Introduction to Computer Theory


Daniel I.A. Cohen - 1986
    Covers all the topics needed by computer scientists with a sometimes humorous approach that reviewers found refreshing. The goal of the book is to provide a firm understanding of the principles and the big picture of where computer theory fits into the field.

Masters of Deception: The Gang That Ruled Cyberspace


Michelle Slatalla - 1995
    "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

Privacy in Context: Technology, Policy, and the Integrity of Social Life


Helen Nissenbaum - 2009
    This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information.Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Infinite Reality: Avatars, Eternal Life, New Worlds, and the Dawn of the Virtual Revolution


Jim Blascovich - 2011
    Infinite Reality is the straight dope on what is and isn’t happening to us right now, from two of the only scientists working on the boundaries between real life and its virtual extensions.”—Douglas Rushkoff, author of Program or Be ProgrammedHow achievable are the virtual experiences seen in The Matrix, Tron, and James Cameron’s Avatar? Do our brains know where “reality” ends and “virtual” begins? In Infinite Reality, Jim Blascovich and Jeremy Bailenson, two pioneering experts in the field of virtual reality, reveal how the human brain behaves in virtual environments and examine where radical new developments in digital technology will lead us in five, fifty, and five hundred years.

The Future Computed: Artificial Intelligence and its Role in Society


Microsoft Corporation - 2018
    It’s already happening in impressive ways. But as we’ve witnessed over the past 20 years, new technology also inevitably raises complex questions and broad societal concerns.” – Brad Smith and Harry Shum on The Future Computed. “As we look to a future powered by a partnership between computers and humans, it’s important that we address these challenges head on. How do we ensure that AI is designed and used responsibly? How do we establish ethical principles to protect people? How should we govern its use? And how will AI impact employment and jobs?” – Brad Smith and Harry Shum on The Future Computed. As Artificial Intelligence shows up in every aspect of our lives, Microsoft's top minds provide a guide discussing how we should prepare for the future. Whether you're a government leader crafting new laws, an entrepreneur looking to incorporate AI into your business, or a parent contemplating the future of education, this book explains the trends driving the AI revolution, identifies the complex ethics and workforce issues we all need to think about and suggests a path forward. Read more: The Future Computed: Artificial Intelligence and its role in society provides Microsoft’s perspective on where AI technology is going and the new societal issues it is raising – ensuring AI is designed and used responsibly, establishing ethical principles to protect people, and how AI will impact employment and jobs. The principles of fairness, reliability and safety, privacy and security, inclusiveness, transparency and accountability are critical to addressing the societal impacts of AI and building trust as AI becomes more and more a part of the products and services that people use at work and at home every day. A central theme in The Future Computed is that for AI to deliver on its potential drive widespread economic and social progress, the technology needs to be human-centered – combining the capabilities of computers with human capabilities to enable people to achieve more. But a human-centered approach can only be realized if researchers, policymakers, and leaders from government, business and civil society come together to develop a shared ethical framework for AI. This in turn will help foster responsible development of AI systems that will engender trust. Because in an increasingly AI-driven world the question is not what computers can do, it is what computers should do. The Future Computed also draws a few conclusions as we chart our path forward. First, the companies and countries that will fare best in the AI era will be those that embrace these changes rapidly and effectively. Second, while AI will help solve big societal problems, we must look to this future with a critical eye as there will be challenges as well as opportunities. Third, we need to act with a sense of shared responsibility because AI won’t be created by the tech sector alone. Finally, skilling-up for an AI-powered world involves more than science, technology, engineering and math. As computers behave more like humans, the social sciences and humanities will become grow in importance.

