Hibernate in Action


Christian Bauer - 2004
    Why is this open-source tool so popular? Because it automates a tedious task: persisting your Java objects to a relational database. The inevitable mismatch between your object-oriented code and the relational database requires you to write code that maps one to the other. This code is often complex, tedious and costly to develop. Hibernate does the mapping for you.Not only that, Hibernate makes it easy. Positioned as a layer between your application and your database, Hibernate takes care of loading and saving of objects. Hibernate applications are cheaper, more portable, and more resilient to change. And they perform better than anything you are likely to develop yourself."Hibernate in Action" carefully explains the concepts you need, then gets you going. It builds on a single example to show you how to use Hibernate in practice, how to deal with concurrency and transactions, how to efficiently retrieve objects and use caching.The authors created Hibernate and they field questions from the Hibernate community every day-they know how to make Hibernate sing. Knowledge and insight seep out of every pore of this book."What's Inside"- ORM concepts- Getting started- Many real-world tasks- The Hibernate application development process

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency


Parmy Olson - 2012
    WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.

The Nostalgia Nerd's Retro Tech: Computer, Consoles & Games


Peter Leigh - 2018
    Remember what a wild frontier the early days of home gaming were? Manufacturers releasing new consoles at a breakneck pace; developers creating games that kept us up all night, then going bankrupt the next day; and what self-respecting kid didn't beg their parents for an Atari or a Nintendo? This explosion of computers, consoles, and games was genuinely unlike anything the tech world has seen before or since.This thoroughly researched and geeky trip down memory lane pulls together the most entertaining stories from this dynamic era, and brings you the classic tech that should never be forgotten.

Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy


George Gilder - 2018
    Gilder says or writes is ever delivered at anything less than the fullest philosophical decibel... Mr. Gilder sounds less like a tech guru than a poet, and his words tumble out in a romantic cascade." “Google’s algorithms assume the world’s future is nothing more than the next moment in a random process. George Gilder shows how deep this assumption goes, what motivates people to make it, and why it’s wrong: the future depends on human action.” — Peter Thiel, founder of PayPal and Palantir Technologies and author of Zero to One: Notes on Startups, or How to Build the Future The Age of Google, built on big data and machine intelligence, has been an awesome era. But it’s coming to an end. In Life after Google, George Gilder—the peerless visionary of technology and culture—explains why Silicon Valley is suffering a nervous breakdown and what to expect as the post-Google age dawns. Google’s astonishing ability to “search and sort” attracts the entire world to its search engine and countless other goodies—videos, maps, email, calendars….And everything it offers is free, or so it seems. Instead of paying directly, users submit to advertising. The system of “aggregate and advertise” works—for a while—if you control an empire of data centers, but a market without prices strangles entrepreneurship and turns the Internet into a wasteland of ads. The crisis is not just economic. Even as advances in artificial intelligence induce delusions of omnipotence and transcendence, Silicon Valley has pretty much given up on security. The Internet firewalls supposedly protecting all those passwords and personal information have proved hopelessly permeable. The crisis cannot be solved within the current computer and network architecture. The future lies with the “cryptocosm”—the new architecture of the blockchain and its derivatives. Enabling cryptocurrencies such as bitcoin and ether, NEO and Hashgraph, it will provide the Internet a secure global payments system, ending the aggregate-and-advertise Age of Google. Silicon Valley, long dominated by a few giants, faces a “great unbundling,” which will disperse computer power and commerce and transform the economy and the Internet. Life after Google is almost here.   For fans of "Wealth and Poverty," "Knowledge and Power," and "The Scandal of Money."

Fearless Genius: The Digital Revolution in Silicon Valley 1985-2000


Doug Menuez - 2014
    At the same time, Steve Jobs was being forced out of his beloved Apple and starting over with a new company, NeXT Computer. His goal was to build a supercomputer with the power to transform education. Menuez had found his story: he proposed to photograph Jobs and his extraordinary team as they built this new computer, from conception to product launch. In an amazing act of trust, Jobs granted Menuez unlimited access to the company, and, for the next three years, Menuez was able to get on film the spirit and substance of innovation through the day-to-day actions of the world’s top technology guru. From there, the project expanded to include the most trailblazing companies in Silicon Valley, all of which granted Menuez the same complete access that Jobs had. Menuez photographed behind the scenes with John Warnock at Adobe, John Sculley at Apple, Bill Gates at Microsoft, John Doerr at Kleiner Perkins, Bill Joy at Sun Microsystems, Gordon Moore and Andy Grove at Intel, Marc Andreessen at Netscape, and more than seventy other leading companies and innovators. It would be fifteen years before Menuez stopped taking pictures, just as the dotcom bubble burst. An extraordinary era was coming to its close. With his singular behind-the-scenes access to these notoriously insular companies, Menuez was present for moments of heartbreaking failure and unexpected success, moments that made history, and moments that revealed the everyday lives of the individuals who made it happen. This period of rapid, radical change would affect almost every aspect of our culture and our lives in ways both large and small and would also create more jobs and wealth than any other time in human history. And Doug Menuez was there, a witness to a revolution. In more than a hundred photographs and accompanying commentary, Fearless Genius captures the human face of innovation and shows what it takes to transform powerful ideas into reality.

Idea Makers: Personal Perspectives on the Lives & Ideas of Some Notable People


Stephen Wolfram - 2016
    Weaving together his immersive interest in people and history with insights gathered from his own experiences, Stephen Wolfram gives an ennobling look at some of the individuals whose ideas and creations have helped shape our world today. Contents includes biographical sketches of: Richard Feynman Kurt Godel Alan Turing John von Neumann George Boole Ada Lovelace Gottfried Leibniz Benoit Mandelbrot Steve Jobs Marvin Minsky Russell Towle Bertrand Russell Alfred Whitehead Richard Crandall Srinivasa Ramanujan Solomon Golomb

Cybersecurity and Cyberwar: What Everyone Needs to Know(r)


P.W. Singer - 2013
    Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood.In Cybersecurity and CyberWar: What Everyone Needs to Know�, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know� is the definitive account on the subject for us all, which comes not a moment too soon.What Everyone Needs to Know� is a registered trademark of Oxford University Press.

Prisoner's Dilemma: John von Neumann, Game Theory, and the Puzzle of the Bomb


William Poundstone - 1992
    Though the answers may seem simple, their profound implications make the prisoner's dilemma one of the great unifying concepts of science. Watching players bluff in a poker game inspired John von Neumann--father of the modern computer and one of the sharpest minds of the century--to construct game theory, a mathematical study of conflict and deception. Game theory was readily embraced at the RAND Corporation, the archetypical think tank charged with formulating military strategy for the atomic age, and in 1950 two RAND scientists made a momentous discovery.Called the prisoner's dilemma, it is a disturbing and mind-bending game where two or more people may betray the common good for individual gain. Introduced shortly after the Soviet Union acquired the atomic bomb, the prisoner's dilemma quickly became a popular allegory of the nuclear arms race. Intellectuals such as von Neumann and Bertrand Russell joined military and political leaders in rallying to the preventive war movement, which advocated a nuclear first strike against the Soviet Union. Though the Truman administration rejected preventive war the United States entered into an arms race with the Soviets and game theory developed into a controversial tool of public policy--alternately accused of justifying arms races and touted as the only hope of preventing them.A masterful work of science writing, Prisoner's Dilemma weaves together a biography of the brilliant and tragic von Neumann, a history of pivotal phases of the cold war, and an investigation of game theory's far-reaching influence on public policy today. Most important, Prisoner's Dilemma is the incisive story of a revolutionary idea that has been hailed as a landmark of twentieth-century thought.

The Old New Thing: Practical Development Throughout the Evolution of Windows


Raymond Chen - 2006
    With this book, Raymond shares his knowledge, experience, and anecdotal stories, allowing all of us to get a better understanding of the operating system that affects millions of people every day. This book has something for everyone, is a casual read, and I highly recommend it!--Jeffrey Richter, Author/Consultant, Cofounder of WintellectVery interesting read. Raymond tells the inside story of why Windows is the way it is.--Eric Gunnerson, Program Manager, Microsoft CorporationAbsolutely essential reading for understanding the history of Windows, its intricacies and quirks, and why they came about.--Matt Pietrek, MSDN Magazine's Under the Hood ColumnistRaymond Chen has become something of a legend in the software industry, and in this book you'll discover why. From his high-level reminiscences on the design of the Windows Start button to his low-level discussions of GlobalAlloc that only your inner-geek could love, The Old New Thing is a captivating collection of anecdotes that will help you to truly appreciate the difficulty inherent in designing and writing quality software.--Stephen Toub, Technical Editor, MSDN MagazineWhy does Windows work the way it does? Why is Shut Down on the Start menu? (And why is there a Start button, anyway?) How can I tap into the dialog loop? Why does the GetWindowText function behave so strangely? Why are registry files called hives?Many of Windows' quirks have perfectly logical explanations, rooted in history. Understand them, and you'll be more productive and a lot less frustrated. Raymond Chen--who's spent more than a decade on Microsoft's Windows development team--reveals the hidden Windows you need to know.Chen's engaging style, deep insight, and thoughtful humor have made him one of the world's premier technology bloggers. Here he brings together behind-the-scenes explanations, invaluable technical advice, and illuminating anecdotes that bring Windows to life--and help you make the most of it.A few of the things you'll find inside:What vending machines can teach you about effective user interfaces A deeper understanding of window and dialog management Why performance optimization can be so counterintuitive A peek at the underbelly of COM objects and the Visual C++ compiler Key details about backwards compatibility--what Windows does and why Windows program security holes most developers don't know about How to make your program a better Windows citizen

