Keith Richards: In His Own Words


Keith Richards - 1994
    Rhythm guitarist with The Rolling Stones for over 30 years, he is also famous in his own right as a solo artist.

Ebook: Design Thinking (Innovation Trends Series)


BBVA Innovation Center - 2015
    In this issue you will find out all there is to be known about Design Thinking, the different and creative approach to businesses everyday challenges.

Grumby


Andy Kessler - 2010
    In this comic novel a band of hacker-geeks load state-of-the-art artificial intelligence, including working eyes, ears, spy software, and a smart mouth, into a bunch of old Furby dolls, re-christened Grumbies, network them together, sell millions, become rich and famous and make enemies/allies of Mossad, the CIA, Google, Microsoft, IRS, Goldman Sachs, the guys from Google, and Steve Jobs.

Over The Top: How The Internet Is (Slowly But Surely) Changing The Television Industry


Alan Wolk - 2015
    Given the intricacies of the industry, it's also going to be the most resistant to change. Alan Wolk, an industry veteran and longtime analyst and observer, lays out how the television industry is adapting to the digital era, explaining what's really happening in a tone that will appeal to laypeople and insiders alike. In the first section, Wolk takes us through how the industry works today, focusing on how the various players actually make money and who pays who for what. The next section deals with the changes that are taking place in the industry today–everything from time shifting to binge viewing to cord cutting–and how those changes are starting to create some seismic shifts. In the final section, Wolk reveals his predictions for the future and what the industry will look like in ten years time. Andrew Wallenstein, co-editor-in-chief of Variety says "Alan Wolk is one of the most insightful observers writing about the media business today. There's no better expert to help you navigate the confusing, complicated nexus of TV and the Internet." David Zaslav, President and CEO of Discovery Communications says "Alan Wolk has a deep understanding of the complex nature of television today… this is a fantastic primer of the business and one of the most educated perspectives on the future of our rapidly evolving industry."

The Cult of Mac


Leander Kahney - 2004
    Apple's machines have legions of loyal, sometimes demented fans. The Cult of Mac surveys the devoted following that has grown up around Macintosh computers. Like fans of a football team or a rock group, Macintosh fanatics have their own subculture, with clearly defined obsessions, rites, and passages. Famously dedicated to their computers, many Mac fans eat, sleep, and breathe the Macintosh. Fans who get Mac tattoos and haircuts, people who attend Apple Store openings like they are Grateful Dead shows, counterculture icons who love the Mac, people who turn old Macs into aquariums (or bongs), Ellen Fein lookalike contests, erotic fiction featuring Steve Jobs; it's all here. Technology reporter Leander Kahney exposes all sides of Mac fanaticism, from the innocuous to the insane.

Dragonlance Dragons of Winter (Dragonlance)


Clark Valentine - 2007
    introduced some revolutionary concepts in the game industry. Never before had the D&D rules been used to tell an epic fantasy tale using full-realized pre-generated characters. It was also the first time that roleplaying adventures would match a story being told in fantasy novels on mass-market shelves. Since MWP began publishing DRAGONLANCE game produts for the revised d20 System, the most often-asked question from fans is "When do we get to see the original modules?" By popular demand, we are presenting all-new versions of the classic adventures. The second in the trilogy, Dragons of Winter, continues the epic War of the Lance. The heroes visit the haunted forests of Silvanesti, the landlocked port city of Tarsis, and the mighty stronghold known as the High Clerist's Tower. The adventures are being completely revised, drawing on twenty years of DRAGONLANCE history, incorporating material most recently featured in the Silver Anniversary edition of the adventures. They will include new character statistics featuring the popular Heroes of the Lance.

Replay: The History of Video Games


Tristan Donovan - 2010
    Based on extensive research and over 140 exclusive interviews with key movers and shakers from gaming's past, Replay tells the sensational story of how the creative vision of game designers gave rise to one of the world's most popular and dynamic art forms.

