Book picks similar to
The Cult of Mac by Leander Kahney


apple
non-fiction
technology
nonfiction

The Industries of the Future


Alec J. Ross - 2016
    In the next ten years, change will happen even faster. As Hillary Clinton's Senior Advisor for Innovation, Alec Ross travelled nearly a million miles to forty-one countries, the equivalent of two round-trips to the moon. From refugee camps in the Congo and Syrian war zones, to visiting the world's most powerful people in business and government, Ross's travels amounted to a four-year masterclass in the changing nature of innovation. In The Industries of the Future, Ross distils his observations on the forces that are changing the world. He highlights the best opportunities for progress and explains how countries thrive or sputter. Ross examines the specific fields that will most shape our economic future over the next ten years, including robotics, artificial intelligence, the commercialization of genomics, cybercrime and the impact of digital technology. Blending storytelling and economic analysis, he answers questions on how we will need to adapt. Ross gives readers a vivid and informed perspective on how sweeping global trends are affecting the ways we live, now and tomorrow.

Hit Makers: The Science of Popularity in an Age of Distraction


Derek Thompson - 2017
    Each blockbuster has a secret history--of power, influence, dark broadcasters, and passionate cults that turn some new products into cultural phenomena. Even the most brilliant ideas wither in obscurity if they fail to connect with the right network, and the consumers that matter most aren't the early adopters, but rather their friends, followers, and imitators -- the audience of your audience.In his groundbreaking investigation, Atlantic senior editor Derek Thompson uncovers the hidden psychology of why we like what we like and reveals the economics of cultural markets that invisibly shape our lives. Shattering the sentimental myths of hit-making that dominate pop culture and business, Thompson shows quality is insufficient for success, nobody has "good taste," and some of the most popular products in history were one bad break away from utter failure. It may be a new world, but there are some enduring truths to what audiences and consumers want. People love a familiar surprise: a product that is bold, yet sneakily recognizable.Every business, every artist, every person looking to promote themselves and their work wants to know what makes some works so successful while others disappear. Hit Makers is a magical mystery tour through the last century of pop culture blockbusters and the most valuable currency of the twenty-first century--people's attention.From the dawn of impressionist art to the future of Facebook, from small Etsy designers to the origin of Star Wars, Derek Thompson leaves no pet rock unturned to tell the fascinating story of how culture happens and why things become popular.In Hit Makers, Derek Thompson investigates: - The secret link between ESPN's sticky programming and the The Weeknd's catchy choruses - Why Facebook is the world's most important modern newspaper - How advertising critics predicted Donald Trump - The 5th grader who accidentally launched "Rock Around the Clock," the biggest hit in rock and roll history - How Barack Obama and his speechwriters think of themselves as songwriters - How Disney conquered the world--but the future of hits belongs to savvy amateurs and individuals - The French collector who accidentally created the Impressionist canon - Quantitative evidence that the biggest music hits aren't always the best - Why almost all Hollywood blockbusters are sequels, reboots, and adaptations - Why one year--1991--is responsible for the way pop music sounds today - Why another year --1932--created the business model of film - How data scientists proved that "going viral" is a myth - How 19th century immigration patterns explain the most heard song in the Western Hemisphere

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage


Clifford Stoll - 1989
    citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Show Stopper!: The Breakneck Race to Create Windows NT and the Next Generation at Microsoft


G. Pascal Zachary - 1994
    Describes the five-year, 150 million dollar project Microsoft undertook to develop an advanced PC operating system.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Soonish: Ten Emerging Technologies That'll Improve and/or Ruin Everything


Kelly Weinersmith - 2017
    By weaving together their own research, interviews with pioneering scientists and Zach's trademark comics, the Weinersmiths investigate why these innovations are needed, how they would work, and what is standing in their way.

Trust Me, I'm Lying: Confessions of a Media Manipulator


Ryan Holiday - 2012
    A malicious online rumor costs a company millions. A political sideshow derails the national news cycle and destroys a candidate. Some product or celebrity zooms from total obscurity to viral sensation. What you don't know is that someone is responsible for all this. Usually, someone like me.I'm a media manipulator. In a world where blogs control and distort the news, my job is to control blogs--as much as any one person can. In today's culture... 1) Blogs like "Gawker," "Buzzfeed" and the "Huffington Post" drive the media agenda. 2) Bloggers are slaves to money, technology, and deadlines. 3) Manipulators wield these levers to shape everything you read, see and watch--online and off.Why am I giving away these secrets? Because I'm tired of a world where blogs take indirect bribes, marketers help write the news, reckless journalists spread lies, and no one is accountable for any of it. I'm pulling back the curtain because I don't want anyone else to get blindsided. I'm going to explain exactly how the media "really" works. What you choose to do with this information is up to you.

