CISSP Study Guide


Eric Conrad - 2010
    The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.

The Information: A History, a Theory, a Flood


James Gleick - 2011
    The story of information begins in a time profoundly unlike our own, when every thought and utterance vanishes as soon as it is born. From the invention of scripts and alphabets to the long-misunderstood talking drums of Africa, Gleick tells the story of information technologies that changed the very nature of human consciousness. He provides portraits of the key figures contributing to the inexorable development of our modern understanding of information: Charles Babbage, the idiosyncratic inventor of the first great mechanical computer; Ada Byron, the brilliant and doomed daughter of the poet, who became the first true programmer; pivotal figures like Samuel Morse and Alan Turing; and Claude Shannon, the creator of information theory itself. And then the information age arrives. Citizens of this world become experts willy-nilly: aficionados of bits and bytes. And we sometimes feel we are drowning, swept by a deluge of signs and signals, news and images, blogs and tweets. The Information is the story of how we got here and where we are heading.

Coders at Work: Reflections on the Craft of Programming


Peter Seibel - 2009
    As the words "at work" suggest, Peter Seibel focuses on how his interviewees tackle the day–to–day work of programming, while revealing much more, like how they became great programmers, how they recognize programming talent in others, and what kinds of problems they find most interesting. Hundreds of people have suggested names of programmers to interview on the Coders at Work web site: http://www.codersatwork.com. The complete list was 284 names. Having digested everyone’s feedback, we selected 16 folks who’ve been kind enough to agree to be interviewed:- Frances Allen: Pioneer in optimizing compilers, first woman to win the Turing Award (2006) and first female IBM fellow- Joe Armstrong: Inventor of Erlang- Joshua Bloch: Author of the Java collections framework, now at Google- Bernie Cosell: One of the main software guys behind the original ARPANET IMPs and a master debugger- Douglas Crockford: JSON founder, JavaScript architect at Yahoo!- L. Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1- Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation - Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal - Dan Ingalls: Smalltalk implementor and designer- Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler- Donald Knuth: Author of The Art of Computer Programming and creator of TeX- Peter Norvig: Director of Research at Google and author of the standard text on AI- Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress- Ken Thompson: Inventor of UNIX- Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hackerWhat you’ll learn:How the best programmers in the world do their jobWho is this book for?Programmers interested in the point of view of leaders in the field. Programmers looking for approaches that work for some of these outstanding programmers.

How To Build Your Successful Online Teaching Business (Online Entrepreneurship Book 1)


Vladimir Raykov - 2016
     Do you want to turn your passion into passive income streams? Yes, you can get paid and do, teach what you love! Do you want to build an online teaching business with little to no investment up front? Do you want to become an entrepreneur? Do you want to work from home? If you’ve answered “yes” to even one of these questions then reading this eBook may turn out to be the best decision you’ve made this year!The ultimate purpose of this training (eBook, PDF files, 3 in-depth video sessions) is to teach you how to create products for your online teaching in a form of video courses. Howdy,My name is Vladimir Raykov.I’m a best-selling online instructor teaching over 12000 students and 20 online courses. I’m also the creator of STEP-BY-STEP TO YOUR FIRST 1000 STUDENTS program. During the last year, I’ve been gathering the best techniques for creating an online course and I’ve put them into this free training that is intended especially for beginners. I will completely reveal the exact 3-Step System for producing high-quality courses that I used to reach 5 figures for my online teaching business, doing it part-time and without spending money on advertising.HERE IS JUST A FRACTION OF WHAT YOU WILL LEARN FROM MY EBOOK AND FREE VIDEO TRAINING• Top 7 reasons why you should create an online course that generates income.• Top 7 (costly) mistakes beginner online instructors make and how to avoid them.• The 3-Step System for producing online courses with the velocity of light.• The top 4 mega-niches which are responsible for over 80% of the revenue generated by online instructors.• How to structure and organize your course. More specifically, how to make an outline for your course and the most effective internal structure of ALL your lectures.• All the tools (software) you will need to create products for your online teaching business of an utmost quality.• 6 Steps of a lecture creation.• The exact technical specifications for your video lectures.• The microphone I use to record crystal clear audio files.• How to get a professionally designed thumbnail for your course for free.• How to write a winning title for your course – basic copywriting skills part 1.• How to write a winning description for your course – basic copywriting skills part 2.• The best platforms to launch your course as a self-published instructor and their business models. • And much, much more!THE BEST PART• You don’t need to have a website.• You don’t have to pay for advertising.• You don’t have to FILM yourself. • You don’t have to be a technical savvy.• You don’t have to worry about video hosting. • You don’t have to have a higher academic degree.