R for Dummies


Joris Meys - 2012
    R is packed with powerful programming capabilities, but learning to use R in the real world can be overwhelming for even the most seasoned statisticians. This easy-to-follow guide explains how to use R for data processing and statistical analysis, and then, shows you how to present your data using compelling and informative graphics. You'll gain practical experience using R in a variety of settings and delve deeper into R's feature-rich toolset.Includes tips for the initial installation of RDemonstrates how to easily perform calculations on vectors, arrays, and lists of dataShows how to effectively visualize data using R's powerful graphics packagesGives pointers on how to find, install, and use add-on packages created by the R communityProvides tips on getting additional help from R mailing lists and websitesWhether you're just starting out with statistical analysis or are a procedural programming pro, "R For Dummies" is the book you need to get the most out of R.

SEO 2016: Learn Search Engine Optimization (SEO Books Series)


R.L. Adams - 2015
    It's certainly no walk in the park. And, depending on where you've been for your information when it comes to SEO, it might be outdated, or just flat-out wrong. Why is that? Search has been evolving at an uncanny rate in recent years. And, if you're not in the know, then you could end up spinning your wheels and wasting valuable and precious time and resources on techniques that no longer work. The main reason for the recent changes: to increase relevancy. Google's sole mission is to provide the most relevant search results at the top of its searches, in the quickest manner possible. But, in recent years, due to some mischievous behavior at the hand of a small group of people, relevancy began to wane. SEO 2016 :: Understanding Google's Algorithm Adjustments The field of SEO has been changing, all led by Google's onslaught of algorithm adjustments that have decimated and razed some sites while uplifting and building others. Since 2011, Google has made it its mission to hunt out and demote spammy sites that sacrifice user-experience, focus on thin content, or simply spend their time trying to trick and deceive their way to the top of its search results. At the same time, Google has increased its reliance on four major components of trust, that work at the heart of its search algorithm: Trust in Age Trust in Authority Trust in Content Relevancy In this book, you'll learn just how each of these affects Google's search results, and just how you can best optimize your site and content to ensure that you're playing by Google's many rules. And, although there have been many algorithm adjustments over the years, four major ones have shaped and forever changed the search engine landscape: Google Panda Google Penguin Google Hummingbird Google Mobilegeddon We'll discuss the nature of these changes and just how each of these algorithm adjustments have shaped the current landscape in search engine optimization. So what does it take to rank your site today? In order to compete at any level in SEO, you have to earn trust - Google's trust that is. But, what does that take? How can we build trust quickly without jumping through all the hoops? SEO is by no means a small feat. It takes hard work applied consistently overtime. There are no overnight success stories when it comes to SEO. But there are certainly ways to navigate the stormy online waters of Google's highly competitive search. Download SEO 2016 :: Learn Search Engine Optimization Lift the veil on Google's complex search algorithm, and understand just what it takes to rank on Google searches today, not yesterday.

CNC Programming Handbook


Peter Smid - 2000
    Used in hundreds of educational institutions around the world as the primary text for CNC courses, and used daily by many in-field CNC programmers and machine operators, this book literally defines CNC programming. Written with careful attention to detail, there are no compromises. Many of the changes in this new Third Edition are the direct result of comments and suggestions received from many CNC professionals in the field. This extraordinarily comprehensive work continues to be packed with over one thousand illustrations, tables, formulas, tips, shortcuts, and practical examples.The enclosed CD-ROM now contains a fully functional 15-day shareware version of CNC tool path editor/simulator, NCPlot™. This powerful, easy-to-learn software includes an amazing array of features, many not found in competitive products. NCPlot offers an unmatched combination of simplicity of use and richness of features. Support for many advanced control options is standard, including a macro interpreter that simulates Fanuc and similar macro programs.The CD-ROM also offers many training exercises based on individual chapters, along with solutions and detailed explanations. Special programming and machining examples are provided as well, in form of complete machine files, useful as actual programming resources. Virtually all files use Adobe PDF format and are set to high resolution printing.FEATURES Fully functional shareware version of CNC toolpath simulator/editor, NCPlot(TM), included on the CD-ROM. This powerful software includes an amazing array of features, including those not found in competitive products. Support for many advanced features is standard, and the included macro interpreter can simulate Fanuc and compatible macro toolpath programs Detailed section on CNC lathes with live tooling, including examples Image files of many actual parts, used as examples More programming examples (both in printed text and on the CD-ROM) Optimized for the latest Fanuc and related control systems Additional formulas, calculations and handy reference material Fourth axis programming (indexing and rotary) CD-ROM based projects, including several as interactive PDF forms Improved index for better search of topics

