Book picks similar to
Masterplanning the Adaptive City: Computational Urbanism in the Twenty-First Century by Tom Verebes
thesis-super-relevant
cities
complexity
it-wikipedia
Start-Up City: Inspiring Private and Public Entrepreneurship, Getting Projects Done, and Having Fun
Gabe Klein - 2015
Sleek, legible mobility platforms are connecting people to cars, trains, buses, and bikes as never before, opening up a range of new transportation options while improving existing ones. While many large city governments, such as Chicago, New York, and Washington, D.C., have begun to embrace creative forms and processes of government, most still operate under the weight of an unwieldy, risk-averse bureaucracy.With the advent of self-driving vehicles and other technological shifts upon us, Gabe Klein asks how we can close the gap between the energized, aggressive world of start-ups and the complex bureaucracies struggling to change beyond a geologic time scale. From his experience as a food-truck entrepreneur to a ZipCar executive and a city transportation commissioner, Klein’s career has focused on bridging the public-private divide, finding and celebrating shared goals, and forging better cities with more nimble, consumer-oriented bureaucracies.In Start-Up City, Klein, with David Vega-Barachowitz, demonstrates how to affect big, directional change in cities—and how to do it fast. Klein's objective is to inspire what he calls “public entrepreneurship,” a start-up-pace energy within the public sector, brought about by leveraging the immense resources at its disposal. Klein offers guidance for cutting through the morass, and a roadmap for getting real, meaningful projects done quickly and having fun while doing it.This book is for anyone who wants to change the way we live in cities without waiting for the glacial pace of change in government.
Constantinople: Capital of Byzantium
Jonathan Harris - 2007
It was an article of faith that a saintly emperor, divinely appointed, had founded Constantinople and that the city was as holy as Rome or Jerusalem. The Byzantine emperors assiduously promoted the notion of a spiritual aura around the city. Thus, in 917, the emperor's regent wrote to the khan of the Bulgars warning him not to attack Constantinople. He did not threaten the khan with military force, but with the Virgin Mary who, as 'commander in chief of the city', would not take kindly to any assault. It was with legends and beliefs like this that the emperors bolstered their power and wealth, and the myth was central to the success of Constantinople and its empire for over a thousand years. Although this is hardly the first history of Byzantium to be published, Jonathan Harris differentiates himself by offering keen insight into the spiritual and mythic dimensions of Constantinople, key elements of the city's history that have neglected until now. Constantinople: Capital of Byzantine is the first history of this great empire to properly examine the intriguing interaction between the spiritual and the political, the mythical and the actual. The result is an accessible and engaging account of a colorful and vital time in human history, and a long overdue look at an awe-inspiring city in its heyday.
A History of London
Stephen Inwood - 1998
From its beginnings as a foreign outpost on the banks of the Thames in the first century to, in the twenty-first, the teeming metropolitan sprawl of an extraordinarily cosmopolitan world capital, London has been shaped by successive waves of migration into a marvelous polyglot of a city. The history of London may indeed be a history of printing, the theater, newspapers, museums, pleasure gardens, music halls, international finance, and the novel, but for Stephen Inwood it is a history of the people whose tastes, talents, philosophies, and pocketbooks have created it -- and sometimes threatened to destroy it.
Keith Richards: In His Own Words
Keith Richards - 1994
Rhythm guitarist with The Rolling Stones for over 30 years, he is also famous in his own right as a solo artist.
Ebook: Design Thinking (Innovation Trends Series)
BBVA Innovation Center - 2015
In this issue you will find out all there is to be known about Design Thinking, the different and creative approach to businesses everyday challenges.
Grumby
Andy Kessler - 2010
In this comic novel a band of hacker-geeks load state-of-the-art artificial intelligence, including working eyes, ears, spy software, and a smart mouth, into a bunch of old Furby dolls, re-christened Grumbies, network them together, sell millions, become rich and famous and make enemies/allies of Mossad, the CIA, Google, Microsoft, IRS, Goldman Sachs, the guys from Google, and Steve Jobs.
Over The Top: How The Internet Is (Slowly But Surely) Changing The Television Industry
Alan Wolk - 2015
Given the intricacies of the industry, it's also going to be the most resistant to change. Alan Wolk, an industry veteran and longtime analyst and observer, lays out how the television industry is adapting to the digital era, explaining what's really happening in a tone that will appeal to laypeople and insiders alike. In the first section, Wolk takes us through how the industry works today, focusing on how the various players actually make money and who pays who for what. The next section deals with the changes that are taking place in the industry today–everything from time shifting to binge viewing to cord cutting–and how those changes are starting to create some seismic shifts. In the final section, Wolk reveals his predictions for the future and what the industry will look like in ten years time. Andrew Wallenstein, co-editor-in-chief of Variety says "Alan Wolk is one of the most insightful observers writing about the media business today. There's no better expert to help you navigate the confusing, complicated nexus of TV and the Internet." David Zaslav, President and CEO of Discovery Communications says "Alan Wolk has a deep understanding of the complex nature of television today… this is a fantastic primer of the business and one of the most educated perspectives on the future of our rapidly evolving industry."
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier - 2000
Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.
1001 Video Games You Must Play Before You Die
Tony MottMitch Krpata - 2010
The video game has arrived as entertainment and as an art form. This is the first serious critical evaluation ever published of the best video games and is a testament to the medium’s innovativeness and increasing emphasis on aesthetics. Organized chronologically and for all platforms (PC, Xbox, PlayStation, etc.) and covering all genres from the bold (Grand Theft Auto and Halo) and dark (Resident Evil and Silent Hill) to the spiritual (Final Fantasy) and whimsical (Legend of Zelda), the book traces the video game from the rough early days of Pong to the latest visual fantasia.
