Fire in the Valley: The Making of the Personal Computer


Paul Freiberger - 1984
    It reveals the visions they shared, the sacrifices they made, and the rewards they reaped.

Game Design Workshop: A Playcentric Approach to Creating Innovative Games


Tracy Fullerton - 2008
    This design workshop begins with an examination of the fundamental elements of game design; then puts you to work in prototyping, playtesting and redesigning your own games with exercises that teach essential design skills. Workshop exercises require no background in programming or artwork, releasing you from the intricacies of electronic game production, so you can develop a working understanding of the essentials of game design.Features:* A design methodology used in the USC Interactive Media program, a cutting edge program funded in part of Electronic Arts. * Hands-on exercises demonstrate key concepts, and the design methodology* Insights from top industry game designers, including Noah Falstein, American McGee, Peter Molyneux

Cryptography Engineering: Design Principles and Practical Applications


Niels Ferguson - 2010
    Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Artificial Intelligence: A Guide for Thinking Humans


Melanie Mitchell - 2019
    The award-winning author Melanie Mitchell, a leading computer scientist, now reveals AI’s turbulent history and the recent spate of apparent successes, grand hopes, and emerging fears surrounding it.In Artificial Intelligence, Mitchell turns to the most urgent questions concerning AI today: How intelligent—really—are the best AI programs? How do they work? What can they actually do, and when do they fail? How humanlike do we expect them to become, and how soon do we need to worry about them surpassing us? Along the way, she introduces the dominant models of modern AI and machine learning, describing cutting-edge AI programs, their human inventors, and the historical lines of thought underpinning recent achievements. She meets with fellow experts such as Douglas Hofstadter, the cognitive scientist and Pulitzer Prize–winning author of the modern classic Gödel, Escher, Bach, who explains why he is “terrified” about the future of AI. She explores the profound disconnect between the hype and the actual achievements in AI, providing a clear sense of what the field has accomplished and how much further it has to go.Interweaving stories about the science of AI and the people behind it, Artificial Intelligence brims with clear-sighted, captivating, and accessible accounts of the most interesting and provocative modern work in the field, flavored with Mitchell’s humor and personal observations. This frank, lively book is an indispensable guide to understanding today’s AI, its quest for “human-level” intelligence, and its impact on the future for us all.

99 Bottles of OOP


Sandi Metz - 2016
    This book fills that gap. It explains the process of writing good code, and teaches you to achieve beautifully programmed ends by way of extremely practical means. What It's About99 Bottles of OOP is a practical guide to writing cost-effective, maintainable, and pleasing object-oriented code. It explores: Recognizing when code is "good enough"Getting the best value from Test-Driven Development (TDD)Doing proper refactoring, not random "rehacktoring"Locating concepts buried in codeFinding names that convey deeper meaning Safely altering code by following the "Flocking Rules" Simplifying new additions with the Open/Closed PrincipleAvoiding conditionals by obeying the Liskov Substitution PrincipleMaking targeted improvements by reducing Code SmellsWhat Makes It Unique?We are practical people. We love beautiful code but we're committed to getting things done. 99 Bottles of OOP enables both of these desires. It teaches a practical technique for getting things done that leads, naturally and inevitably, to beautiful code.This book contains an extended refactoring, and it details the rationale behind every change. It is a hands-on workbook rather than a list of theoretical ideas. It explains how to use the principles of object-oriented design to guide, not just the final arrangement of code, but each decision about what line of code to write next.It teaches the theory of what good OO looks like, but even better, it supplies step-by-step guidance about how to achieve it.Who Should Read It?The lessons work for programmers with a broad range of experience, from rank novice to grizzled veteran. The code examples are written in Ruby, but this book is not about Ruby--it's about object-oriented programming and design. Regardless of your background, applying these techniques will make your code easier to understand, simpler to change, and more satisfying to contemplate.