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


Tobias Klein - 2011
    In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

Mac OS X Internals: A Systems Approach


Amit Singh - 2006
    Understanding the design, implementation, and workings of Mac OS X requires examination of several technologies that differ in their age, origins, philosophies, and roles. Mac OS X Internals: A Systems Approach is the first book that dissects the internals of the system, presenting a detailed picture that grows incrementally as you read. For example, you will learn the roles of the firmware, the bootloader, the Mach and BSD kernel components (including the process, virtual memory, IPC, and file system layers), the object-oriented I/O Kit driver framework, user libraries, and other core pieces of software. You will learn how these pieces connect and work internally, where they originated, and how they evolved. The book also covers several key areas of the Intel-based Macintosh computers.A solid understanding of system internals is immensely useful in design, development, and debugging for programmers of various skill levels. System programmers can use the book as a reference and to construct a better picture of how the core system works. Application programmers can gain a deeper understanding of how their applications interact with the system. System administrators and power users can use the book to harness the power of the rich environment offered by Mac OS X. Finally, members of the Windows, Linux, BSD, and other Unix communities will find the book valuable in comparing and contrasting Mac OS X with their respective systems. Mac OS X Internals focuses on the technical aspects of OS X and is so full of extremely useful information and programming examples that it will definitely become a mandatory tool for every Mac OS X programmer.

Make Noise: A Creator's Guide to Podcasting and Great Audio Storytelling


Eric Nuzum - 2019
      Nuzum identifies core principles, including what he considers the key to successful audio storytelling: learning to think the way your audience listens. He delivers essential how-tos, from conducting an effective interview to marketing your podcast, developing your audience, and managing a creative team. He also taps into his deep network to offer advice from audio stars like Ira Glass, Terry Gross, and Anna Sale.   The book’s insights and guidance will help readers successfully express themselves as effective audio storytellers, whether for business or pleasure, or a mixture of both.

Gray Hat Python: Python Programming for Hackers and Reverse Engineers


Justin Seitz - 2008
    But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it.You'll learn how to:Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?

Brains on Fire: Igniting Powerful, Sustainable, Word of Mouth Movements


Robbin Phillips - 2010
    It takes you step-by-step through the necessary actions needed to start your own authentic movement.Develop and harness a powerful, sustainable, word-of-mouth movement Describes 10 lessons to master and create a powerful, sustainable movement The Brains on Fire blog is often ranked in the top 100 of AdAge's Power 150 Marketing Blogs

UNIX in a Nutshell: A Desktop Quick Reference for System V Release 4 and Solaris 2.0


Daniel Gilly - 1992
    For all but the thorniest UNIX problems, this one reference should be all the documentation you need.The second edition of "UNIX in a Nutshell" starts with thorough coverage of System V Release 3. To that, we've added the many new commands that were added to Release 4 and additional commands that were added to Solaris 2.0.Contents include: All user and programmer commands.New Korn shell documentation.Expanded text editing section, including GNU Emacs and "nawk."Shell syntax ("sh" and "csh").Pattern-matching syntax."vi" and "ex" commands."sed" and "awk" commands."troff" and related commands and macros."sdb" and "dbx" commands.If you currently use either SVR3 or SVR4 or are planning to in the future, or if you're a Sun user facing the transition to Solaris, you'll want this book. "UNIX in a Nutshell" is the most comprehensive quickref on the market, a must for any UNIX user.

The Hardware Hacker: Adventures in Making and Breaking Hardware


Andrew Huang - 2017
    In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.