Understanding Air France 447


Bill Palmer - 2013
    Written by A330 Captain, Bill Palmer, this book opens to understanding the actions of the crew, how they failed to understand and control the problem, and how the airplane works and the part it played. All in easy to understand terms.Addressed are the many contributing aspects of weather, human factors, and airplane system operation and design that the crew could not recover from. How each contributed is covered in detail along with what has been done, and needs to be done in the future to prevent this from happening again.Also see the book's companion website: UnderstandingAF447.com for supplemental materials referred to in the book or to contact the author.

Code Complete


Steve McConnell - 1993
    Now this classic book has been fully updated and revised with leading-edge practices--and hundreds of new code samples--illustrating the art and science of software construction. Capturing the body of knowledge available from research, academia, and everyday commercial practice, McConnell synthesizes the most effective techniques and must-know principles into clear, pragmatic guidance. No matter what your experience level, development environment, or project size, this book will inform and stimulate your thinking--and help you build the highest quality code. Discover the timeless techniques and strategies that help you: Design for minimum complexity and maximum creativity Reap the benefits of collaborative development Apply defensive programming techniques to reduce and flush out errors Exploit opportunities to refactor--or evolve--code, and do it safely Use construction practices that are right-weight for your project Debug problems quickly and effectively Resolve critical construction issues early and correctly Build quality into the beginning, middle, and end of your project

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World


Bruce Schneier - 2015
    Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Googled: The End of the World as We Know It


Ken Auletta - 2009
    This is a ride on the Google wave, and the fullest account of how it formed and crashed into traditional media businesses. With unprecedented access to Google's founders and executives, as well as to those in media who are struggling to keep their heads above water, Ken Auletta reveals how the industry is being disrupted and redefined.Auletta goes inside Google's closed-door meetings, introducing Google's notoriously private founders, Larry Page and Sergey Brin, as well as those who work with - and against - them. In Googled, the reader discovers the 'secret sauce' of the company's success and why the worlds of 'new' and 'old' media often communicate as if residents of different planets. It may send chills down traditionalists' spines, but it's a crucial roadmap to the future of media business: the Google story may well be the canary in the coal mine.Googled is candid, objective and authoritative. Crucially, it's not just a history or reportage: it's ahead of the curve and unlike any other Google books, which tend to have been near-histories, somewhat starstruck, now out of date or which fail to look at the full synthesis of business and technology.

Ninety Percent of Everything: Inside Shipping, the Invisible Industry That Puts Clothes on Your Back, Gas in Your Car, and Food on Your Plate


Rose George - 2013
    Each dot is a ship; each ship is laden with boxes; each box is laden with goods. In postindustrial economies, we no longer produce but buy. We buy, so we must ship. Without shipping there would be no clothes, food, paper, or fuel. Without all those dots, the world would not work.Freight shipping has been no less revolutionary than the printing press or the Internet, yet it is all but invisible. Away from public scrutiny, shipping revels in suspect practices, dubious operators, and a shady system of "flags of convenience." Infesting our waters, poisoning our air, and a prime culprit of acoustic pollution, shipping is environmentally indefensible. And then there are the pirates.Rose George, acclaimed chronicler of what we would rather ignore, sails from Rotterdam to Suez to Singapore on ships the length of football fields and the height of Niagara Falls; she patrols the Indian Ocean with an anti-piracy task force; she joins seafaring chaplains, and investigates the harm that ships inflict on endangered whales.Sharply informative and entertaining, Ninety Percent of Everything reveals the workings and perils of an unseen world that holds the key to our economy, our environment, and our very civilization.

