Book picks similar to
Lauren Ipsum by Carlos Bueno


fiction
computer-science
fantasy
programming

Applied Cryptography: Protocols, Algorithms, and Source Code in C


Bruce Schneier - 1993
    … The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations

Tesla's Attic


Neal Shusterman - 2014
    When Nick opens the door to his attic room, he's hit in the head by a toaster. That's just the beginning of his weird experiences with the old junk stored up there. After getting rid of the odd antiques in a garage sale, Nick befriends some local kids-Mitch, Caitlin, and Vincent-and they discover that all of the objects have extraordinary properties. What's more, Nick figures out that the attic is a strange magnetic vortex, which attracts all sorts of trouble. It's as if the attic itself has an intelligence . . . and a purpose.Ultimately Nick learns that the genius Nikola Tesla placed the items-his last inventions-in the attic as part of a larger plan that he mathematically predicted. Nick and his new friends must retrieve everything that was sold at the garage sale and keep it safe. But the task is fraught with peril-in addition to the dangers inherent in Tesla's mysterious and powerful creations, a secret society of physicists, the Accelerati, is determined to stop Nick and alter destiny to achieve its own devious ends. It's a lot for a guy to handle, especially when he'd much rather fly under the radar as the new kid in town.

Quantum Computing Since Democritus


Scott Aaronson - 2013
    Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible to readers with scientific backgrounds, as well as students and researchers working in physics, computer science, mathematics and philosophy.

Fluent Python: Clear, Concise, and Effective Programming


Luciano Ramalho - 2015
    With this hands-on guide, you'll learn how to write effective, idiomatic Python code by leveraging its best and possibly most neglected features. Author Luciano Ramalho takes you through Python's core language features and libraries, and shows you how to make your code shorter, faster, and more readable at the same time.Many experienced programmers try to bend Python to fit patterns they learned from other languages, and never discover Python features outside of their experience. With this book, those Python programmers will thoroughly learn how to become proficient in Python 3.This book covers:Python data model: understand how special methods are the key to the consistent behavior of objectsData structures: take full advantage of built-in types, and understand the text vs bytes duality in the Unicode ageFunctions as objects: view Python functions as first-class objects, and understand how this affects popular design patternsObject-oriented idioms: build classes by learning about references, mutability, interfaces, operator overloading, and multiple inheritanceControl flow: leverage context managers, generators, coroutines, and concurrency with the concurrent.futures and asyncio packagesMetaprogramming: understand how properties, attribute descriptors, class decorators, and metaclasses work"

The Golden Acorn


Catherine Cooper - 2009
    Just an ordinary boy, Jack has been chosen for a hugely important task, and enters a world he believed only existed in legend. Full of twists and turns and featuring characters such as talking ravens and mischievous Spriggans, The Golden Acorn is a hugely entertaining and exciting tale from a very talented new author.

Cryptography Engineering: Design Principles and Practical Applications


Niels Ferguson - 2010
    Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

The Call


Michael Grant - 2010
    Medium looks. Medium grades. Medium parents who barely notice him. With a list of phobias that could make anyone crazy, Mack never would have guessed that he is destined for a more-than-medium life.And then, one day, something incredibly strange happens to Mack. A three-thousand-year-old man named Grimluk appears in the boys' bathroom to deliver some startling news: Mack is one of the Magnificent Twelve, called the Magnifica in ancient times, whatever that means. An evil force is on its way, and it's up to Mack to track down eleven other twelve-year-olds in order to stop it. He must travel across the world to battle the wicked Pale Queen's dangerous daughter, Ereskigal--also known as Risky. But Risky sounds a little scary, and Mack doesn't want to be a hero. Will he answer the call?A laugh-out-loud story filled with excitement and magic, "The Magnificent Twelve: The Call" is the first book in bestselling author Michael Grant's hilarious new fantasy adventure series.

Mindstorms: Children, Computers, And Powerful Ideas


Seymour Papert - 1980
    We have Mindstorms to thank for that. In this book, pioneering computer scientist Seymour Papert uses the invention of LOGO, the first child-friendly programming language, to make the case for the value of teaching children with computers. Papert argues that children are more than capable of mastering computers, and that teaching computational processes like de-bugging in the classroom can change the way we learn everything else. He also shows that schools saturated with technology can actually improve socialization and interaction among students and between students and teachers.

HTML and CSS: Design and Build Websites


Jon Duckett - 2011
    Joining the professional web designers and programmers are new audiences who need to know a little bit of code at work (update a content management system or e-commerce store) and those who want to make their personal blogs more attractive. Many books teaching HTML and CSS are dry and only written for those who want to become programmers, which is why this book takes an entirely new approach. • Introduces HTML and CSS in a way that makes them accessible to everyone—hobbyists, students, and professionals—and it’s full-color throughout • Utilizes information graphics and lifestyle photography to explain the topics in a simple way that is engaging • Boasts a unique structure that allows you to progress through the chapters from beginning to end or just dip into topics of particular interest at your leisureThis educational book is one that you will enjoy picking up, reading, then referring back to. It will make you wish other technical topics were presented in such a simple, attractive and engaging way!

Think Python


Allen B. Downey - 2002
    It covers the basics of computer programming, including variables and values, functions, conditionals and control flow, program development and debugging. Later chapters cover basic algorithms and data structures.

Arduino Cookbook: Recipes to Begin, Expand, and Enhance Your Projects


Michael Margolis - 2010
    You'll find more than 200 tips and techniques for building a variety of objects and prototypes such as IoT solutions, environmental monitors, location and position-aware systems, and products that can respond to touch, sound, heat, and light.Updated for the Arduino 1.8 release, the recipes in this third edition include practical examples and guidance to help you begin, expand, and enhance your projects right away--whether you're an engineer, designer, artist, student, or hobbyist.Get up to speed on the Arduino board and essential software concepts quicklyLearn basic techniques for reading digital and analog signalsUse Arduino with a variety of popular input devices and sensorsDrive visual displays, generate sound, and control several types of motorsConnect Arduino to wired and wireless networksLearn techniques for handling time delays and time measurementApply advanced coding and memory-handling techniques

Little Boy Lost


Eric Hobbs - 2011
    He's landed at the bottom of his school's popularity ladder, and bully Randy Stanford seems to be waiting around every corner.The troubled teen thinks he's found a way to escape his real-world problems when he stumbles upon strange doorways in Astoria's local library that seem to lead into the extraordinary worlds from all his favorite books. Oz, Neverland, Wonderland -- they're all a reality with Wesley's new discovery. Wesley teams with best friend Taylor Williams to embark on a great adventure, both ready to leave the drama of middle school behind.But the two kids quickly find themselves embroiled in a centuries-old battle for the library and the magic hiding within. Now, fighting alongside the eccentric old man who's vowed to protect the building's power, the pair must help ward off an attack by a shadowy group with a strange tie to Wesley's nemesis, forcing Wesley to face the fears he's been dodging... and one of the most terrifying bullies of all time!

Hacker's Delight


Henry S. Warren Jr. - 2002
    Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Gregor the Overlander


Suzanne Collins - 2003
    This world is on the brink of war, and Gregor's arrival is no accident. A prophecy foretells that Gregor has a role to play in the Underland's uncertain future. Gregor wants no part of it -- until he realizes it's the only way to solve the mystery of his father's disappearance. Reluctantly, Gregor embarks on a dangerous adventure that will change both him and the Underland forever.