Book picks similar to
Bit by Bit: An Illustrated History of Computers by Stan Augarten
history
computers
computer-science
science
Golf's Holy War: The Battle for the Soul of a Game in an Age of Science
Brett Cyrgalis - 2020
The world of golf is at a crossroads. As technological innovations displace traditional philosophies, the golfing community has splintered into two deeply combative factions: the old-school teachers and players who believe in feel, artistry, and imagination, and the technical minded who want to remake the game around data. In Golf’s Holy War, Brett Cyrgalis takes readers inside the heated battle playing out from weekend hackers to PGA Tour pros. At the Titleist Performance Institute in Oceanside, California, golfers clad in full-body sensors target weaknesses in their biomechanics, while others take part in mental exercises designed to test their brain’s psychological resilience. Meanwhile, coaches like Michael Hebron purge golfers of all technical information, tapping into the power of intuitive physical learning by playing rudimentary games. From historic St. Andrews to manicured Augusta, experimental communes in California to corporatized conferences in Orlando, William James to Ben Hogan to theoretical physics, the factions of the spiritual and technical push to redefine the boundaries of the game. And yet what does it say that Tiger Woods has orchestrated one of the greatest comebacks in sports history without the aid of a formal coach? But Golf’s Holy War is more than just a book about golf—it’s a story about modern life and how we are torn between resisting and embracing the changes brought about by the advancements of science and technology. It’s also an exploration of historical legacies, the enriching bonds of education, and the many interpretations of reality.
Computer Networks: A Systems Approach
Larry L. Peterson - 1996
This expanded and completely updated edition covers the why of network design, focusing not just the specifications comprising today's systems but how key technologies and protocols actually work in the real world to solve specific problems. It is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the text, who have actually designed some of them as well, and who are still actively designing the computer networks today.The book makes less use of computer code to explain protocols than earlier editions. Moreover, this new edition shifts the focus somewhat higher in the protocol stack where there is generally more innovative and exciting work going on at the application and session layers than at the link and physical layers. Other new features are: increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features; the material is structured in such a way as to make it easier to teach top-down. Furthermore, the book outstrips the competitors in offering a more robust ancillary package for student and instructor support. The text is complemented with figures as well as links to networking resources on the Web and links to author-created materials on author-maintained Web site.Computer Networks, Fourth Edition, will be an invaluable resource for networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.
The Future Was Here: The Commodore Amiga
Jimmy Maher - 2012
The game machines became fascinating technical and artistic platforms that were of limited real-world utility. The IBM products were all utility, with little emphasis on aesthetics and no emphasis on fun. Into this bifurcated computing environment came the Commodore Amiga 1000. This personal computer featured a palette of 4,096 colors, unprecedented animation capabilities, four-channel stereo sound, the capacity to run multiple applications simultaneously, a graphical user interface, and powerful processing potential. It was, Jimmy Maher writes in The Future Was Here, the world’s first true multimedia personal computer.Maher argues that the Amiga’s capacity to store and display color photographs, manipulate video (giving amateurs access to professional tools), and use recordings of real-world sound were the seeds of the digital media future: digital cameras, Photoshop, MP3 players, and even YouTube, Flickr, and the blogosphere. He examines different facets of the platform--from Deluxe Paint to AmigaOS to Cinemaware--in each chapter, creating a portrait of the platform and the communities of practice that surrounded it. Of course, Maher acknowledges, the Amiga was not perfect: the DOS component of the operating systems was clunky and ill-matched, for example, and crashes often accompanied multitasking attempts. And Commodore went bankrupt in 1994. But for a few years, the Amiga’s technical qualities were harnessed by engineers, programmers, artists, and others to push back boundaries and transform the culture of computing.
Hackers & Painters: Big Ideas from the Computer Age
Paul Graham - 2004
Who are these people, what motivates them, and why should you care?Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls “an intellectual Wild West.”The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
Linux Command Line and Shell Scripting Bible
Richard Blum - 2008
Not only does this Bible give you a quick refresher on the structure of open-source Linux software, it also shows you how to bypass the hefty graphical user interface on Linux systems and start interacting the fast and efficient way?with command lines and automated scripts. You'll learn how to manage files on the filesystem, start and stop programs, use databases, even do Web programming?without a GUI?with this one-stop resource.