Dragonlance Dragons of Winter (Dragonlance)
Clark Valentine - 2007
introduced some revolutionary concepts in the game industry. Never before had the D&D rules been used to tell an epic fantasy tale using full-realized pre-generated characters. It was also the first time that roleplaying adventures would match a story being told in fantasy novels on mass-market shelves. Since MWP began publishing DRAGONLANCE game produts for the revised d20 System, the most often-asked question from fans is "When do we get to see the original modules?" By popular demand, we are presenting all-new versions of the classic adventures. The second in the trilogy, Dragons of Winter, continues the epic War of the Lance. The heroes visit the haunted forests of Silvanesti, the landlocked port city of Tarsis, and the mighty stronghold known as the High Clerist's Tower. The adventures are being completely revised, drawing on twenty years of DRAGONLANCE history, incorporating material most recently featured in the Silver Anniversary edition of the adventures. They will include new character statistics featuring the popular Heroes of the Lance.
Introducing Windows Azure for IT Professionals
Mitch Tulloch - 2013
It is offered for sale in print format as a convenience.Get a head start evaluating Windows Azure - with technical insights from a Microsoft MVP Mitch Tulloch. This guide introduces the latest features and capabilities, with scenario-based advice on how the platform can meet the needs of your business. Get the high-level overview you need to begin preparing your deployment now.Topics include: Understanding Windows Azure Windows Azure Compute Services Windows Azure Network Services Windows Azure Data Services Windows Azure App Services Getting Started with Windows Azure
Social Physics: How Good Ideas Spread— The Lessons from a New Science
Alex Pentland - 2014
Over years of groundbreaking experiments, he has distilled remarkable discoveries significant enough to become the bedrock of a whole new scientific field: social physics. Humans have more in common with bees than we like to admit: We’re social creatures first and foremost. Our most important habits of action—and most basic notions of common sense—are wired into us through our coordination in social groups. Social physics is about idea flow, the way human social networks spread ideas and transform those ideas into behaviors. Thanks to the millions of digital bread crumbs people leave behind via smartphones, GPS devices, and the Internet, the amount of new information we have about human activity is truly profound. Until now, sociologists have depended on limited data sets and surveys that tell us how people say they think and behave, rather than what they actually do. As a result, we’ve been stuck with the same stale social structures—classes, markets—and a focus on individual actors, data snapshots, and steady states. Pentland shows that, in fact, humans respond much more powerfully to social incentives that involve rewarding others and strengthening the ties that bind than incentives that involve only their own economic self-interest. Pentland and his teams have found that they can study patterns of information exchange in a social network without any knowledge of the actual content of the information and predict with stunning accuracy how productive and effective that network is, whether it’s a business or an entire city. We can maximize a group’s collective intelligence to improve performance and use social incentives to create new organizations and guide them through disruptive change in a way that maximizes the good. At every level of interaction, from small groups to large cities, social networks can be tuned to increase exploration and engagement, thus vastly improving idea flow. Social Physics will change the way we think about how we learn and how our social groups work—and can be made to work better, at every level of society. Pentland leads readers to the edge of the most important revolution in the study of social behavior in a generation, an entirely new way to look at life itself.
Documents on the Rape of Nanking
Timothy Brook - 1999
What ended in one atrocity began with another: the savage military takeover of China's capital city, which quickly became known as the Rape of Nanking. The Japanese Army's conduct from December 1937 to February 1938 constitutes one of the most barbarous events not just of the war but of the century. The violence was documented at the time and then redocumented during the war crimes trial in Tokyo after the war. This book brings together materials from both moments to provide the first comprehensive dossier of primary sources on the Rape.Part 1, "The Records," includes two sources written as the Rape was underway. The first is a long set of documents produced by the International Committee for the Nanking Safety Zone, a group of foreigners who strove to protect the Chinese residents. The second is a series of letters that American surgeon Dr. Robert Wilson wrote for his family during the same period. These letters are published here for the first time.The evidence compiled by the International Committee and its members would be decisive for the indictments against Japanese leaders at the International Military Tribunal for the Far East in Tokyo. Part 2, "The Judgments," reprints portions of the tribunal's 1948 judgment dealing with the Rape of Nanking, its judicial consequences, and sections of the dissenting judgment of Justice Radhabinod Pal.These contemporary records and judgments create an intimate firsthand account of the Rape of Nanking. Together they are intended to stimulate deeper reflection than previously possible on how and why we assess and assign the burden of war guilt.Timothy Brook is Professor of Chinese History and Associate Director of the Joint Centre for Asia Pacific Studies, University of Toronto, and is coeditor of Nation Work: Asian Elites and National Identities and Cultureand Economy: The Shaping of Capitalism in Eastern Asia, both published by the University of Michigan Press.
Radiohead: Hysterical and Useless
Martin Clarke - 1999
Starting with the band's origins in Oxford, journalist Martin Clarke covers the essential points: Radiohead's breakout single "Creep," the pivotal album OK Computer, Thom Yorke's continuing political and artistic evolution, and the band's future. This revised edition includes a close look at how the band escaped the rock straightjacket with Kid A and Amnesiac , as well as their most recent album, Hail to the Thief . Clark also offers an in-depth examination of the outspoken, mysterious Yorke, offering insight into the personal demons the vocalist has battled throughout his career as Radiohead's frontman. An incisive look at one of the world's most beloved, followed musical acts, Radiohead: Hysterical and Useless provides stimulating coverage of a provocative group.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks