How to Fish


Chris Yates - 2006
    How to Fish is a gem of a book that gets to the heart of the passion for angling: that there's more to fishing than catching fish.

Uncharted: Big Data and an Emerging Science of Human History


Erez Aiden - 2013
    Gigabytes, exabytes (that’s one quintillion bytes) of data are sitting on servers across the world. So how can we start to access this explosion of information, this “big data,” and what can it tell us?   Erez Aiden and Jean-Baptiste Michel are two young scientists at Harvard who started to ask those questions. They teamed up with Google to create the Ngram Viewer, a Web-based tool that can chart words throughout the massive Google Books archive, sifting through billions of words to find fascinating cultural trends. On the day that the Ngram Viewer debuted in 2010, more than one million queries were run through it.   On the front lines of Big Data, Aiden and Michel realized that this big dataset—the Google Books archive that contains remarkable information on the human experience—had huge implications for looking at our shared human history. The tool they developed to delve into the data has enabled researchers to track how our language has evolved over time, how art has been censored, how fame can grow and fade, how nations trend toward war. How we remember and how we forget. And ultimately, how Big Data is changing the game for the sciences, humanities, politics, business, and our culture.

Learn Java in One Day and Learn It Well: Java for Beginners with Hands-on Project


Jamie Chan - 2016
    Learn Java Programming Fast with a unique Hands-On Project. Book 4 of the Learn Coding Fast Series. Covers Java 8. Have you always wanted to learn computer programming but are afraid it'll be too difficult for you? Or perhaps you know other programming languages but are interested in learning the Java language fast? This book is for you. You no longer have to waste your time and money trying to learn Java from boring books that are 600 pages long, expensive online courses or complicated Java tutorials that just leave you more confused and frustrated. What this book offers... Java for Beginners Complex concepts are broken down into simple steps to ensure that you can easily master the Java language even if you have never coded before. Carefully Chosen Java Examples Examples are carefully chosen to illustrate all concepts. In addition, the output for all examples are provided immediately so you do not have to wait till you have access to your computer to test the examples. Careful selection of topics Topics are carefully selected to give you a broad exposure to Java, while not overwhelming you with information overload. These topics include object-oriented programming concepts, error handling techniques, file handling techniques and more. In addition, new features in Java (such as lambda expressions and default methods etc) are also covered so that you are always up to date with the latest advancement in the Java language. Learn The Java Programming Language Fast Concepts are presented in a "to-the-point" style to cater to the busy individual. You no longer have to endure boring and lengthy Java textbooks that simply puts you to sleep. With this book, you can learn Java fast and start coding immediately. How is this book different... The best way to learn Java is by doing. This book includes a unique project at the end of the book that requires the application of all the concepts taught previously. Working through the project will not only give you an immense sense of achievement, it’ll also help you retain the knowledge and master the language. Are you ready to dip your toes into the exciting world of Java coding? This book is for you. Click the BUY button and download it now. What you'll learn: Introduction to Java - What is Java? - What software do you need to code Java programs? - How to install and run JDK and Netbeans? Data types and Operators - What are the eight primitive types in Java? - What are arrays and lists? - How to format Java strings - What is a primitive type vs reference type? - What are the common Java operators? Object Oriented Programming - What is object oriented programming? - How to write your own classes - What are fields, methods and constructors? - What is encapsulation, inheritance and polymorphism? - What is an abstract class and interface? Controlling the Flow of a Program - What are condition statements? - How to use control flow statements in Java - How to handle errors and exceptions - How to throw your own exception

Machine Learning


Ethem Alpaydin - 2016
    It is the basis for a new approach to artificial intelligence that aims to program computers to use example data or past experience to solve a given problem. In this volume in the MIT Press Essential Knowledge series, Ethem Alpayd�n offers a concise and accessible overview of the new AI. This expanded edition offers new material on such challenges facing machine learning as privacy, security, accountability, and bias. Alpayd�n, author of a popular textbook on machine learning, explains that as Big Data has gotten bigger, the theory of machine learning--the foundation of efforts to process that data into knowledge--has also advanced. He describes the evolution of the field, explains important learning algorithms, and presents example applications. He discusses the use of machine learning algorithms for pattern recognition; artificial neural networks inspired by the human brain; algorithms that learn associations between instances; and reinforcement learning, when an autonomous agent learns to take actions to maximize reward. In a new chapter, he considers transparency, explainability, and fairness, and the ethical and legal implications of making decisions based on data.

Web Hacking 101


Peter Yaworski
    With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.

Heart of the Machine: Our Future in a World of Artificial Emotional Intelligence


Richard Yonck - 2017
    Heart of the Machine explores the next giant step in the relationship between humans and technology: the ability of computers to recognize, respond to, and even replicate emotions. Computers have long been integral to our lives, and their advances continue at an exponential rate. Many believe that artificial intelligence equal or superior to human intelligence will happen in the not-too-distance future; some even think machine consciousness will follow. Futurist Richard Yonck argues that emotion, the first, most basic, and most natural form of communication, is at the heart of how we will soon work with and use computers.Instilling emotions into computers is the next leap in our centuries-old obsession with creating machines that replicate humans. But for every benefit this progress may bring to our lives, there is a possible pitfall. Emotion recognition could lead to advanced surveillance, and the same technology that can manipulate our feelings could become a method of mass control. And, as shown in movies like Her and Ex Machina, our society already holds a deep-seated anxiety about what might happen if machines could actually feel and break free from our control. Heart of the Machine is an exploration of the new and inevitable ways in which mankind and technology will interact.

The Reality Game: How the Next Wave of Technology Will Break the Truth


Samuel Woolley - 2020
    What will happen when misinformation moves from our social media feeds into our everyday lives?Online disinformation stormed our political process in 2016 and has only worsened since. Yet as Samuel Woolley shows in this urgent book, it may pale in comparison to what's to come: humanlike automated voice systems, machine learning, "deepfake" AI-edited videos and images, interactive memes, virtual reality, and more. These technologies have the power not just to manipulate our politics, but to make us doubt our eyes and ears and even feelings.Deeply researched and compellingly written, The Reality Game describes the profound impact these technologies will have on our lives. Each new invention built without regard for its consequences edges us further into this digital dystopia.Yet Woolley does not despair. Instead, he argues pointedly for a new culture of innovation, one built around accountability and especially transparency. With social media dragging us into a never-ending culture war, we must learn to stop fighting and instead prevent future manipulation. This book shows how we can use our new tools not to control people but to empower them.

Access 2007: The Missing Manual


Matthew MacDonald - 2006
    It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.

Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners


Chris Dannen - 2017
    Blockchain protocols are taking the world by storm, and the Ethereum project, with its Turing-complete scripting language Solidity, has rapidly become a front-runner. This book presents the blockchain phenomenon in context; then situates Ethereum in a world pioneered by Bitcoin.See why professionals and non-professionals alike are honing their skills in smart contract patterns and distributed application development. You'll review the fundamentals of programming and networking, alongside its introduction to the new discipline of crypto-economics. You'll then deploy smart contracts of your own, and learn how they can serve as a back-end for JavaScript and HTML applications on the Web.Many Solidity tutorials out there today have the same flaw: they are written for "advanced" JavaScript developers who want to transfer their skills to a blockchain environment. Introducing Ethereum and Solidity is accessible to technology professionals and enthusiasts of all levels. You'll find exciting sample code that can move forward real world assets in both the academic and the corporate arenas. Find out now why this book is a powerful gateway for creative technologists of all types, from concept to deployment.What You'll LearnSee how Ethereum (and other cryptocurrencies) workCompare distributed apps (dapps) to web appsWrite Ethereum smart contracts in Solidity Connect Ethereum smart contracts to your HTML/CSS/JavaScript web applicationsDeploy your own dapp, coin, and blockchainWork with basic and intermediate smart contractsWho This Book Is For Anyone who is curious about Ethereum or has some familiarity with computer science Product managers, CTOs, and experienced JavaScript programmersExperts will find the advanced sample projects in this book rewarding because of the power of Solidity

Life with an Autistic Son


B's Dad - 2013
    He did not crave my company, cling to and cuddle me endlessly. He showed no need to bond with me, his father, and we did not. He exhausted me, he frustrated me and he scared me. I came to dread coming home from work sometimes, or those moments when it was my turn to wrestle him into bed and begin the long struggle to settle him. I said things that will forever haunt me, like “What is wrong with that child?” and “Is he always going to be this annoying?” What I didn't know then was that he was autistic.When that realisation came, so did the beginning of my mission to understand my son, and to understand autism. This book chronicles that search for understanding and answers. It documents one parent’s attempts to come to terms with, and accept, his child. It is raw and real, sometimes confused and frightened but also, I’d like to think, written with warmth and love and an ability to smile through difficult times.This book is for anyone starting out on a pathway with their child that they did not expect. It’s also for people who, like me, are a little further down that road but still learning, still asking questions and still getting it wrong sometimes. You are not alone.

The Model Thinker: What You Need to Know to Make Data Work for You


Scott E. Page - 2018
    But as anyone who has ever opened up a spreadsheet packed with seemingly infinite lines of data knows, numbers aren't enough: we need to know how to make those numbers talk. In The Model Thinker, social scientist Scott E. Page shows us the mathematical, statistical, and computational models—from linear regression to random walks and far beyond—that can turn anyone into a genius. At the core of the book is Page's "many-model paradigm," which shows the reader how to apply multiple models to organize the data, leading to wiser choices, more accurate predictions, and more robust designs. The Model Thinker provides a toolkit for business people, students, scientists, pollsters, and bloggers to make them better, clearer thinkers, able to leverage data and information to their advantage.

Probability Theory: The Logic of Science


E.T. Jaynes - 1999
    It discusses new results, along with applications of probability theory to a variety of problems. The book contains many exercises and is suitable for use as a textbook on graduate-level courses involving data analysis. Aimed at readers already familiar with applied mathematics at an advanced undergraduate level or higher, it is of interest to scientists concerned with inference from incomplete information.

Cyberphobia: Identity, Trust, Security and the Internet


Edward Lucas - 2015
    Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.

What Algorithms Want: Imagination in the Age of Computing


Ed Finn - 2017
    It's as if we think of code as a magic spell, an incantation to reveal what we need to know and even what we want. Humans have always believed that certain invocations—the marriage vow, the shaman's curse—do not merely describe the world but make it. Computation casts a cultural shadow that is shaped by this long tradition of magical thinking. In this book, Ed Finn considers how the algorithm—in practical terms, “a method for solving a problem”—has its roots not only in mathematical logic but also in cybernetics, philosophy, and magical thinking.Finn argues that the algorithm deploys concepts from the idealized space of computation in a messy reality, with unpredictable and sometimes fascinating results. Drawing on sources that range from Neal Stephenson's Snow Crash to Diderot's Encyclopédie, from Adam Smith to the Star Trek computer, Finn explores the gap between theoretical ideas and pragmatic instructions. He examines the development of intelligent assistants like Siri, the rise of algorithmic aesthetics at Netflix, Ian Bogost's satiric Facebook game Cow Clicker, and the revolutionary economics of Bitcoin. He describes Google's goal of anticipating our questions, Uber's cartoon maps and black box accounting, and what Facebook tells us about programmable value, among other things.If we want to understand the gap between abstraction and messy reality, Finn argues, we need to build a model of “algorithmic reading” and scholarship that attends to process, spearheading a new experimental humanities.

Metal Detecting: A Beginner's Guide to Mastering the Greatest Hobby In the World


Mark D. Smith - 2014
    This book shows you how to claim your share. Over 200 pages of valuable metal detecting information designed to get you out there finding treasure on your very first outing.Finding treasure with a metal detector is real and doing it is simple and easy once you read this book. There are people finding incredible old coins made from gold and silver, valuable historical relics and old jewelry made from gold, silver and platinum. But you won't find these great treasures unless you know where and how to look. Metal Detecting: A Beginner's Guide shows you this and much more.Veteran detectorist and treasure enthusiast Mark Smith continues to provide great information to anyone interested in the great hobby of metal detecting. In his second book on the subject, he manages to answer the common questions that every novice has when they are thinking about getting started. From choosing the right machine to identifying your valuable treasure, Mark Smith covers these subjects and everything in between in an easy to understand way.While this metal detecting book may be geared towards the novice treasure hunter, there are plenty of choice tips that even experienced treasure hunters can pick up. Mark Smith reveals some of his best guarded metal detecting secrets in this metal detecting guide that puts more treasure in your find's pouch.Fully illustrated diagrams and real life pictures describe in detail the easiest ways to not only locate treasure, but safely recover it as well.Learn how to find more treasure by: understanding common metal detecting terminology, understanding which metal detectors work the best and where, understanding how and why a metal detector works, other equipment you will need, proper etiquette, what you can expect to find, why you should never throw anything away, how to identify your finds, how to identify jewelry, how to tell if it is real gold, how to metal detect with children, which recovery tools work the best, how to recover treasure, how to metal detect private property, how to identify unknown metal detecting finds, metal detecting creeks, rivers and lakes, pinpointing, making weak targets stronger, cleaning your finds, the best places to use your metal detector, selling your finds and more!What are you waiting for? Find out how you can maximize your treasure with this informative metal detecting book today.