Aloha, Magnum: Larry Manetti's Magnum, P.I. Memories


Larry Manetti - 1999
    Aloha Magnum is a chronicle of Larry Manetti's wild childhood, his crazy days in Hollywood, his moonlighting as a prominent restaurateur, and his escapades with the rich, famous, and equally outrageous.

Secrets and Lies: Digital Security in a Networked World


Bruce Schneier - 2000
    Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.

Radiohead: Hysterical and Useless


Martin Clarke - 1999
    Starting with the band's origins in Oxford, journalist Martin Clarke covers the essential points: Radiohead's breakout single "Creep," the pivotal album OK Computer, Thom Yorke's continuing political and artistic evolution, and the band's future. This revised edition includes a close look at how the band escaped the rock straightjacket with Kid A and Amnesiac , as well as their most recent album, Hail to the Thief . Clark also offers an in-depth examination of the outspoken, mysterious Yorke, offering insight into the personal demons the vocalist has battled throughout his career as Radiohead's frontman. An incisive look at one of the world's most beloved, followed musical acts, Radiohead: Hysterical and Useless provides stimulating coverage of a provocative group.

Essays in Science


Albert Einstein - 1934
    That unfortunate situation began to change when Einstein published several of the papers and speeches contained in this book which explain the central core of the theory in clear and often beautiful language accessible to any interested reader.In addition to lucid explications of both the Special and General theories, Einstein holds forth on the principles of research, the nature of scientific truth, and the method of theoretical physics. He also offers acute analyses and appreciation of the work of such giants as Johannes Kepler, Isaac Newton, Clerk Maxwell, and Niels Bohr.

1001 Video Games You Must Play Before You Die


Tony MottMitch Krpata - 2010
    The video game has arrived as entertainment and as an art form. This is the first serious critical evaluation ever published of the best video games and is a testament to the medium’s innovativeness and increasing emphasis on aesthetics. Organized chronologically and for all platforms (PC, Xbox, PlayStation, etc.) and covering all genres from the bold (Grand Theft Auto and Halo) and dark (Resident Evil and Silent Hill) to the spiritual (Final Fantasy) and whimsical (Legend of Zelda), the book traces the video game from the rough early days of Pong to the latest visual fantasia.

Documents on the Rape of Nanking


Timothy Brook - 1999
    What ended in one atrocity began with another: the savage military takeover of China's capital city, which quickly became known as the Rape of Nanking. The Japanese Army's conduct from December 1937 to February 1938 constitutes one of the most barbarous events not just of the war but of the century. The violence was documented at the time and then redocumented during the war crimes trial in Tokyo after the war. This book brings together materials from both moments to provide the first comprehensive dossier of primary sources on the Rape.Part 1, "The Records," includes two sources written as the Rape was underway. The first is a long set of documents produced by the International Committee for the Nanking Safety Zone, a group of foreigners who strove to protect the Chinese residents. The second is a series of letters that American surgeon Dr. Robert Wilson wrote for his family during the same period. These letters are published here for the first time.The evidence compiled by the International Committee and its members would be decisive for the indictments against Japanese leaders at the International Military Tribunal for the Far East in Tokyo. Part 2, "The Judgments," reprints portions of the tribunal's 1948 judgment dealing with the Rape of Nanking, its judicial consequences, and sections of the dissenting judgment of Justice Radhabinod Pal.These contemporary records and judgments create an intimate firsthand account of the Rape of Nanking. Together they are intended to stimulate deeper reflection than previously possible on how and why we assess and assign the burden of war guilt.Timothy Brook is Professor of Chinese History and Associate Director of the Joint Centre for Asia Pacific Studies, University of Toronto, and is coeditor of Nation Work: Asian Elites and National Identities and Cultureand Economy: The Shaping of Capitalism in Eastern Asia, both published by the University of Michigan Press.

Black Knight: Ritchie Blackmore


Jerry Bloom - 2006
    Dubbed the 'man in black', guitarist Ritchie Blackmore found fame with Seventies rock giants Deep Purple, then walked away from them to create Rainbow, only to abandon them and form another band in 1997 - Blackmore's Night.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks