IBM and the Holocaust


Edwin Black - 1999
    As the 3rd Reich embarked upon its plan of conquest & genocide, IBM & its subsidiaries helped create enabling technologies, step-by-step, from the identification & cataloging programs of the 30s to the selections of the 40s. Only after Jews were identified--a massively complex task Hitler wanted done immediately--could they be targeted for efficient asset confiscation, ghettoization, deportation, enslaved labor & annihilation. It was a cross-tabulation & organizational challenge so monumental, it called for a computer. Of course, in the 30s no computer existed. But IBM's Hollerith punch card technology did exist. Aided by the company's custom-designed & constantly updated Hollerith systems, Hitler was able to automate the persecution of the Jews.Historians were amazed at the speed & accuracy with which the Nazis were able to identify & locate European Jewry. Until now, the pieces of this puzzle have never been fully assembled. The fact is, IBM technology was used to organize nearly everything in Germany & then Nazi Europe, from the identification of the Jews in censuses, registrations & ancestral tracing programs to the running of railroads & organizing of concentration camp slave labor. IBM & its German subsidiary custom-designed complex solutions, anticipating the Reich's needs. They didn't merely sell the machines & walk away. Instead, IBM leased these machines for high fees & became the sole source of the billions of punch cards needed. IBM & the Holocaust details the carefully crafted corporate collusion with the 3rd Reich, as well as the structured deniability of oral agreements, undated letters & the Geneva intermediaries--all undertaken as the newspapers blazed with accounts of persecution & destruction. Just as compelling is the human drama of one of our century's greatest minds, IBM founder Thomas Watson, who cooperated with the Nazis for the sake of profit. Only with IBM's technologic assistance was Hitler able to achieve the staggering numbers of the Holocaust. Edwin Black has now uncovered one of the last great mysteries of Germany's war against the Jews: how Hitler got the names.

Growing Object-Oriented Software, Guided by Tests


Steve Freeman - 2009
    This one's a keeper." --Robert C. Martin "If you want to be an expert in the state of the art in TDD, you need to understand the ideas in this book."--Michael Feathers Test-Driven Development (TDD) is now an established technique for delivering better software faster. TDD is based on a simple idea: Write tests for your code before you write the code itself. However, this simple idea takes skill and judgment to do well. Now there's a practical guide to TDD that takes you beyond the basic concepts. Drawing on a decade of experience building real-world systems, two TDD pioneers show how to let tests guide your development and "grow" software that is coherent, reliable, and maintainable. Steve Freeman and Nat Pryce describe the processes they use, the design principles they strive to achieve, and some of the tools that help them get the job done. Through an extended worked example, you'll learn how TDD works at multiple levels, using tests to drive the features and the object-oriented structure of the code, and using Mock Objects to discover and then describe relationships between objects. Along the way, the book systematically addresses challenges that development teams encounter with TDD--from integrating TDD into your processes to testing your most difficult features. Coverage includes - Implementing TDD effectively: getting started, and maintaining your momentum throughout the project - Creating cleaner, more expressive, more sustainable code - Using tests to stay relentlessly focused on sustaining quality - Understanding how TDD, Mock Objects, and Object-Oriented Design come together in the context of a real software development project - Using Mock Objects to guide object-oriented designs - Succeeding where TDD is difficult: managing complex test data, and testing persistence and concurrency

Hello, Startup: A Programmer's Guide to Building Products, Technologies, and Teams


Yevgeniy Brikman - 2015
    We are in the era of the high tech startup.This book is the "Hello, World" tutorial for building products, technologies, and teams in a startup environment. It's based on the experiences of the author, Yevgeniy Brikman, as well as interviews with programmers from some of the most successful startups of the last decade, including Google, Facebook, LinkedIn, Twitter, GitHub, Stripe, Instagram, AdMob, Pinterest, and many others.If you're at all interested in startups—whether you're a programmer at the beginning of your career, a seasoned developer bored with the politics of large companies, a manager trying to figure out how to motivate your engineers, or just someone trying to figure out what this startup thing is all about—this book is for you. For more info, see http: //www.hello-startup.net"

Modern C++ Programming with Test-Driven Development: Code Better, Sleep Better


Jeff Langr - 2013
    Test-driven development (TDD) is a modern software development practice that can dramatically reduce the number of defects in systems, produce more maintainable code, and give you the confidence to change your software to meet changing needs. But C++ programmers have been ignored by those promoting TDD--until now. In this book, Jeff Langr gives you hands-on lessons in the challenges and rewards of doing TDD in C++.Modern C++ Programming With Test-Driven Development, the only comprehensive treatment on TDD in C++ provides you with everything you need to know about TDD, and the challenges and benefits of implementing it in your C++ systems. Its many detailed code examples take you step-by-step from TDD basics to advanced concepts. As a veteran C++ programmer, you're already writing high-quality code, and you work hard to maintain code quality. It doesn't have to be that hard. In this book, you'll learn: how to use TDD to improve legacy C++ systems how to identify and deal with troublesome system dependencies how to do dependency injection, which is particularly tricky in C++ how to use testing tools for C++ that aid TDD new C++11 features that facilitate TDD As you grow in TDD mastery, you'll discover how to keep a massive C++ system from becoming a design mess over time, as well as particular C++ trouble spots to avoid. You'll find out how to prevent your tests from being a maintenance burden and how to think in TDD without giving up your hard-won C++ skills. Finally, you'll see how to grow and sustain TDD in your team. Whether you're a complete unit-testing novice or an experienced tester, this book will lead you to mastery of test-driven development in C++.What You Need A C++ compiler running under Windows or Linux, preferably one that supports C++11. Examples presented in the book were built under gcc 4.7.2. Google Mock 1.6 (downloadable for free; it contains Google Test as well) or an alternate C++ unit testing tool. Most examples in the book are written for Google Mock, but it isn't difficult to translate them to your tool of choice. A good programmer's editor or IDE. cmake, preferably. Of course, you can use your own preferred make too. CMakeLists.txt files are provided for each project. Examples provided were built using cmake version 2.8.9. Various freely-available third-party libraries are used as the basis for examples in the book. These include: - cURL - JsonCpp - Boost (filesystem, date_time/gregorian, algorithm, assign) Several examples use the boost headers/libraries. Only one example uses cURL and JsonCpp.