Algorithms
Robert Sedgewick - 1983
This book surveys the most important computer algorithms currently in use and provides a full treatment of data structures and algorithms for sorting, searching, graph processing, and string processing -- including fifty algorithms every programmer should know. In this edition, new Java implementations are written in an accessible modular programming style, where all of the code is exposed to the reader and ready to use.The algorithms in this book represent a body of knowledge developed over the last 50 years that has become indispensable, not just for professional programmers and computer science students but for any student with interests in science, mathematics, and engineering, not to mention students who use computation in the liberal arts.The companion web site, algs4.cs.princeton.edu contains An online synopsis Full Java implementations Test data Exercises and answers Dynamic visualizations Lecture slides Programming assignments with checklists Links to related material The MOOC related to this book is accessible via the "Online Course" link at algs4.cs.princeton.edu. The course offers more than 100 video lecture segments that are integrated with the text, extensive online assessments, and the large-scale discussion forums that have proven so valuable. Offered each fall and spring, this course regularly attracts tens of thousands of registrants.Robert Sedgewick and Kevin Wayne are developing a modern approach to disseminating knowledge that fully embraces technology, enabling people all around the world to discover new ways of learning and teaching. By integrating their textbook, online content, and MOOC, all at the state of the art, they have built a unique resource that greatly expands the breadth and depth of the educational experience.
Effective Python: 59 Specific Ways to Write Better Python
Brett Slatkin - 2015
This makes the book random-access: Items are easy to browse and study in whatever order the reader needs. I will be recommending "Effective Python" to students as an admirably compact source of mainstream advice on a very broad range of topics for the intermediate Python programmer. " Brandon Rhodes, software engineer at Dropbox and chair of PyCon 2016-2017" It s easy to start coding with Python, which is why the language is so popular. However, Python s unique strengths, charms, and expressiveness can be hard to grasp, and there are hidden pitfalls that can easily trip you up. " Effective Python " will help you master a truly Pythonic approach to programming, harnessing Python s full power to write exceptionally robust and well-performing code. Using the concise, scenario-driven style pioneered in Scott Meyers best-selling "Effective C++, " Brett Slatkin brings together 59 Python best practices, tips, and shortcuts, and explains them with realistic code examples. Drawing on years of experience building Python infrastructure at Google, Slatkin uncovers little-known quirks and idioms that powerfully impact code behavior and performance. You ll learn the best way to accomplish key tasks, so you can write code that s easier to understand, maintain, and improve. Key features includeActionable guidelines for all major areas of Python 3.x and 2.x development, with detailed explanations and examples Best practices for writing functions that clarify intention, promote reuse, and avoid bugs Coverage of how to accurately express behaviors with classes and objects Guidance on how to avoid pitfalls with metaclasses and dynamic attributes More efficient approaches to concurrency and parallelism Better techniques and idioms for using Python s built-in modules Tools and best practices for collaborative development Solutions for debugging, testing, and optimization in order to improve quality and performance "
Hard Drive: Bill Gates and the Making of the Microsoft Empire
James Wallace - 1992
Part entrepreneur, part enfant terrible, Gates has become the most powerful -- and feared -- player in the computer industry, and arguably the richest man in America. In Hard Drive, investigative reporters Wallace and Erickson follow Gates from his days as an unkempt thirteen-year-old computer hacker to his present-day status as a ruthless billionaire CEO. More than simply a "revenge of the nerds" story though, this is a balanced analysis of a business triumph, and a stunningly driven personality. The authors have spoken to everyone who knows anything about Bill Gates and Microsoft -- from childhood friends to employees and business rivals who reveal the heights, and limits, of his wizardry. From Gates's singular accomplishments to his equally extraordinary brattiness, arrogance, and hostility (the atmosphere is so intense at Microsoft that stressed-out programmers have been known to ease the tension of their eighty-hour workweeks by exploding homemade bombs), this is a uniquely revealing glimpse of the person who has emerged as the undisputed king of a notoriously brutal industry.
Bette Davis: A Life from Beginning to End (Biographies of Actors Book 9)
Hourly History - 2019
Free BONUS Inside! Bette Davis didn’t fit the usual Hollywood image of beauty, but by sheer force of will she became one of the most famous and prominent actresses of the twentieth century. Her entire life was focused on her six-decades-long career. This invariably led to the loss of three husbands and estrangement from her oldest daughter. Still, Bette Davis lived with few regrets. Her most famous movies, Jezebel, All About Eve, and What Ever Happened to Baby Jane? are still considered classics, discovered by a generation that wasn’t even born when the movies were made. Bette’s tombstone, which reads “She did it the hard way,” aptly sums up her life. Discover a plethora of topics such as
From Acting School to Hollywood Success
Bette’s First Husband and the Oscar Award
A New England Romance
The Horror Years
The Feud with Joan Crawford
My Mother’s Keeper
And much more!
So if you want a concise and informative book on Bette Davis, simply scroll up and click the "Buy now" button for instant access!
Mastering Emacs
Mickey Petersen - 2015
In the Mastering Emacs ebook you will learn the answers to all the concepts that take weeks, months or even years to truly learn, all in one place.“Emacs is such a hard editor to learn”But why is it so hard to learn? As it turns out, it's almost always the same handful of issues that everyone faces.If you have tried to learn Emacs you will have struggled with the same problems everyone faces, and few tutorials to see you through it.I have dedicated the first half of the book to explaining the essence of Emacs — and in doing so, how to overcome these issues:Memorizing Emacs’s keys: You will learn Emacs one key at a time, starting with the arrow keys. To feel productive in Emacs, it’s important you start on an equal footing — without too many new concepts and keys to memorize. Each chapter will introduce more keys and concepts so you can learn at your own pace. Discovering new modes and features: Emacs is a self-documenting editor, and I will teach you how to use the apropos, info, and describe system to discover new modes and features, or help you find things you forgot! Customizing Emacs: You don’t have to learn Emacs Lisp to alter a lot of Emacs’s functionality. Most changes you want to make are possible using Emacs’s Customize interface and I will show you how to use it efficiently. Understanding the terminology: Emacs is so old it predates almost every other editor and all modern user interfaces. I have an entire chapter dedicated to the unique terminology in Emacs; how it is different from other editors, and what that means to you.
Beautiful Code: Leading Programmers Explain How They Think
Andy OramLincoln Stein - 2007
You will be able to look over the shoulder of major coding and design experts to see problems through their eyes.This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. Beautiful Code is an opportunity for master coders to tell their story. All author royalties will be donated to Amnesty International.
The Inmates Are Running the Asylum: Why High Tech Products Drive Us Crazy and How to Restore the Sanity
Alan Cooper - 1999
Cooper details many of these meta functions to explain his central thesis: programmers need to seriously re-evaluate the many user-hostile concepts deeply embedded within the software development process. Rather than provide users with a straightforward set of options, programmers often pile on the bells and whistles and ignore or de-prioritise lingering bugs. For the average user, increased functionality is a great burden, adding to the recurrent chorus that plays: "computers are hard, mysterious, unwieldy things." (An average user, Cooper asserts, who doesn't think that way or who has memorised all the esoteric commands and now lords it over others, has simply been desensitised by too many years of badly designed software.) Cooper's writing style is often overblown, with a pantheon of cutesy terminology (i.e. "dancing bearware") and insider back-patting. (When presenting software to Bill Gates, he reports that Gates replied: "How did you do that?" to which he writes: "I love stumping Bill!") More seriously, he is also unable to see beyond software development's importance--a sin he accuses programmers of throughout the book. Even with that in mind, the central questions Cooper asks are too important to ignore: Are we making users happier? Are we improving the process by which they get work done? Are we making their work hours more effective? Cooper looks to programmers, business managers and what he calls "interaction designers" to question current assumptions and mindsets. Plainly, he asserts that the goal of computer usage should be "not to make anyone feel stupid." Our distance from that goal reinforces the need to rethink entrenched priorities in software planning. -- Jennifer Buckendorff, Amazon.com
The Best of 2600: A Hacker Odyssey
Emmanuel Goldstein - 2008
Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.
Pro Git
Scott Chacon - 2009
It took the open source world by storm since its inception in 2005, and is used by small development shops and giants like Google, Red Hat, and IBM, and of course many open source projects.A book by Git experts to turn you into a Git expert. Introduces the world of distributed version control Shows how to build a Git development workflow.
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.