Book picks similar to
The Secret History of Mac Gaming by Richard Moss
technology
non-fiction
computer-history
history
The Book: A Cover-to-Cover Exploration of the Most Powerful Object of Our Time
Keith Houston - 2016
And everybody who has read it will agree that reports of the book’s death have been greatly exaggerated.”―Erik Spiekermann, typographerWe may love books, but do we know what lies behind them? In The Book, Keith Houston reveals that the paper, ink, thread, glue, and board from which a book is made tell as rich a story as the words on its pages―of civilizations, empires, human ingenuity, and madness. In an invitingly tactile history of this 2,000-year-old medium, Houston follows the development of writing, printing, the art of illustrations, and binding to show how we have moved from cuneiform tablets and papyrus scrolls to the hardcovers and paperbacks of today. Sure to delight book lovers of all stripes with its lush, full-color illustrations, The Book gives us the momentous and surprising history behind humanity’s most important―and universal―information technology.71 color illustrations
Red Dead Redemption 2: The Complete Official Guide Collector's Edition
Piggyback - 2018
Red Dead Redemption 2 Complete Official Guide Collector's EditionYour essential companion to the furthest corners of the deepest and most detailed Rockstar world yet, the Red Dead Redemption 2 Complete Official Guide Collector's Edition is packed with information about every aspect of Rockstar Games’ epic tale of outlaw life in America's unforgiving heartland.Published by Piggyback and available for pre-order now!The premium hardcover Collector’s Edition is printed on superior quality art paper, and also includes an exclusive character art gallery. Packed with essential information about every mission, character and feature of this vast and detailed world, the Collector's Edition includes an at-a-glance walkthrough, dedicated maps chapter, comprehensive reference sections, and an all-encompassing index.
The Inheritance: Poisoned Fruit of JFK's Assassination
Christopher Fulton - 2018
Kennedy. Through Lincoln, crucial evidence ended up in Christopher's hands—evidence that was going to be used to facilitate a new future for America. But the U.S. government's position was clear: that evidence had to be confiscated and classified, and the truth hidden away from the public. Christopher was sent to federal prison for years under a sealed warrant and indictment. The Inheritance, Christopher's personal narrative, shares insider information from his encounters with the Russian Government, President Ronald Reagan, Donald Trump, the Clinton White House, the U.S. Justice Department, the Secret Service, and the Kennedy family themselves. It reveals the true intentions of Evelyn Lincoln and her secret promise to Robert Kennedy—and Christopher's secret promise to John F. Kennedy Jr. The Inheritance explodes with history-changing information and answers the questions Americans are still asking, while pulling them through a gauntlet of some of the worst prisons this country has to offer. This book thrillingly exposes the reality of American power, and sheds light on the dark corners of current corruption within the executive branch and the justice and prison systems.
More Awesome Than Money: Four Boys and Their Heroic Quest to Save Your Privacy from Facebook
Jim Dwyer - 2014
Four NYU undergrads wanted to build a social network that would allow users to control their personal data, instead of surrendering it to big businesses like Facebook. They called it Diaspora. In days, they raised $200,000, and reporters, venture capitalists, and the digital community’s most legendary figureswere soon monitoring their progress. Max dreamed of being a CEO. Ilya was the idealist. Dan coded like a pro, and Rafi tried to keep them all on track. But as the months passed and the money ran out, the Diaspora Four fell victim to errors, bad decisions, and their own hubris. In November 2011, Ilya committed suicide.Diaspora has been tech news since day one, but the story reaches far beyond Silicon Valley to the now urgent issues about the future of the Internet. With the cooperation of the surviving partners, New York Times bestselling author Jim Dwyer tells a riveting story of four ambitious and naÏve young men who tried to rebottle the genie of personal privacy—and paid the ultimate price.
Critical Path: How to Review Videogames for a Living
Dan Amrich - 2012
This includes how to write compelling reviews, how to pitch yourself as a writer, how to tackle some tricky ethical quandaries, and yes, even how to get free games. Based on Dan Amrich’s own experience as a game journalist for more than 15 years, it’s advice that can serve you for your entire career, from press start to game over.
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins - 2012
Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security havent picked up on the change, impeding their companies agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.
Worm: The First Digital World War
Mark Bowden - 2011
Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.
The Kobold Guide to Board Game Design
Mike Selinker - 2011
Author Mike Selinker (Betrayal at House on the Hill) has invited some of the world's most talented and experienced game designers to share their secrets on game conception, design, development, and presentation. In these pages, you'll learn about storyboarding, balancing, prototyping, and playtesting from the best in the business.
UNIX: A History and a Memoir
Brian W. Kernighan - 2019
Brian Kernighan was a member of the original group of Unix developers, the creator of several fundamental Unix programs, and the co-author of classic books like "The C Programming Language" and "The Unix Programming Environment."
Pinball Wizards: Jackpots, Drains, and the Cult of the Silver Ball
Adam Ruben - 2017
The strangest thing about pinball is that it persists, and not just as nostalgia. Pinball didn’t just stick around—it grew and continues to evolve with the times. Somehow, in today’s iPhone world, a three-hundred-pound monstrosity of wood and cables has survived to enjoy yet another renaissance. Pinball is more to humor writer Adam Ruben than a fascinating book topic—it’s a lifelong obsession. Ruben played competitive pinball for years, rising as high as the 80th-ranked player in the world. Then he had children. Now, mired in 9,938th place—darn kids—Ruben tries to stage a comeback, visiting pinball museums, gaming conventions, pinball machine designers, and even pinball factories in his attempt to discover what makes the world’s best players, the real wizards, so good. Along the way, Ruben examines the bigger story of pinball's invention, ascent, near defeat, resurgence, near defeat again, and struggle to find its niche in modern society.
The Game Makers: The Story of Parker Brothers, from Tiddledy Winks to Trivial Pursuit
Philip E. Orbanes - 2003
Parker started with only fifty dollars and a dream. In The Game Makers, Philip E. Orbanes, a game historian and former Parker Brothers executive, explores the often whimsical origins of popular games and toys - from the Monopoly Game to the Nerf ball to Ping-Pong to Sorry! - and reveals how generations of determined entrepreneurs built a family business empire." Through an engaging narrative based on extensive research - including the never-before-published personal archives of George S. Parker and interviews with his successors - Orbanes takes us on a journey through the birth and maturation of the toy industry as seen through the eyes of one of its greatest legends. Sprung from Parker's fervent belief that games were meant to last and be fun, this tiny family firm would grow into a brand powerhouse that reflected - and ultimately helped shape - the culture of a nation. Through world wars and the Great Depression, through natural disasters and family tragedies, Parker Brothers succeeded in bringing smiles to the faces of millions by connecting them to - or helping them forget - the events taking place around them.
The Media Lab: Inventing the Future at M.I.T.
Stewart Brand - 1987
Brand explores the exciting programs, and gives readers a look at the future of communications.
Mac OS X Snow Leopard: The Missing Manual
David Pogue - 2009
Fortunately, David Pogue is back, with the humor and expertise that have made this the #1 bestselling Mac book for eight years straight. You get all the answers with jargon-free introductions to:Big-ticket changes. A 64-bit overhaul. Faster everything. A rewritten Finder. Microsoft Exchange compatibility. All-new QuickTime Player. If Apple wrote it, this book covers it.Snow Leopard Spots. This book demystifies the hundreds of smaller enhancements, too, in all 50 programs that come with the Mac: Safari, Mail, iChat, Preview, Time Machine.Shortcuts. This must be the tippiest, trickiest Mac book ever written. Undocumented surprises await on every page.Power usage. Security, networking, build-your-own Services, file sharing with Windows, even Mac OS X's Unix chassis-this one witty, expert guide makes it all crystal clear.
Droidmaker: George Lucas and the Digital Revolution
Michael Rubin - 2005
In the process they made computer history.
True Crime: 4 True American Crime Stories - Vol 1 (From police files of the 1920s to the 1950s)
Guy Hadleigh - 2013
Almost (but not quite), lost in the mists of time, these tales romp along with plenty of action and recreate the atmosphere of this exciting and dangerous era using the vernacular of the times.You may not have heard much about some of these bad guys, but they were real, ruthless hoodlums and all had their "15 minutes of fame", leaving trails of death and mayhem behind them. Most did not live to an old age, and those that did were probably in jail.Their escapades were daring and reckless and many paid the ultimate price in the end.Volume 1 contains* The Jekyll and Hyde Mob After a rash of robberies, lawmen of the Los Angeles Sheriff's office had killed off or jailed every gang of bank robbers in the county. However, three suave gentlemen continued to loot the banks in daring fashion, leaving the lawmen completely clueless.* The Whispering Bride Death cast its long, silent shadow over a sleepy New England town as Mrs.Wegner, a widow, waved good-bye to the last of the summer boarders. Little did she realize that she was waving good-bye forever, that death would soon claim her as its victim in the strange case of THE WHISPERING BRIDE.* The Red Bandit The desperation of a hunted man gave Oklahoma its greatest reign of terror when a youth, vowing never to serve a 75 year rap for robbery, set off a series of events that gave the authorities a veritable nightmare as they pursued their quest down the bloody trail of crime.* The Master Forgers Counterfeit checks - hundreds of them - were flooding Milwaukee in 1937 and 1938 until science scored a victory for the law!Order your copy today..!Scroll back up for instant download