Steal This Computer Book 4.0 – What They Won′t Tell You About the Internet 4e


Wallace Wang - 2006
    It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances. Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected. He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work. Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hack

The Gold Bat


P.G. Wodehouse - 1904
    Letters appeared in every second number of the Wrykinian, some short, others long, some from members of the school, others from Old Boys, all protesting against the condition of the first, second, and third fifteen dressing-rooms. 'Indignant" would inquire acidly, in half a page of small type, if the editor happened to be aware that there was no hair-brush in the second room, and only half a comb. 'Disgusted O. W." would remark that when he came down with the Wandering Zephyrs to play against the third fifteen, the water supply had suddenly and mysteriously failed, and the W.Z.'s had been obliged to go home as they were, in a state of primeval grime, and he thought that this was 'a very bad thing in a school of over six hundred boys," though what the number of boys had to do with the fact that there was no water he omitted to explain. The editor would express his regret in brackets, and things would go on as before.

The Ultimate Guide to Video Game Writing and Design


Flint Dille - 2006
    Sure, they cover the basics. But The Ultimate Guide to Video Game Writing and Design goes way beyond the basics. The authors, top game designers, focus on creating games that are an involving, emotional experience for the gamer. Topics include integrating story into the game, writing the game script, putting together the game bible, creating the design document, and working on original intellectual property versus working with licenses. Finally, there’s complete information on how to present a visionary new idea to developers and publishers. Got game? Get The Ultimate Guide to Video Game Writing and Design.

Nerds 2.0.1


Stephen Segaller - 1998
    By building a network of computers, he believed the government could avoid buying so many new ones for academic research. From these modest Cold War beginnings a global networking industry has flourished, creating virtual communities, online shopping, the ubiquitous e-mail, and immense fortunes. Stephen Segaller's timely book draws on interviews with more than seventy of the pioneers who have used their technological genius and business skills to make incompatible systems work together, to make networking user-friendly, and to create a new global communications medium that rivals the telephone system or television in its scope and reach.Nerds 2.0.1 tells the dramatic, often comical story of how the world's computers have come to be wired together over the last thirty years. This paperback reprint contains new material to update the picture of this still-evolving saga.

Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World


Don Tapscott - 2016
    But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.In Blockchain Revolution, Don and Alex Tapscott reveal how this game-changing technology will shape the future of the world economy, dramatically improving everything from healthcare records to online voting, and from insurance claims to artist royalty payments. Brilliantly researched and highly accessible, this is the essential text on the next major paradigm shift. Read it, or be left behind.

Perfect Software--And Other Illusions about Testing


Gerald M. Weinberg - 2008
    Editorial Reviews - Perfect Software

Dusty Warriors: Modern Soldiers at War


Richard Holmes - 2006
    Embroiled in a conflict often too dangerous for reporters to cover, these soldiers – most of them young, many without any previous experience of warfare – have kept ongoing records of the drudgery, anxiety and horror involved in fighting a violent and increasingly unpopular war against a ruthless and resourceful enemy. All have risked their lives, and many have died. Others have been recognised and awarded for their courage, resourcefulness and gallantry – Private Johnson Beharry recently became the first man to be awarded the Victoria Cross in twenty-three years.With these intimate and revealing glimpses of life in the modern army, Richard Holmes paints a sweeping portrait of a new generation of soldiers – grunts, gallants and heroes – and the sacrifices their decision to fight for their country entails.

Speccy Nation


Dan Whitehead - 2012
    The British games industry would go on to create such hits as Tomb Raider and Grand Theft Auto, our innovation and imagination the envy of the world, our programmers the most sought after talent in the fastest growing entertainment medium in history.And it all started here.Welcome to the Speccy Nation.Join veteran games journalist and author Dan Whitehead on a journey through fifty games that helped to define the golden age of British gaming. From the timeless classics to unlikely cult favourites, and even the games so eccentric they could only have come from Britain in the 1980s.Part nostalgic look at the past, and part critical eye on the present and future, Speccy Nation is essential reading for all retro gaming enthusiasts.Includes a foreword by Your Sinclair's Phil "Snouty" South.

Zero Bugs and Program Faster


Kate Thompson - 2016
     The author spent two years researching every bug avoidance technique she could find. This book contains the best of them. If you want to program faster, with fewer bugs, and write more secure code, buy this book!

Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age


Steven Levy - 2001
    From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.

Let Over Lambda


Doug Hoyte - 2008
    Starting with the fundamentals, it describes the most advanced features of the most advanced language: Common Lisp. Only the top percentile of programmers use lisp and if you can understand this book you are in the top percentile of lisp programmers. If you are looking for a dry coding manual that re-hashes common-sense techniques in whatever langue du jour, this book is not for you. This book is about pushing the boundaries of what we know about programming. While this book teaches useful skills that can help solve your programming problems today and now, it has also been designed to be entertaining and inspiring. If you have ever wondered what lisp or even programming itself is really about, this is the book you have been looking for.