Logic: A Complete Introduction: Teach Yourself


Siu-Fan Lee - 2017
    As well as looking at logic in theoretical terms the book considers its everyday uses and demonstrates how it has genuine practical applications. It will take you step by step through the most difficult concepts and is packed with exercises to help you consolidate your learning at every stage. Covering everything from syllogistic logic to logical paradoxes and even looking at logic in Alice in Wonderland, this is the only guide you will ever need.

Lifehacker: 88 Tech Tricks to Turbocharge Your Day


Gina Trapani - 2006
    The 88 "life hacks" -- clever shortcuts and lesser-known, faster ways to complete a task -- in this book are some of the best in Lifehacker.com's online archive. Every chapter describes an overarching lifehacker principle, then segues into several concrete applications. Each hack includes a step-by-step how-to for setting up and using the solution with cross-platform software, detailed screen shots, and sidebars with additional tips. Order your copy today and increase your productivity!

The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age


Adam Segal - 2016
    Nation-states wielded military force, financial pressure, and diplomatic persuasion to create “world order.” Even after the end of the Cold War, the elements comprising world order remained essentially unchanged.But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation “Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.

Breakpoint


Richard A. Clarke - 2007
    When a sophisticated group of saboteurs launches a series of attacks designed to bring down the world's technological networks, a dedicated team of experts assembles to find out if the responsible individuals are right-wing militias, Jihadist terrorists, or representatives from enemy nation-states.

Building Machine Learning Systems with Python


Willi Richert - 2013
    

Where Wizards Stay Up Late: The Origins of the Internet


Katie Hafner - 1996
    Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960's, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.

Functional and Reactive Domain Modeling


Debasish Ghosh - 2016
    Domain modeling is a technique for creating a conceptual map of a problem space such as a business system or a scientific application, so that the developer can write the software more efficiently. The domain model doesn't present a solution to the problem, but instead describes the attributes, roles, and relationships of the entities involved, along with the constraints of the system.Reactive application design, which uses functional programming principles along with asynchronous non-blocking communication, promises to be a potent pattern for developing performant systems that are relatively easy to manage, maintain and evolve. Typically we call such models "reactive" because they are more responsive both to user requests and to system loads. But designing and implementing such models requires a different way of thinking. Because the core behaviors are implemented using pure functions, you can reason about the domain model just like mathematics, so your model becomes verifiable and robust.Functional and Reactive Domain Modeling teaches you how to think of the domain model in terms of pure functions and how to compose them to build larger abstractions. You will start with the basics of functional programming and gradually progress to the advanced concepts and patterns that you need to know to implement complex domain models. The book demonstrates how advanced FP patterns like algebraic data types, typeclass based design, and isolation of side-effects can make your model compose for readability and verifiability.On the subject of reactive modeling, the book focuses on higher order concurrency patterns like actors and futures. It uses the Akka framework as the reference implementation and demonstrates how advanced architectural patterns like event sourcing and CQRS can be put to great use in implementing scalable models. You will learn techniques that are radically different from the standard RDBMS based applications that are based on mutation of records. You'll also pick up important patterns like using asynchronous messaging for interaction based on non blocking concurrency and model persistence, which delivers the speed of in-memory processing along with suitable guarantees of reliability.

(ISC)² CISSP Certified Information Systems Security Professional Official Study Guide


Mike Chapple - 2018
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

The Epic Struggle of the Internet of Things


Bruce Sterling - 2014
    But is it what you think it is?Because the Internet of Things is not about things on the internet. A world in which all our household gadgets can communicate with each other may sound vaguely useful, but it’s not really for us consumers. The Internet of Things serves the interests of the technology giants, in their epic wrangles with each other. And it is they who will turn the jargon of “smart cities” and “smart homes” into a self-fulfilling prophesy. In this piercing and provocative essay, Bruce Sterling tells the story of an idea that just won’t go away because there’s too much money to be made and a whole world to control.

Python Crash Course: A Hands-On, Project-Based Introduction to Programming


Eric Matthes - 2015
    You'll also learn how to make your programs interactive and how to test your code safely before adding it to a project. In the second half of the book, you'll put your new knowledge into practice with three substantial projects: a Space Invaders-inspired arcade game, data visualizations with Python's super-handy libraries, and a simple web app you can deploy online.As you work through Python Crash Course, you'll learn how to: Use powerful Python libraries and tools, including matplotlib, NumPy, and PygalMake 2D games that respond to keypresses and mouse clicks, and that grow more difficult as the game progressesWork with data to generate interactive visualizationsCreate and customize simple web apps and deploy them safely onlineDeal with mistakes and errors so you can solve your own programming problemsIf you've been thinking seriously about digging into programming, Python Crash Course will get you up to speed and have you writing real programs fast. Why wait any longer? Start your engines and code!

