Book picks similar to
Bit by Bit: An Illustrated History of Computers by Stan Augarten
history
science
computer-science
computer
Computer Networking: A Top-Down Approach
James F. Kurose - 2000
Building on the successful top-down approach of previous editions, this fourth edition continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts.
Remember The Alamo?: American History In Bite Sized Chunks
Alison Rattle - 2009
. . from Plymouth Rock to Pearl Harbor-the history of America in bite-size chunks How did the conquistadors first stumble across America-and what were the Spanish looking for anyway? What was the Dred Scott Supreme Court case and how did it affect the Civil War? And while some of us may indeed remember the Alamo, why were we once urged to "Remember the Maine"? Here, in chronological order, is a rollicking tour of American history from Columbus's arrival through Nixon's resignation, including details about the early colonists, Manifest Destiny, the Civil War-from Southern secession to the surrender at Appomattox-and the nation's plunge into World War I and the end of U.S. isolationism. It's the perfect refresher for all the things we learned in school but may have forgotten since. In concise, highly readable chapters, Remember the Alamo!""tells the most exciting story in the world: the story of America-home of Ben Franklin and Al Capone, Abe Lincoln and Rosa Parks, a nation with a passion and a gift for making history to this day.
SQL Antipatterns
Bill Karwin - 2010
Now he's sharing his collection of antipatterns--the most common errors he's identified in those thousands of requests for help. Most developers aren't SQL experts, and most of the SQL that gets used is inefficient, hard to maintain, and sometimes just plain wrong. This book shows you all the common mistakes, and then leads you through the best fixes. What's more, it shows you what's behind these fixes, so you'll learn a lot about relational databases along the way. Each chapter in this book helps you identify, explain, and correct a unique and dangerous antipattern. The four parts of the book group the antipatterns in terms of logical database design, physical database design, queries, and application development. The chances are good that your application's database layer already contains problems such as Index Shotgun, Keyless Entry, Fear of the Unknown, and Spaghetti Query. This book will help you and your team find them. Even better, it will also show you how to fix them, and how to avoid these and other problems in the future. SQL Antipatterns gives you a rare glimpse into an SQL expert's playbook. Now you can stamp out these common database errors once and for all. Whatever platform or programming language you use, whether you're a junior programmer or a Ph.D., SQL Antipatterns will show you how to design and build databases, how to write better database queries, and how to integrate SQL programming with your application like an expert. You'll also learn the best and most current technology for full-text search, how to design code that is resistant to SQL injection attacks, and other techniques for success.
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language
sed & awk
Dale Dougherty - 1990
The most common operation done with sed is substitution, replacing one block of text with another.
awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts.
This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case.
In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).
Machine Learning for Hackers
Drew Conway - 2012
Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you'll learn how to analyze sample datasets and write simple machine learning algorithms. "Machine Learning for Hackers" is ideal for programmers from any background, including business, government, and academic research.Develop a naive Bayesian classifier to determine if an email is spam, based only on its textUse linear regression to predict the number of page views for the top 1,000 websitesLearn optimization techniques by attempting to break a simple letter cipherCompare and contrast U.S. Senators statistically, based on their voting recordsBuild a "whom to follow" recommendation system from Twitter data
The Well-Grounded Java Developer: Vital techniques of Java 7 and polyglot programming
Benjamin J. Evans - 2012
New JVM-based languages like Groovy, Scala, and Clojure are redefining what it means to be a Java developer. The core Standard and Enterprise APIs now co-exist with a large and growing body of open source technologies. Multicore processors, concurrency, and massive data stores require new patterns and approaches to development. And with Java 7 due to release in 2011, there's still more to absorb.The Well-Grounded Java Developer is a unique guide written for developers with a solid grasp of Java fundamentals. It provides a fresh, practical look at new Java 7 features along with the array of ancillary technologies that a working developer will use in building the next generation of business software.
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
Gene Kim - 2013
It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited. In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.
The Little Schemer
Daniel P. Friedman - 1974
The authors' enthusiasm for their subject is compelling as they present abstract concepts in a humorous and easy-to-grasp fashion. Together, these books will open new doors of thought to anyone who wants to find out what computing is really about. The Little Schemer introduces computing as an extension of arithmetic and algebra; things that everyone studies in grade school and high school. It introduces programs as recursive functions and briefly discusses the limits of what computers can do. The authors use the programming language Scheme, and interesting foods to illustrate these abstract ideas. The Seasoned Schemer informs the reader about additional dimensions of computing: functions as values, change of state, and exceptional cases. The Little LISPer has been a popular introduction to LISP for many years. It had appeared in French and Japanese. The Little Schemer and The Seasoned Schemer are worthy successors and will prove equally popular as textbooks for Scheme courses as well as companion texts for any complete introductory course in Computer Science.