Electronic Dreams: How 1980s Britain Learned to Love the Computer


Tom Lean - 2016
    In those heady early days of computing, Britannia very much ruled the digital waves.Electronic Dreams looks back at how Britain embraced the home computer, and at the people who drove the boom: entrepreneurs such as Clive Sinclair and Alan Sugar seeking new markets; politicians proclaiming economic miracles; bedroom programmers with an unhealthy fascination with technology; and millions of everyday folk who bought into the electronic dream and let the computer into their lives. It is a history of home computers such as the Commodore VIC20, BBC Micro, and ZX Spectrum; classic computer games like Manic Miner and Elite; the early information networks that first put the home online; and the transformation of the computer into an everyday object in the British home.Based on interviews with key individuals, archive sources, and study of vintage hardware and software, and with a particular focus on the computer's place in social history, Electronic Dreams is a nostalgic look at how a depressed 1980s Britain got over its fear of microchips and embraced the computer as a “passport to the future.”

Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World


Don Tapscott - 2016
    But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.In Blockchain Revolution, Don and Alex Tapscott reveal how this game-changing technology will shape the future of the world economy, dramatically improving everything from healthcare records to online voting, and from insurance claims to artist royalty payments. Brilliantly researched and highly accessible, this is the essential text on the next major paradigm shift. Read it, or be left behind.

The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order


Paul Vigna - 2015
    A cyber-enigma with an enthusiastic following, it pops up in headlines and fuels endless media debate. You can apparently use it to buy anything from coffee to cars, yet few people seem to truly understand what it is. This raises the question: Why should anyone care about bitcoin?In The Age of Cryptocurrency, Wall Street journalists Paul Vigna and Michael J. Casey deliver the definitive answer to this question. Cybermoney is poised to launch a revolution, one that could reinvent traditional financial and social structures while bringing the world's billions of "unbanked" individuals into a new global economy. Cryptocurrency holds the promise of a financial system without a middleman, one owned by the people who use it and one safeguarded from the devastation of a 2008-type crash.But bitcoin, the most famous of the cybermonies, carries a reputation for instability, wild fluctuation, and illicit business; some fear it has the power to eliminate jobs and to upend the concept of a nation state. It implies, above all, monumental and wide-reaching change-for better and for worse. But it is here to stay, and you ignore it at your peril.Vigna and Casey demystify cryptocurrency-its origins, its function, and what you need to know to navigate a cyber-economy. The digital currency world will look very different from the paper currency world; The Age of Cryptocurrency will teach you how to be ready.

Site Reliability Engineering: How Google Runs Production Systems


Betsy Beyer - 2016
    So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large-scale computing systems?In this collection of essays and articles, key members of Google's Site Reliability Team explain how and why their commitment to the entire lifecycle has enabled the company to successfully build, deploy, monitor, and maintain some of the largest software systems in the world. You'll learn the principles and practices that enable Google engineers to make systems more scalable, reliable, and efficient--lessons directly applicable to your organization.This book is divided into four sections: Introduction--Learn what site reliability engineering is and why it differs from conventional IT industry practicesPrinciples--Examine the patterns, behaviors, and areas of concern that influence the work of a site reliability engineer (SRE)Practices--Understand the theory and practice of an SRE's day-to-day work: building and operating large distributed computing systemsManagement--Explore Google's best practices for training, communication, and meetings that your organization can use

The Other Einstein


Marie Benedict - 2016
    Poe, The Other Einstein offers us a window into a brilliant, fascinating woman whose light was lost in Einstein's enormous shadow. It is the story of Einstein's wife, a brilliant physicist in her own right, whose contribution to the special theory of relativity is hotly debated and may have been inspired by her own profound and very personal insight.Mitza Maric has always been a little different from other girls. Most twenty-year-olds are wives by now, not studying physics at an elite Zurich university with only male students trying to outdo her clever calculations. But Mitza is smart enough to know that, for her, math is an easier path than marriage. And then fellow student Albert Einstein takes an interest in her, and the world turns sideways. Theirs becomes a partnership of the mind and of the heart, but there might not be room for more than one genius in a marriage.

Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath


Ted Koppel - 2015
    Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before.  It isn’t just a scenario. A well-designed attack on just one of the nation’s three electric power grids could cripple much of our infrastructure—and in the age of cyberwarfare, a laptop has become the only necessary weapon. Several nations hostile to the United States could launch such an assault at any time. In fact, as a former chief scientist of the NSA reveals, China and Russia have already penetrated the grid. And a cybersecurity advisor to President Obama believes that independent actors—from “hacktivists” to terrorists—have the capability as well. “It’s not a question of if,” says Centcom Commander General Lloyd Austin, “it’s a question of when.”  And yet, as Koppel makes clear, the federal government, while well prepared for natural disasters, has no plan for the aftermath of an attack on the power grid.  The current Secretary of Homeland Security suggests keeping a battery-powered radio.In the absence of a government plan, some individuals and communities have taken matters into their own hands. Among the nation’s estimated three million “preppers,” we meet one whose doomsday retreat includes a newly excavated three-acre lake, stocked with fish, and a Wyoming homesteader so self-sufficient that he crafted the thousands of adobe bricks in his house by hand. We also see the unrivaled disaster preparedness of the Mormon church, with its enormous storehouses, high-tech dairies, orchards, and proprietary trucking company – the fruits of a long tradition of anticipating the worst. But how, Koppel asks, will ordinary civilians survive?With urgency and authority, one of our most renowned journalists examines a threat unique to our time and evaluates potential ways to prepare for a catastrophe that is all but inevitable.

Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers


John MacCormick - 2012
    A simple web search picks out a handful of relevant needles from the world's biggest haystack: the billions of pages on the World Wide Web. Uploading a photo to Facebook transmits millions of pieces of information over numerous error-prone network links, yet somehow a perfect copy of the photo arrives intact. Without even knowing it, we use public-key cryptography to transmit secret information like credit card numbers; and we use digital signatures to verify the identity of the websites we visit. How do our computers perform these tasks with such ease? This is the first book to answer that question in language anyone can understand, revealing the extraordinary ideas that power our PCs, laptops, and smartphones. Using vivid examples, John MacCormick explains the fundamental "tricks" behind nine types of computer algorithms, including artificial intelligence (where we learn about the "nearest neighbor trick" and "twenty questions trick"), Google's famous PageRank algorithm (which uses the "random surfer trick"), data compression, error correction, and much more. These revolutionary algorithms have changed our world: this book unlocks their secrets, and lays bare the incredible ideas that our computers use every day.

Refactoring: Improving the Design of Existing Code


Martin Fowler - 1999
    Significant numbers of poorly designed programs have been created by less-experienced developers, resulting in applications that are inefficient and hard to maintain and extend. Increasingly, software system professionals are discovering just how difficult it is to work with these inherited, non-optimal applications. For several years, expert-level object programmers have employed a growing collection of techniques to improve the structural integrity and performance of such existing software programs. Referred to as refactoring, these practices have remained in the domain of experts because no attempt has been made to transcribe the lore into a form that all developers could use... until now. In Refactoring: Improving the Design of Existing Software, renowned object technology mentor Martin Fowler breaks new ground, demystifying these master practices and demonstrating how software practitioners can realize the significant benefits of this new process.

The Secret History of Star Wars


Michael Kaminski - 2008
    The tale of Luke Skywalker, Han Solo, and the fall and redemption of Anakin Skywalker has become modern myth, an epic tragedy of the corruption of a young man in love into darkness, the rise of evil, and the power of good triumphing in the end. But it didn't start out that way. In this thorough account of one of cinema's most lasting works, Michael Kaminski presents the true history of how Star Wars was written, from its beginnings as a science fiction fairy tale to its development over three decades into the epic we now know, chronicling the methods, techniques, thought processes, and struggles of its creator. For this unauthorized account, he has pored through over four hundred sources, from interviews to original scripts, to track how the most powerful modern epic in the world was created, expanded, and finalized into the tale an entire generation has grown up with.

The Man Who Invented the Computer: The Biography of John Atanasoff, Digital Pioneer


Jane Smiley - 2010
    Then he went back and built the machine. It worked. The whole world changed. Why don’t we know the name of John Atanasoff as well as we know those of Alan Turing and John von Neumann? Because he never patented the device, and because the developers of the far-better-known ENIAC almost certainly stole critical ideas from him. But in 1973 a court declared that the patent on that Sperry Rand device was invalid, opening the intellectual property gates to the computer revolution. Jane Smiley tells the quintessentially American story of the child of immigrants John Atanasoff with technical clarity and narrative drive, making the race to develop digital computing as gripping as a real-life techno-thriller.