Book picks similar to
Planning for Web Services: Obstacles and Opportunities: An O'Reilly Research Report by Clay Shirky
it-wikipedia
not-on-audible-or-library
technology
Grumby
Andy Kessler - 2010
In this comic novel a band of hacker-geeks load state-of-the-art artificial intelligence, including working eyes, ears, spy software, and a smart mouth, into a bunch of old Furby dolls, re-christened Grumbies, network them together, sell millions, become rich and famous and make enemies/allies of Mossad, the CIA, Google, Microsoft, IRS, Goldman Sachs, the guys from Google, and Steve Jobs.
Over The Top: How The Internet Is (Slowly But Surely) Changing The Television Industry
Alan Wolk - 2015
Given the intricacies of the industry, it's also going to be the most resistant to change. Alan Wolk, an industry veteran and longtime analyst and observer, lays out how the television industry is adapting to the digital era, explaining what's really happening in a tone that will appeal to laypeople and insiders alike. In the first section, Wolk takes us through how the industry works today, focusing on how the various players actually make money and who pays who for what. The next section deals with the changes that are taking place in the industry today–everything from time shifting to binge viewing to cord cutting–and how those changes are starting to create some seismic shifts. In the final section, Wolk reveals his predictions for the future and what the industry will look like in ten years time. Andrew Wallenstein, co-editor-in-chief of Variety says "Alan Wolk is one of the most insightful observers writing about the media business today. There's no better expert to help you navigate the confusing, complicated nexus of TV and the Internet." David Zaslav, President and CEO of Discovery Communications says "Alan Wolk has a deep understanding of the complex nature of television today… this is a fantastic primer of the business and one of the most educated perspectives on the future of our rapidly evolving industry."
The Cult of Mac
Leander Kahney - 2004
Apple's machines have legions of loyal, sometimes demented fans. The Cult of Mac surveys the devoted following that has grown up around Macintosh computers. Like fans of a football team or a rock group, Macintosh fanatics have their own subculture, with clearly defined obsessions, rites, and passages. Famously dedicated to their computers, many Mac fans eat, sleep, and breathe the Macintosh. Fans who get Mac tattoos and haircuts, people who attend Apple Store openings like they are Grateful Dead shows, counterculture icons who love the Mac, people who turn old Macs into aquariums (or bongs), Ellen Fein lookalike contests, erotic fiction featuring Steve Jobs; it's all here. Technology reporter Leander Kahney exposes all sides of Mac fanaticism, from the innocuous to the insane.
Dragonlance Dragons of Winter (Dragonlance)
Clark Valentine - 2007
introduced some revolutionary concepts in the game industry. Never before had the D&D rules been used to tell an epic fantasy tale using full-realized pre-generated characters. It was also the first time that roleplaying adventures would match a story being told in fantasy novels on mass-market shelves. Since MWP began publishing DRAGONLANCE game produts for the revised d20 System, the most often-asked question from fans is "When do we get to see the original modules?" By popular demand, we are presenting all-new versions of the classic adventures. The second in the trilogy, Dragons of Winter, continues the epic War of the Lance. The heroes visit the haunted forests of Silvanesti, the landlocked port city of Tarsis, and the mighty stronghold known as the High Clerist's Tower. The adventures are being completely revised, drawing on twenty years of DRAGONLANCE history, incorporating material most recently featured in the Silver Anniversary edition of the adventures. They will include new character statistics featuring the popular Heroes of the Lance.
Replay: The History of Video Games
Tristan Donovan - 2010
Based on extensive research and over 140 exclusive interviews with key movers and shakers from gaming's past, Replay tells the sensational story of how the creative vision of game designers gave rise to one of the world's most popular and dynamic art forms.
Aloha, Magnum: Larry Manetti's Magnum, P.I. Memories
Larry Manetti - 1999
Aloha Magnum is a chronicle of Larry Manetti's wild childhood, his crazy days in Hollywood, his moonlighting as a prominent restaurateur, and his escapades with the rich, famous, and equally outrageous.
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier - 2000
Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.
Radiohead: Hysterical and Useless
Martin Clarke - 1999
Starting with the band's origins in Oxford, journalist Martin Clarke covers the essential points: Radiohead's breakout single "Creep," the pivotal album OK Computer, Thom Yorke's continuing political and artistic evolution, and the band's future. This revised edition includes a close look at how the band escaped the rock straightjacket with Kid A and Amnesiac , as well as their most recent album, Hail to the Thief . Clark also offers an in-depth examination of the outspoken, mysterious Yorke, offering insight into the personal demons the vocalist has battled throughout his career as Radiohead's frontman. An incisive look at one of the world's most beloved, followed musical acts, Radiohead: Hysterical and Useless provides stimulating coverage of a provocative group.