Inside Steve's Brain


Leander Kahney - 2008
    Hes also one of the most controversial CEOs in history, allegedly throwing epic tantrums, firing staff in elevators, and taking credit for other peoples achievements. So whats the real story? According to Leander Kahney, who has covered Jobs since the early 1990s as a reporter, editor, and book author, hes a fascinating bundle of contradictions. Hes an elitist who thinks most people are bozosbut he makes gadgets so easy to use, a bozo can master them. Hes a mercurial obsessive with a filthy temperbut he forges deep partnerships with creative geniuses like Steve Wozniak, Jonathan Ive, and John Lasseter. Hes a Buddhist and antimaterialistbut he produces mass-market products in Asian factories, and he promotes them with absolute mastery of the crassest medium, advertising. In short, Jobs has embraced the personality traits that some consider flawsnarcissism, perfectionism, total faith in his intuitionto lead Apple and Pixar to triumph against steep odds. And in the process, he has become a self-made billionaire. After interviewing more Apple insiders than any previous author, Kahney has distilled the principles that guide Jobs as he launches killer products, attracts fanatically loyal customers, and manages some of the worlds most powerful brands.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

Electronic Dreams: How 1980s Britain Learned to Love the Computer


Tom Lean - 2016
    In those heady early days of computing, Britannia very much ruled the digital waves.Electronic Dreams looks back at how Britain embraced the home computer, and at the people who drove the boom: entrepreneurs such as Clive Sinclair and Alan Sugar seeking new markets; politicians proclaiming economic miracles; bedroom programmers with an unhealthy fascination with technology; and millions of everyday folk who bought into the electronic dream and let the computer into their lives. It is a history of home computers such as the Commodore VIC20, BBC Micro, and ZX Spectrum; classic computer games like Manic Miner and Elite; the early information networks that first put the home online; and the transformation of the computer into an everyday object in the British home.Based on interviews with key individuals, archive sources, and study of vintage hardware and software, and with a particular focus on the computer's place in social history, Electronic Dreams is a nostalgic look at how a depressed 1980s Britain got over its fear of microchips and embraced the computer as a “passport to the future.”

John Von Neumann


Norman Macrae - 1992
    This book discusses Von Neumann's work in areas such as game theory, mathematics, physics, and meteorology which formed the building blocks for the most important discoveries of the century: the modern computer, game theory, and the atom bomb.

Atari Inc.: Business is Fun


Marty Goldberg - 2012
    - Business is Fun, the book that goes behind the company that was synonymous with the popularization of 'video games.'Nearly 8 years in the making, Atari Inc. - Business is Fun is comprised of thousands of researched documents, hundreds of interviews, and access to materials never before available.An amazing 800 pages (including nearly 300 pages of rare, never before seen photos, memos and court documents), this book details Atari's genesis from an idea between an engineer and a visionary in 1969 to a nearly $2 billion dollar juggernaut, and ending with a $538 million death spiral during 1984. A testament to the people that worked at this beloved company, the book is full of their personal stories and insights. Learn about topics like:* All the behind the scenes stories surrounding the creation of the company's now iconic games and products.* The amazing story of Atari's very own "Xerox PARC" research facility up in the foothills of the Sierra Mountains* The full recounting of Steve Jobs's time at Atari, with comments from the people he worked with on projects and the detailed story of the creation of Atari Breakout, including input by Steve Wozniak on his development of the prototype, and how it couldn't be used and another Atari engineer would have to make the final production Breakout arcade game instead.* The creation of "Rick Rats Big Cheese Restaurants" which later became "Chuck E. Cheese's"* How Atari Inc. faltered and took down an entire industry with it before being put on the chopping block.If you've ever wanted to learn about the truth behind the creation of this iconic company told directly by the people who made FUN for a living, then this is the book for you!

Jacquard's Web: How a Hand-Loom Led to the Birth of the Information Age


James Essinger - 2004
    Essinger, a master story-teller, describes how Joseph-Marie Jacquard's loom enabled the silk-weavers of Lyons to weave fabrics 25 times faster than had previously been possible. The device used punched cards, which stored instructions for weaving whatever pattern or design was required. Thesecards can very reasonably be described as the world's first computer programs. Indeed, Essinger shows through a series of remarkable and meticulously researched historical connections--connections never before investigated--that the Jacquard loom kick-started a process of scientific evolution whichwould lead directly to the development of the modern computer. The book examines a wealth of extraordinary links between the nineteenth-century world of weaving and today's computer age: for example, modern computer graphics displays are based on exactly the same principles as those employed inJacquard's special woven tableaux. Jacquard's Web also introduces some of the most colorful and interesting characters in the history of science and technology: the modest but exceptionally dedicated Jacquard himself; the brilliant but temperamental Victorian polymath Charles Babbage, who dreamed ofa cogwheel computer operated using Jacquard cards; and the imaginative and perceptive Ada Lovelace, Lord Byron's only legitimate daughter. Attractively illustrated and compellingly narrated, Jacquard's Web is an engaging and delightful volume. It is an impressive case of historical detective work, one that will leave the reader mesmerized.