Head First Java


Kathy Sierra - 2005
    You might think the problem is your brain. It seems to have a mind of its own, a mind that doesn't always want to take in the dry, technical stuff you're forced to study. The fact is your brain craves novelty. It's constantly searching, scanning, waiting for something unusual to happen. After all, that's the way it was built to help you stay alive. It takes all the routine, ordinary, dull stuff and filters it to the background so it won't interfere with your brain's real work--recording things that matter. How does your brain know what matters? It's like the creators of the Head First approach say, suppose you're out for a hike and a tiger jumps in front of you, what happens in your brain? Neurons fire. Emotions crank up. Chemicals surge. That's how your brain knows.And that's how your brain will learn Java. Head First Java combines puzzles, strong visuals, mysteries, and soul-searching interviews with famous Java objects to engage you in many different ways. It's fast, it's fun, and it's effective. And, despite its playful appearance, Head First Java is serious stuff: a complete introduction to object-oriented programming and Java. You'll learn everything from the fundamentals to advanced topics, including threads, network sockets, and distributed programming with RMI. And the new. second edition focuses on Java 5.0, the latest version of the Java language and development platform. Because Java 5.0 is a major update to the platform, with deep, code-level changes, even more careful study and implementation is required. So learning the Head First way is more important than ever. If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. If you haven't, you're in for a treat. You'll see why people say it's unlike any other Java book you've ever read.By exploiting how your brain works, Head First Java compresses the time it takes to learn and retain--complex information. Its unique approach not only shows you what you need to know about Java syntax, it teaches you to think like a Java programmer. If you want to be bored, buy some other book. But if you want to understand Java, this book's for you.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

Artificial Intelligence: A Guide for Thinking Humans


Melanie Mitchell - 2019
    The award-winning author Melanie Mitchell, a leading computer scientist, now reveals AI’s turbulent history and the recent spate of apparent successes, grand hopes, and emerging fears surrounding it.In Artificial Intelligence, Mitchell turns to the most urgent questions concerning AI today: How intelligent—really—are the best AI programs? How do they work? What can they actually do, and when do they fail? How humanlike do we expect them to become, and how soon do we need to worry about them surpassing us? Along the way, she introduces the dominant models of modern AI and machine learning, describing cutting-edge AI programs, their human inventors, and the historical lines of thought underpinning recent achievements. She meets with fellow experts such as Douglas Hofstadter, the cognitive scientist and Pulitzer Prize–winning author of the modern classic Gödel, Escher, Bach, who explains why he is “terrified” about the future of AI. She explores the profound disconnect between the hype and the actual achievements in AI, providing a clear sense of what the field has accomplished and how much further it has to go.Interweaving stories about the science of AI and the people behind it, Artificial Intelligence brims with clear-sighted, captivating, and accessible accounts of the most interesting and provocative modern work in the field, flavored with Mitchell’s humor and personal observations. This frank, lively book is an indispensable guide to understanding today’s AI, its quest for “human-level” intelligence, and its impact on the future for us all.

Cryptography Engineering: Design Principles and Practical Applications


Niels Ferguson - 2010
    Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

The Victorian Internet


Tom Standage - 1998
    Generations of innovators tried and failed to develop speedier messaging devices. But in the mid-1800s, a few extraordinary pioneers at last succeeded. Their invention--the electric telegraph--shrank the world more quickly than ever before.A colorful tale of scientific discovery and technological cunning, The Victorian Internet tells the story of the telegraph's creation and remarkable impact, and of the visionaries, oddballs, and eccentrics who pioneered it. By 1865 telegraph cables spanned continents and oceans, revolutionizing the ways countries dealt with one another. The telegraph gave rise to creative business practices and new forms of crime. Romances blossomed over the wires. Secret codes were devised by some users, and cracked by others. The benefits of the network were relentlessly hyped by its advocates and dismissed by its skeptics. And attitudes toward everything from news gathering to war had to be completely rethought. The telegraph unleashed the greatest revolution in communications since the development of the printing press. Its saga offers many parallels to that of the Internet in our own time--and is a fascinating episode in the history of technology.

User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play


Cliff Kuang - 2019
    Spanning over a century of sweeping changes, from women's rights to the Great Depression to World War II to the rise of the digital era, this book unpacks the ways in which the world has been--and continues to be--remade according to the principles of the once-obscure discipline of user-experience design.In this essential text, Kuang and Fabricant map the hidden rules of the designed world and shed light on how those rules have caused our world to change--an underappreciated but essential history that's pieced together for the first time. Combining the expertise and insight of a leading journalist and a pioneering designer, User Friendly provides a definitive, thoughtful, and practical perspective on a topic that has rapidly gone from arcane to urgent to inescapable. In User Friendly, Kuang and Fabricant tell the whole story for the first time--and you'll never interact with technology the same way again.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race


Nicole Perlroth - 2021
    One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

The Apple Way


Jeffrey L. Cruikshank - 2005
    More than 10 million iPods have sold, putting Apple at the forefront of the digital music revolution. This book is filled with real-world examples of Apple's phenomenally successful management principles, and is written by the bestselling author of several Harvard Business School Press titles.