Book picks similar to
Implementing Elliptic Curve Cryptography by Michael Rosing
crypto
computing
cryptography
cryptography-and-encryption
Quantum Computing Since Democritus
Scott Aaronson - 2013
Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible to readers with scientific backgrounds, as well as students and researchers working in physics, computer science, mathematics and philosophy.
Writing Secure Code
Michael Howard - 2001
You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
Parmy Olson - 2012
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Joel on Software
Joel Spolsky - 2004
For years, Joel Spolsky has done exactly this at www.joelonsoftware.com. Now, for the first time, you can own a collection of the most important essays from his site in one book, with exclusive commentary and new insights from joel.
Salary Tutor: Learn the Salary Negotiation Secrets No One Ever Taught You
Jim Hopkinson - 2011
Using these ten steps, you will be able to confidently and effectively negotiate your salary. With helpful tips and questions throughout, this book gives readers the tools to conquer "the evil HR lady." While other books or websites might list a few standard bullet points on the subject from an expert in the HR field, Jim takes a "novel approach," weaving interesting stories, case studies, graphs, humor, and personal experience to make the topic come alive. The book also educates the reader on:Discovering the two simple - but vital - questions you need to answer for successHarnessing your social media network to gather valuable informationMastering successful FBI negotiation techniques to your advantageCreating a one-of-a-kind document to secure the highest salary rangeUsing Jim's "Right back at Ya" Method to regain control of an interview
Micro-Isv: From Vision to Reality
Bob Walsh - 2006
As for the latter, are you a programmer and curious about being your own boss? Where do you turn for information? Until now, online and traditional literature havent caught up with the reality of the post-dot com bust.Micro-ISV: From Vision to Reality explains what works and why in today's emerging micro-ISV sector. Currently, thousands of programmers build and deliver great solutions ISV-style, earning success and revenues much larger than you might guess. Written by and for micro-ISVs, with help from some of the leaders of the field, this book takes you beyond just daydreaming to running your own business. It thoroughly explores how it is indeed possible to launch and maintain a small and successful ISV business, and is an ideal read if you're interested in getting started.
21 Lessons: What I've Learned from Falling Down the Bitcoin Rabbit Hole
Gigi - 2020
Like many others, I feel like I have learned more in the last couple of years studying Bitcoin than I have during two decades of formal education. The following lessons are a distillation of what I’ve learned. First published as an article series titled “What I’ve Learned From Bitcoin,” what follows can be seen as a third edition of the original series. Like Bitcoin, these lessons aren’t a static thing. I plan to work on them periodically, releasing updated versions and additional material in the future.Bitcoin is an inexhaustible teacher, which is why I do not claim that these lessons are all-encompassing or complete. They are a reflection of my personal journey down the rabbit hole. There are many more lessons to be learned, and every person will learn something different from entering the world of Bitcoin. I hope that you will find these lessons useful and that the process of learning them by reading won’t be as arduous and painful as learning them firsthand.
Hadoop Explained
Aravind Shenoy - 2014
Hadoop allowed small and medium sized companies to store huge amounts of data on cheap commodity servers in racks. The introduction of Big Data has allowed businesses to make decisions based on quantifiable analysis. Hadoop is now implemented in major organizations such as Amazon, IBM, Cloudera, and Dell to name a few. This book introduces you to Hadoop and to concepts such as ‘MapReduce’, ‘Rack Awareness’, ‘Yarn’ and ‘HDFS Federation’, which will help you get acquainted with the technology.
Algorithms to Live By: The Computer Science of Human Decisions
Brian Christian - 2016
What should we do, or leave undone, in a day or a lifetime? How much messiness should we accept? What balance of new activities and familiar favorites is the most fulfilling? These may seem like uniquely human quandaries, but they are not: computers, too, face the same constraints, so computer scientists have been grappling with their version of such issues for decades. And the solutions they've found have much to teach us.In a dazzlingly interdisciplinary work, acclaimed author Brian Christian and cognitive scientist Tom Griffiths show how the algorithms used by computers can also untangle very human questions. They explain how to have better hunches and when to leave things to chance, how to deal with overwhelming choices and how best to connect with others. From finding a spouse to finding a parking spot, from organizing one's inbox to understanding the workings of memory, Algorithms to Live By transforms the wisdom of computer science into strategies for human living.
FIRE: How Fast, Inexpensive, Restrained, and Elegant Methods Ignite Innovation
Dan Ward - 2014
S. Air Force, Dan Ward explored these questions during tours of duty at military research laboratories, the Air Force Institute of Technology, an intelligence agency, the Pentagon and Afghanistan. The pattern he noticed revealed that the most successful project leaders in both the public and private sectors delivered top-shelf products with a skeleton crew, a shoestring budget, and a cannonball schedule. Excessive investment of time, money or complexity actually reduced innovation. He concluded the secret to innovation is to be fast, inexpensive, simple, and small.FIRE presents an entertaining and practical framework for pursuing rapid, frugal innovation. A story-filled blend of pop culture and engineering insight, FIRE has something for everyone: strategic concepts leaders can use as they cast a vision, actionable principles for managers as they make business decisions, and practical tools for workers as they design, build, assess and test new products. Plus, there's a funny story about buying a dishwasher.