Technopoly: The Surrender of Culture to Technology


Neil Postman - 1992
    In this witty, often terrifying work of cultural criticism, the author of Amusing Ourselves to Death chronicles our transformation into a Technopoly: a society that no longer merely uses technology as a support system but instead is shaped by it--with radical consequences for the meanings of politics, art, education, intelligence, and truth.

The Cluetrain Manifesto


Rick Levine - 2000
    A rich tapestry of anecdotes, object lessons, parodies, insights, and predictions, The Cluetrain Manifesto illustrates how the Internet has radically reframed the seemingly immutable laws of business--and what business needs to know to weather the seismic aftershocks.

Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World


Don Tapscott - 2016
    But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.In Blockchain Revolution, Don and Alex Tapscott reveal how this game-changing technology will shape the future of the world economy, dramatically improving everything from healthcare records to online voting, and from insurance claims to artist royalty payments. Brilliantly researched and highly accessible, this is the essential text on the next major paradigm shift. Read it, or be left behind.

The Little Elixir & OTP Guidebook


Benjamin Tan Wei Hao - 2015
    It combines the productivity and expressivity of Ruby with the concurrency and fault-tolerance of Erlang. Elixir makes full use of Erlang's powerful OTP library, which many developers consider the source of Erlang's greatness, so you can have mature, professional-quality functionality right out of the gate. Elixir's support for functional programming makes it a great choice for highly distributed event-driven applications like IoT systems.The Little Elixir & OTP Guidebook gets you started programming applications with Elixir and OTP. You begin with a quick overview of the Elixir language syntax, along with just enough functional programming to use it effectively. Then, you'll dive straight into OTP and learn how it helps you build scalable, fault-tolerant and distributed applications through several fun examples. Come rediscover the joy of programming with Elixir and remember how it feels like to be a beginner again.

Are You Smart Enough to Work at Google?


William Poundstone - 2012
    The blades start moving in 60 seconds. What do you do? If you want to work at Google, or any of America's best companies, you need to have an answer to this and other puzzling questions. Are You Smart Enough to Work at Google? guides readers through the surprising solutions to dozens of the most challenging interview questions. The book covers the importance of creative thinking, ways to get a leg up on the competition, what your Facebook page says about you, and much more. Are You Smart Enough to Work at Google? is a must-read for anyone who wants to succeed in today's job market.

The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power


Shoshana Zuboff - 2018
    The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification."The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit--at the expense of democracy, freedom, and our human future.With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future--if we let it.Table of contentsINTRODUCTION1. Home or exile in the digital futureI. THE FOUNDATIONS OF SURVEILLANCE CAPITALISM2. August 9, 2011: Setting the stage for Surveillance Capitalism3. The discovery of behavioral surplus4. The moat around the castle5. The elaboration of Surveillance Capitalism: Kidnap, corner, compete6. Hijacked: The division of learning in societyII. THE ADVANCE OF SURVEILLANCE CAPITALISM7. The reality business8. Rendition: From experience to data9. Rendition from the depths10. Make them dance11. The right to the future tenseIII. INSTRUMENTARIAN POWER FOR A THIRD MODERNITY12. Two species of power13. Big Other and the rise of instrumentarian power14. A utopia of certainty15, The instrumentarian collective16. Of life in the hive17. The right to sanctuaryCONCLUSION18. A coup from aboveAcknowledgementsAbout the authorDetailed table of contentsNotesIndex