The Success of Open Source


Steven Weber - 2004
    Leaving source code open has generated some of the most sophisticated developments in computer technology, including, most notably, Linux and Apache, which pose a significant challenge to Microsoft in the marketplace. As Steven Weber discusses, open source's success in a highly competitive industry has subverted many assumptions about how businesses are run, and how intellectual products are created and protected.Traditionally, intellectual property law has allowed companies to control knowledge and has guarded the rights of the innovator, at the expense of industry-wide cooperation. In turn, engineers of new software code are richly rewarded; but, as Weber shows, in spite of the conventional wisdom that innovation is driven by the promise of individual and corporate wealth, ensuring the free distribution of code among computer programmers can empower a more effective process for building intellectual products. In the case of Open Source, independent programmers--sometimes hundreds or thousands of them--make unpaid contributions to software that develops organically, through trial and error.Weber argues that the success of open source is not a freakish exception to economic principles. The open source community is guided by standards, rules, decisionmaking procedures, and sanctioning mechanisms. Weber explains the political and economic dynamics of this mysterious but important market development.

Mobile Suit Gundam: Awakening, Escalation, Confrontation


Yoshiyuki Tomino - 2004
    This second edition of creator Yoshiyuki Tomino's novelization is redesigned for a new generation of fans.Yoshiyuki Tomino is one of Japan's best known science-fiction directors.Frederik L. Schodt writes extensively on Japanese culture and lives in San Francisco, California.

I Heart Logs: Event Data, Stream Processing, and Data Integration


Jay Kreps - 2014
    Even though most engineers don't think much about them, this short book shows you why logs are worthy of your attention.Based on his popular blog posts, LinkedIn principal engineer Jay Kreps shows you how logs work in distributed systems, and then delivers practical applications of these concepts in a variety of common uses--data integration, enterprise architecture, real-time stream processing, data system design, and abstract computing models.Go ahead and take the plunge with logs; you're going love them.Learn how logs are used for programmatic access in databases and distributed systemsDiscover solutions to the huge data integration problem when more data of more varieties meet more systemsUnderstand why logs are at the heart of real-time stream processingLearn the role of a log in the internals of online data systemsExplore how Jay Kreps applies these ideas to his own work on data infrastructure systems at LinkedIn

The Chemist's Shop


Richard Brumer - 2015
    He puts the horrific tragedies of his past behind him and finds serenity in his new life. That is, until he recognizes a customer as former Nazi SS officer, Hans Stern.Michael looks into Stern’s cold steel-blue eyes, clenches his fists and boils inside, remembering how his three young daughters were taken from him and gassed, and his wife, Ilona, was tortured, raped and stripped of all dignity by Stern twenty-five years earlier in Auschwitz.Face to face with this evil being, Michael forces himself to stay calm. In that moment, he experiences two opposing but related feelings. One is anger, the other exhilaration.He could not protect his family then, but he can avenge their deaths now. It wasn’t just about killing Stern. That would be too easy. His death had to be slow, painful, and diabolical, and it begins with a game of chess.

The Power Formula for LinkedIn Success: Kick-start Your Business, Brand, and Job Search


Wayne Breitbarth - 2011
    You have already done a lot of the networking groundwork, and LinkedIn can extend your reach even further with minimal time each week.Using actual screenshots of the LinkedIn website, Breitbarth demonstrates how you can take advantage of all the features of this professional networking platform. He shows you how to create a compelling profile, use keywords to improve your ability to find and be found by others, build a solid base of connections, solicit valuable recommendations, and much more. His 6-week, 2-hour-per-week startup plan and weekly maintenance plan will motivate you to make the most of your time on LinkedIn.Wayne Breitbarth’s pragmatic teaching style and engaging sense of humor are on display throughout The Power Formula for LinkedIn Success, and he shares many specific examples, stories, and illustrations that are the direct result of thirty years’ experience in business consulting and business ownership. Whether you are an entry-level professional, a CEO, or anywhere in between, you can benefit from this practical introduction to a powerful networking tool.