Control Your Day: A New Approach to Email Management Using Microsoft Outlook and Getting Things Done
Jim McCullen - 2013
The system incorporates many of the productivity concepts made famous by David Allen in his book Getting Things Done (GTD). The author provides additional support through a website and Youtube videos. Download the book today to take back control of your Inbox.Note: the concepts in the book apply to Microsoft Outlook for Windows or Mac. They do not apply for outlook.com, but I am working on some workarounds to apply some of the concepts to the web version of Outlook.
Data Smart: Using Data Science to Transform Information into Insight
John W. Foreman - 2013
Major retailers are predicting everything from when their customers are pregnant to when they want a new pair of Chuck Taylors. It's a brave new world where seemingly meaningless data can be transformed into valuable insight to drive smart business decisions.But how does one exactly do data science? Do you have to hire one of these priests of the dark arts, the "data scientist," to extract this gold from your data? Nope.Data science is little more than using straight-forward steps to process raw data into actionable insight. And in Data Smart, author and data scientist John Foreman will show you how that's done within the familiar environment of a spreadsheet. Why a spreadsheet? It's comfortable! You get to look at the data every step of the way, building confidence as you learn the tricks of the trade. Plus, spreadsheets are a vendor-neutral place to learn data science without the hype. But don't let the Excel sheets fool you. This is a book for those serious about learning the analytic techniques, the math and the magic, behind big data.Each chapter will cover a different technique in a spreadsheet so you can follow along: - Mathematical optimization, including non-linear programming and genetic algorithms- Clustering via k-means, spherical k-means, and graph modularity- Data mining in graphs, such as outlier detection- Supervised AI through logistic regression, ensemble models, and bag-of-words models- Forecasting, seasonal adjustments, and prediction intervals through monte carlo simulation- Moving from spreadsheets into the R programming languageYou get your hands dirty as you work alongside John through each technique. But never fear, the topics are readily applicable and the author laces humor throughout. You'll even learn what a dead squirrel has to do with optimization modeling, which you no doubt are dying to know.
Station X: The Codebreakers of Bletchley Park
Michael Smith - 1998
This was to be 'Station X', the Allies' top-secret centre for deciphering enemy codes.Their task was to break the ingenious Enigma cypher used for German high-level communications. The settings for the Enigma machine changed continually and each day the German operators had 159 million million million different possibilities. Yet against all the odds this gifted group achieved the impossible, coping with even greater difficulties to break Shark, the U-Boat Enigma, and Fish, the cypher system used by Hitler to talk to his generals.'Sation X' is also the story of the people involved from leading codebreakers such as Alan Turing, father of the modern computer, to the female operators who intercepted the messages. Through interviews with surviving members of Bletchley Park, Michael Smith has discovered what life was like there. In this chaotic and isolated environment they found time for drama performances, music recitals, orchestras and love affairs.Not only did these people shorten the war by several years - they were essential to victory in the Atlantic and North Africa and to the masterminding of the D-Day landings - 'Station X' was also the birth place of the world's first programmable computer and the successful Anglo-American intelligence partnership.
Lead... for God's Sake!: A Parable for Finding the Heart of Leadership
Todd G. Gongwer - 2010
If you have ever asked yourself why you do what you do, or wondered what your purpose is in leadership or in life, this book is for you. As the lives of a coach, a CEO, and a janitor intersect in this captivating parable you will journey deep into the heart of leadership where the answers to many of life's most important questions can be found.Whether you're leading in business, sports, or in your own family, this inspiring story will show you how to take the first - and most important - step in becoming the leader you were meant to be. Lead for God's Sake truly is much more than a simple statement. It's a calling!"Seldom have I found this kind of practical wisdom presented in such a delightful, engaging and compelling narrative. As a business leader, I found its "takeaways" right on targettouching life where the rubber meets the road. I wasn't able to put it down. It's that good!"John D. Beckett,
Why Did the Policeman Cross the Road?: How to Solve Problems Before They Arise
Stevyn Colgan - 2016
He’s one of the writers of the hugely successful BBC TV series QI andThe Museum of Curiosity. But, in a previous career, he spent 30 years as a police officer in London during which he became involved in a small but potent revolution. He and some of his colleagues realised that there was a smarter way to tackle crime and public concerns that didn’t always mean clogging the judicial system with copious arrests or flooding the streets with extra cops. This new style of intelligent problem-solving policing took the cleverest ideas from academic research, military strategy, business, marketing, public health and many other areas of work, mixed them all up with a good dollop of original thinking and solved problems that had previously been labelled as unsolvable.In this remarkable book, he tells the story of his work in Scotland Yard’s innovative Problem Solving Unit and how the team tackled some of London’s most persistent problems. Along the way, you’ll find out how dog shows stopped young men killing each other, how lollipops prevented night club closures, how wheelie bins worked in cahoots with burglars, and why celebrities should be covered in chewing gum. You’ll also discover how bird tables can prevent car crashes, how fake vomit can clean up the streets, and why sitting down in Japan may just result in a sore bottom.Why did the Policeman Cross the Road? is a celebration of original thinking, peppered with fascinating research and entertaining stories in the tradition of books such as Levitt and Dubner’s Freakonomics, Malcolm Gladwell’s The Tipping Point and Leonard Mlodinow’s The Drunkard’s Walk.And it’s more than possible that the book contains some little tool or technique that could help you solve some of the problems in your own life.