Essays in Science
Albert Einstein - 1934
That unfortunate situation began to change when Einstein published several of the papers and speeches contained in this book which explain the central core of the theory in clear and often beautiful language accessible to any interested reader.In addition to lucid explications of both the Special and General theories, Einstein holds forth on the principles of research, the nature of scientific truth, and the method of theoretical physics. He also offers acute analyses and appreciation of the work of such giants as Johannes Kepler, Isaac Newton, Clerk Maxwell, and Niels Bohr.
1001 Video Games You Must Play Before You Die
Tony MottMitch Krpata - 2010
The video game has arrived as entertainment and as an art form. This is the first serious critical evaluation ever published of the best video games and is a testament to the medium’s innovativeness and increasing emphasis on aesthetics. Organized chronologically and for all platforms (PC, Xbox, PlayStation, etc.) and covering all genres from the bold (Grand Theft Auto and Halo) and dark (Resident Evil and Silent Hill) to the spiritual (Final Fantasy) and whimsical (Legend of Zelda), the book traces the video game from the rough early days of Pong to the latest visual fantasia.
Michael Schumacher
James Allen - 2007
Gifted with a rare blend of superior ability and nerve that defines a champion, his performances have captured the imagination of fans all over the world. For 15 seasons, he has left rivals trailing in his wake, winning an unprecedented seven world drivers championships.But he is a controversial figure, feared for his ruthless tactics, despised for using extreme methods in pursuit of his goals. THE EDGE OF GREATNESS examines Schumachers entire career: from his first Grand Prix with Jordan to his Benetton world championships and his attempt to win back Ferraris crown. It tells the story behind Schumachers record five consecutive world titles, uncovers the secrets of how he has stayed at the top for so long and examines the impact of his domination on the sport. Now, on his retirement from the sport, it is time to reappraise the man behind the tabloid stereotype. Frank, honest, adroit and in-depth - James Allen reveals the anatomy of a champion.
Documents on the Rape of Nanking
Timothy Brook - 1999
What ended in one atrocity began with another: the savage military takeover of China's capital city, which quickly became known as the Rape of Nanking. The Japanese Army's conduct from December 1937 to February 1938 constitutes one of the most barbarous events not just of the war but of the century. The violence was documented at the time and then redocumented during the war crimes trial in Tokyo after the war. This book brings together materials from both moments to provide the first comprehensive dossier of primary sources on the Rape.Part 1, "The Records," includes two sources written as the Rape was underway. The first is a long set of documents produced by the International Committee for the Nanking Safety Zone, a group of foreigners who strove to protect the Chinese residents. The second is a series of letters that American surgeon Dr. Robert Wilson wrote for his family during the same period. These letters are published here for the first time.The evidence compiled by the International Committee and its members would be decisive for the indictments against Japanese leaders at the International Military Tribunal for the Far East in Tokyo. Part 2, "The Judgments," reprints portions of the tribunal's 1948 judgment dealing with the Rape of Nanking, its judicial consequences, and sections of the dissenting judgment of Justice Radhabinod Pal.These contemporary records and judgments create an intimate firsthand account of the Rape of Nanking. Together they are intended to stimulate deeper reflection than previously possible on how and why we assess and assign the burden of war guilt.Timothy Brook is Professor of Chinese History and Associate Director of the Joint Centre for Asia Pacific Studies, University of Toronto, and is coeditor of Nation Work: Asian Elites and National Identities and Cultureand Economy: The Shaping of Capitalism in Eastern Asia, both published by the University of Michigan Press.
Black Knight: Ritchie Blackmore
Jerry Bloom - 2006
Dubbed the 'man in black', guitarist Ritchie Blackmore found fame with Seventies rock giants Deep Purple, then walked away from them to create Rainbow, only to abandon them and form another band in 1997 - Blackmore's Night.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
Smart Mobs: The Next Social Revolution
Howard Rheingold - 2002
The coming wave, says Rheingold, is the result of super-efficient mobile communications-cellular phones, personal digital assistants, and wireless-paging and Internet-access devices that will allow us to connect with anyone, anywhere, anytime. From the amusing ("Lovegetty" devices in Japan that light up when a person with the right date-potential characteristics appears in the vicinity) to the extraordinary (the overthrow of a repressive regime in the Philippines by political activists who mobilized by forwarding text messages via cell phones), Rheingold gives examples of the fundamentally new ways in which people are already engaging in group or collective action. He also considers the dark side of this phenomenon, such as the coordination of terrorist cells, threats to privacy, and the ability to incite violent behavior. Applying insights from sociology, artificial intelligence, engineering, and anthropology, Rheingold offers a penetrating perspective on the brave new convergence of pop culture, cutting-edge technology, and social activism. At the same time, he reminds us that, as with other technological revolutions, the real impact of mobile communications will come not from the technology itself but from how people use it, resist it, adapt to it, and ultimately use it to transform themselves, their communities, and their institutions.