Becoming A Son
David Labrava - 2015
David writes from life experience as he has lived more lives than most people ever will, and he did it all over the globe. David is an accomplished Glass artist, Tattoo artist, Five Diploma Harley Davidson Motorcycle Mechanic, Producer, Director and an award winning Writer and Actor. David is a member of the most famous and notorious motorcycle club in the world. David was the Technical Advisor on the hit TV series Sons of Anarchy from the inception to the completion of the series. David was also a series regular on the show, reaching that position after being hired as the technical advisor, then becoming a day player actor, then a recurring character then moving to series regular. All of these things had to be earned, as they were not for sale at any price. Becoming A Son is not about them. It’s about David getting to those spots. It’s about overcoming great odds and coming out alive. David left home at fifteen years old and hit the streets. This is David’s journey of discovery and redemption spanning a course of forty years. From the beaches of Hawaii and California, to the forest of the great Northwest, to years in Amsterdam, San Francisco, New York City, Miami then back to California. David hit some highs and survived severe lows, living years on the streets, in and out of jail only to take his life back, and then squeeze every bit out of it that life has to offer. Becoming A Son is a journey of epic proportion. It’s about realizing your dreams and then against the odds achieving them. Adventuring across the globe David learned many lessons by reaching out and trying everything, making many mistakes and paying the price for it and living through it. Now he wrote about it. David has been writing and getting published for over 14 years. He wrote for the Motorcycle magazine ‘The Horse’ then had his own column in the National Hot Rod Magazine ‘Ol Skool Rodz’ for eight years. He co-wrote Episode ten in season four of SOA which Time magazine awarded an honorable mention to as best of the season. David also won the 2013 Readers Choice Buzz focus award for Best Wildcard Actor. Like great authors before him Labrava takes the reader into some dark places most people would never dare to go. Becoming A Son is a modern day story of living on the street and redemption, it is one man’s journey into the darkness of himself crossing the planet and transcending all levels and then coming back again full circle. It is an inspiration for anyone who is chasing their dreams and making them their reality. Becoming A Son will come to be known as an instant classic.
Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money
Nathaniel Popper - 2015
Believers from Beijing to Buenos Aires see the potential for a financial system free from banks and governments. More than just a tech industry fad, Bitcoin has threatened to decentralize some of society’s most basic institutions.An unusual tale of group invention, Digital Gold charts the rise of the Bitcoin technology through the eyes of the movement’s colorful central characters, including an Argentinian millionaire, a Chinese entrepreneur, Tyler and Cameron Winklevoss, and Bitcoin’s elusive creator, Satoshi Nakamoto. Already, Bitcoin has led to untold riches for some, and prison terms for others.
Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom)
Adam Fisher - 2018
It will take us all back to our roots in the counterculture, and will remind us of the true nature of the innovation process, before we tried to tame it with slogans and buzzwords." -- Po Bronson, #1 New York Times bestselling author of The Nudist on the Late Shift and NurtureshockA candid, colorful, and comprehensive oral history that reveals the secrets of Silicon Valley -- from the origins of Apple and Atari to the present day clashes of Google and Facebook, and all the start-ups and disruptions that happened along the way.Rarely has one economy asserted itself as swiftly--and as aggressively--as the entity we now know as Silicon Valley. Built with a seemingly permanent culture of reinvention, Silicon Valley does not fight change; it embraces it, and now powers the American economy and global innovation. So how did this omnipotent and ever-morphing place come to be? It was not by planning. It was, like many an empire before it, part luck, part timing, and part ambition. And part pure, unbridled genius...Drawing on over two hundred in-depth interviews, VALLEY OF GENIUS takes readers from the dawn of the personal computer and the internet, through the heyday of the web, up to the very moment when our current technological reality was invented. It interweaves accounts of invention and betrayal, overnight success and underground exploits, to tell the story of Silicon Valley like it has never been told before. Read it to discover the stories that Valley insiders tell each other: the tall tales that are all, improbably, true.
Digital Design
M. Morris Mano - 1984
The book teaches the basic tools for the design of digital circuits in a clear, easily accessible manner. New to This Edition: *Nine sections on Verilog Hardware Description Language (HDL) inserted in discrete sections, allowing the material to be covered or skipped as desired. The Verilog HDL presentation is at a suitable level for beginning students who are learning digital circuits for the first time. *Reorganized material on combinational circuits is now covered in a single chapter. *The emphasis in the sequential circuits chapters is now on design with D flip-flops instead of JK and SR flip-flops. *The material on memory and programmable logic is now consolidated in one chapter. *Chapter 8 consists mostly of new material and now covers digital design in the Register Transfer Level (P) FL), preparing the reader for more advanced design projects and further Verilog HDL studies. *A new section in Chapter 11 supplements the laboratory experiments with HDL experiments. These unable the reader to check the circuits designed in the laboratory by means of hardware components and/or by HDL simulation.* Text accompanied by Verilog simulator software-SynaptiCAD's VeriLogger Pro evaluation version, a Verilog simulation environment that combines all of the features of a traditional Verilog simulator with a powerful graphical test vector generator. Fast model testing in VeriLogger Pro allows the reader to perform bottom-up testing of every model in a design. All of the HDL examples in the book can be found on the CD-ROM. *A Companion Website includes resources for instructors and students such as transparency masters of all figures in the book, all HDL code examples from the book, a Verilog tutorial, tutorials on using the VeriLogger Pro software, and more. It can be found at http://www.prenhall.com/mano
Information: A Very Short Introduction
Luciano Floridi - 2010
In this Very Short Introduction, one of the world's leading authorities on the philosophy of information and on information ethics, Luciano Floridi, offers an illuminating exploration of information as it relates to both philosophy and science. He discusses the roots of the concept of information in mathematics and science, and considers the role of information in several fields, including biology. Floridi also discusses concepts such as "Infoglut" (too much information to process) and the emergence of an information society, and he addresses the nature of information as a communication process and its place as a physical phenomenon. Perhaps more important, he explores information's meaning and value, and ends by considering the broader social and ethical issues relating to information, including problems surrounding accessibility, privacy, ownership, copyright, and open source. This book helps us understand the true meaning of the concept and how it can be used to understand our world.About the Series: Combining authority with wit, accessibility, and style, Very Short Introductions offer an introduction to some of life's most interesting topics. Written by experts for the newcomer, they demonstrate the finest contemporary thinking about the central problems and issues in hundreds of key topics, from philosophy to Freud, quantum theory to Islam.
Cryptanalysis: A Study of Ciphers and Their Solution
Helen Fouche Gaines - 1939
Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions.