Book picks similar to
Cryptography Demystified by John Hershey
non-fiction
science
theory
computers
Two Scoops of Django: Best Practices for Django 1.6
Daniel Roy Greenfeld - 2014
Java 2: The Complete Reference
Herbert Schildt - 2000
This book is the most complete and up-to-date resource on Java from programming guru, Herb Schildt -- a must-have desk reference for every Java programmer.
HTML for the World Wide Web with XHTML and CSS (Visual QuickStart Guide)
Elizabeth Castro - 2002
The task-based approach teaches readers how to combine HTML and CSS to create sharp and consistent Web pages.
The Ascension Myth Complete Omnibus (Books 1-12): Awakened, Activated, Called, Sanctioned, Rebirth, Retribution, Cloaked, Bourne. Committed, Subversion, Invasion, Ascension
Ell Leigh Clark - 2020
Cognition
Jacques St-Malo - 2019
When research suggests how to harness brain evolution, a hunt ensues for a missing link―one that allows to design humans with skills that prodigies of old would have envied.As germline engineering and biological enhancement have become routine, ancient doubts have emerged under new guises: Who are we? Is there a purpose to life? Why is there so much suffering? When faith and science fail to answer these questions, personal greed and national interest quickly fill the void. But gene selection is expensive, and many are excluded from its benefits. The stage is set for tribalism and social discontent on a scale without precedent, and those caught in the fray, whether by choice or by chance, must play roles not always to their liking in the struggle of all creatures against the arbitrariness of existence.
Destination Mars: The Story of Our Quest to Conquer the Red Planet
Andrew May - 2017
Half a century later, only robots have been to the Red Planet and our astronauts rarely venture beyond Earth orbit.Now Mars is back With everyone from Elon Musk to Ridley Scott and Donald Trump talking about it, interplanetary exploration is back on the agenda and Mars is once again the prime destination for future human expansion and colonisation. In Destination Mars, astrophysicist and science writer Andrew May traces the history of our fascination with the Red Planet and explores the science upon which a crewed mission would be based, from assembling a spacecraft in Earth orbit to surviving solar storms. With expert insight, he analyses the new space race and assesses what the future holds for human life on Mars.
Social Media: Strategies To Mastering Your Brand- Facebook, Instagram, Twitter and Snapchat (Social Media, Social Media Marketing)
David Kelly - 2016
You'll be excited to see all the opportunities from your social media growth and presence just from these advanced strategies. Would you like to know more about: The Advance Strategies That The Pros Use. Doubling Your Instagram Followers Understanding Facebook Ad marketing Top Strategies For Growth Monetizing Your Social Media This book breaks training down into easy-to-understand modules. It starts from the very beginning of dog training, so you can get great results - even as a beginner! Download Social Media:Strategies To Mastering Your Brand- Facebook, Instagram, Twitter and Snapchat Scroll to the top and select the "BUY" button for instant download. You’ll be happy you did!
Practical Cryptography
Niels Ferguson - 2003
The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
Books by Oliver Sacks: The Man Who Mistook His Wife for a Hat / An Anthropologist on Mars/Musicophilia: Tales of Music and the Brain
Books LLC - 2010
Purchase includes a free trial membership in the publisher's book club where you can select from more than a million books without charge. Chapters: The Man Who Mistook His Wife for a Hat, An Anthropologist on Mars, Musicophilia: Tales of Music and the Brain, Seeing Voices, Migraine, Uncle Tungsten: Memories of a Chemical Boyhood, Awakenings, The Island of the Colorblind, . Source: Wikipedia. Free updates online. Not illustrated. Excerpt: The Man Who Mistook His Wife for a Hat and Other Clinical Tales is a 1985 book by neurologist Oliver Sacks describing the case histories of some of his patients. The title of the book comes from the case study of a man with visual agnosia. The Man Who Mistook His Wife for a Hat became the basis of an opera of the same name by Michael Nyman, which premiered in 1986. The book comprises 24 essays split into 4 sections which each deal with a particular aspect of brain function such as deficits and excesses in the first two sections (with particular emphasis on the right hemisphere of the brain) while the third and fourth describe phenomenological manifestations with reference to spontaneous reminiscences, altered perceptions, and extraordinary qualities of mind found in "retardates." The individual essays in this book include, but are not limited to: Christopher Rawlence wrote the libretto for a chamber opera, directed by Michael Morris with music by Michael Nyman, based on the title story. "The Man Who Mistook His Wife for a Hat" was first produced by the Institute of Contemporary Arts in London in 1986. A television version of the opera was subsequently broadcast in the UK. Peter Brook adapted Sacks's book into an acclaimed theatrical production, "L'Homme Qui...," which premiered at the Theatre des Bouffes du Nord, Paris, in 1993. An Indian theatre company, performed a play The Blue Mug, based on the book, starring Rajat Kapoor, Konkona Sen Sharma, Ranvir Shorey a...More: http: //booksllc.net/?id=3371
The Eudaemonic Pie
Thomas A. Bass - 1985
“The result is a veritable pi
Artificial Intelligence in Practice: How 50 Successful Companies Used AI and Machine Learning to Solve Problems
Bernard Marr - 2019
Presenting 50 case studies of actual situations, this book demonstrates practical applications to issues faced by businesses around the globe. The rapidly evolving field of artificial intelligence has expanded beyond research labs and computer science departments and made its way into the mainstream business environment. Artificial intelligence and machine learning are cited as the most important modern business trends to drive success. It is used in areas ranging from banking and finance to social media and marketing. This technology continues to provide innovative solutions to businesses of all sizes, sectors and industries. This engaging and topical book explores a wide range of cases illustrating how businesses use AI to boost performance, drive efficiency, analyse market preferences and many others. Best-selling author and renowned AI expert Bernard Marr reveals how machine learning technology is transforming the way companies conduct business. This detailed examination provides an overview of each company, describes the specific problem and explains how AI facilitates resolution. Each case study provides a comprehensive overview, including some technical details as well as key learning summaries: Understand how specific business problems are addressed by innovative machine learning methods Explore how current artificial intelligence applications improve performance and increase efficiency in various situations Expand your knowledge of recent AI advancements in technology Gain insight on the future of AI and its increasing role in business and industry Artificial Intelligence in Practice: How 50 Successful Companies Used Artificial Intelligence to Solve Problems is an insightful and informative exploration of the transformative power of technology in 21st century commerce.
Information Theory, Inference and Learning Algorithms
David J.C. MacKay - 2002
These topics lie at the heart of many exciting areas of contemporary science and engineering - communication, signal processing, data mining, machine learning, pattern recognition, computational neuroscience, bioinformatics, and cryptography. This textbook introduces theory in tandem with applications. Information theory is taught alongside practical communication systems, such as arithmetic coding for data compression and sparse-graph codes for error-correction. A toolbox of inference techniques, including message-passing algorithms, Monte Carlo methods, and variational approximations, are developed alongside applications of these tools to clustering, convolutional codes, independent component analysis, and neural networks. The final part of the book describes the state of the art in error-correcting codes, including low-density parity-check codes, turbo codes, and digital fountain codes -- the twenty-first century standards for satellite communications, disk drives, and data broadcast. Richly illustrated, filled with worked examples and over 400 exercises, some with detailed solutions, David MacKay's groundbreaking book is ideal for self-learning and for undergraduate or graduate courses. Interludes on crosswords, evolution, and sex provide entertainment along the way. In sum, this is a textbook on information, communication, and coding for a new generation of students, and an unparalleled entry point into these subjects for professionals in areas as diverse as computational biology, financial engineering, and machine learning.
The Hacker Diaries: Confessions of Teenage Hackers
Dan Verton - 2001
He was a normal kid...On February 7, 2000, Yahoo.com was the first victim of the biggest distributed denial-of-service attack ever to hit the Internet. On May 8th, Buy.com was battling a massive denial-of-service attack. Later that afternoon, eBay.com also reported significant outages of service, as did Amazon.com. Then CNN's global online news operation started to grind to a crawl. By the following day, Datek and E-Trade entered crisis mode...all thanks to an ordinary fourteen-year-old kid.Friends and neighbors were shocked to learn that the skinny, dark-haired, boy next door who loved playing basketball--almost as much as he loved computers--would cause millions of dollars worth of damage on the Internet and capture the attention of the online world--and the federal government. He was known online as Mafiaboy and, to the FBI, as the most notorious teenage hacker of all time. He did it all from his bedroom PC. And he's not alone.Computer hacking and Web site defacement has become a national pastime for America's teenagers, and according to the stories you'll read about in The Hacker Diaries--it is only the beginning. But who exactly are these kids and what motivates a hacker to strike? Why do average teenagers get involved in hacking in the first place? This compelling and revealing book sets out to answer these questions--and some of the answers will surprise you. Through fascinating interviews with FBI agents, criminal psychologists, law-enforcement officials--as well as current and former hackers--you'll get a glimpse inside the mind of today's teenage hacker. Learn how they think, find out what it was like for them growing up, and understand the internal and external pressures that pushed them deeper and deeper into the hacker underground. Every hacker has a life and story of his or her own. One teenager's insatiable curiosity as to how the family's VCR worked was enough to trigger a career of cracking into computer systems. This is a remarkable story of technological wizardry, creativity, dedication, youthful angst, frustration and disconnection from society, boredom, anger, and jail time. Teenage hackers are not all indifferent punks. They're just like every other kid and some of them probably live in your neighborhood. They're there. All you have to do is look.
Jet Man: The Making and Breaking of Frank Whittle, Genius of the Jet Revolution
Duncan Campbell-Smith - 2020
In 1985 Hans von Ohain, the scientist who pioneered Nazi Germany's efforts to build a jet plane, posed the question: 'Would World War II have occured if the Luftwaffe knew it faced operational British jets instead of Spitfires?' He immediately answered, 'I, for one, think not.'Frank Whittle, working-class outsider and self-taught enthusiast, had worked out the blueprint of a completely new type of engine in 1929, only for his ideas to be blocked by bureaucratic opposition until the outbreak of war in 1939. The importance of his work was recognized too late by the government for his revolutionary engine to play a major part in World War II. After the war Whittle's dream of civilian jet-powered aircraft became a reality and Britain enjoyed a golden age of 1950's jet-powered flight.Drawing on Whittle's extensive private papers, Campbell-Smith tells the story of a stoic and overlooked British hero, a tantalizing tale of 'what might have been'.
Compilers: Principles, Techniques, and Tools
Alfred V. Aho - 1986
The authors present updated coverage of compilers based on research and techniques that have been developed in the field over the past few years. The book provides a thorough introduction to compiler design and covers topics such as context-free grammars, fine state machines, and syntax-directed translation.