extraordinary potential becomes clear:
Prediction is at the heart of making decisions under uncertainty. Our businesses and personal lives are riddled with such decisions.
Prediction tools increase productivity--operating machines, handling documents, communicating with customers.
Uncertainty constrains strategy. Better prediction creates opportunities for new business structures and strategies to compete.
Penetrating, fun, and always insightful and practical, Prediction Machines follows its inescapable logic to explain how to navigate the changes on the horizon. The impact of AI will be profound, but the economic framework for understanding it is surprisingly simple.
Steal This Computer Book 4.0 – What They Won′t Tell You About the Internet 4e
Wallace Wang - 2006
It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances. Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected. He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work. Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hack