Introduction to Automata Theory, Languages, and Computation


John E. Hopcroft - 1979
    With this long-awaited revision, the authors continue to present the theory in a concise and straightforward manner, now with an eye out for the practical applications. They have revised this book to make it more accessible to today's students, including the addition of more material on writing proofs, more figures and pictures to convey ideas, side-boxes to highlight other interesting material, and a less formal writing style. Exercises at the end of each chapter, including some new, easier exercises, help readers confirm and enhance their understanding of the material. *NEW! Completely rewritten to be less formal, providing more accessibility to todays students. *NEW! Increased usage of figures and pictures to help convey ideas. *NEW! More detail and intuition provided for definitions and proofs. *NEW! Provides special side-boxes to present supplemental material that may be of interest to readers. *NEW! Includes more exercises, including many at a lower level. *NEW! Presents program-like notation for PDAs and Turing machines. *NEW! Increas

The Death and Life of Great American Cities


Jane Jacobs - 1961
    In prose of outstanding immediacy, Jane Jacobs writes about what makes streets safe or unsafe; about what constitutes a neighborhood, and what function it serves within the larger organism of the city; about why some neighborhoods remain impoverished while others regenerate themselves. She writes about the salutary role of funeral parlors and tenement windows, the dangers of too much development money and too little diversity. Compassionate, bracingly indignant, and always keenly detailed, Jane Jacobs's monumental work provides an essential framework for assessing the vitality of all cities.

The Mushroom at the End of the World: On the Possibility of Life in Capitalist Ruins


Anna Lowenhaupt Tsing - 2015
    Through its ability to nurture trees, matsutake helps forests to grow in daunting places. It is also an edible delicacy in Japan, where it sometimes commands astronomical prices. In all its contradictions, matsutake offers insights into areas far beyond just mushrooms and addresses a crucial question: what manages to live in the ruins we have made? A tale of diversity within our damaged landscapes, The Mushroom at the End of the World follows one of the strangest commodity chains of our times to explore the unexpected corners of capitalism. Here, we witness the varied and peculiar worlds of matsutake commerce: the worlds of Japanese gourmets, capitalist traders, Hmong jungle fighters, industrial forests, Yi Chinese goat herders, Finnish nature guides, and more. These companions also lead us into fungal ecologies and forest histories to better understand the promise of cohabitation in a time of massive human destruction.By investigating one of the world's most sought-after fungi, The Mushroom at the End of the World presents an original examination into the relation between capitalist destruction and collaborative survival within multispecies landscapes, the prerequisite for continuing life on earth.

Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door


Brian Krebs - 2014
    Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies and countless viruses, phishing, and spyware attacks he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma" who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords, Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can—and do—hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime, before it's too late."Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals. His track record of scoops has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting." Bloomberg Businessweek

The Internet Galaxy: Reflections on the Internet, Business, and Society


Manuel Castells - 2001
    We are at ground zero of the new network society. In this book, its major commentator reveals the Internet's huge capacity to liberate, but also its ability to marginalize and exclude those who do not have access to it. Castells provides no glib solutions, but asks us all to take responsibility for the future of this new information age.The Internet is becoming the essential communication and information medium in our society, and stands alongside electricity and the printing press as one of the greatest innovations of all time. The Internet Galaxy offers an illuminating look at how this new technology will influence business, the economy, and our daily lives.

Postmodernism or the Cultural Logic of Late Capitalism


Fredric Jameson - 1991
    Jameson’s inquiry looks at the postmodern across a wide landscape, from “high” art to “low” from market ideology to architecture, from painting to “punk” film, from video art to literature.

Lurking: How a Person Became a User


Joanne McNeil - 2020
    It has created a new, unprecedented cultural space that we are all a part of—even if we don’t participate, that is how we participate—but by which we’re continually surprised, betrayed, enriched, befuddled. We have churned through platforms and technologies and in turn been churned by them. And yet, the internet is us and always has been.In Lurking, Joanne McNeil digs deep and identifies the primary (if sometimes contradictory) concerns of people online: searching, safety, privacy, identity, community, anonymity, and visibility. She charts what it is that brought people online and what keeps us here even as the social equations of digital life—what we’re made to trade, knowingly or otherwise, for the benefits of the internet—have shifted radically beneath us. It is a story we are accustomed to hearing as tales of entrepreneurs and visionaries and dynamic and powerful corporations, but there is a more profound, intimate story that hasn’t yet been told.Long one of the most incisive, ferociously intelligent, and widely respected cultural critics online, McNeil here establishes a singular vision of who we are now, tells the stories of how we became us, and helps us start to figure out what we do now.

Vibrant Matter: A Political Ecology of Things


Jane Bennett - 2010
    Bennett argues that political theory needs to do a better job of recognizing the active participation of nonhuman forces in events. Toward that end, she theorizes a “vital materiality” that runs through and across bodies, both human and nonhuman. Bennett explores how political analyses of public events might change were we to acknowledge that agency always emerges as the effect of ad hoc configurations of human and nonhuman forces. She suggests that recognizing that agency is distributed this way, and is not solely the province of humans, might spur the cultivation of a more responsible, ecologically sound politics: a politics less devoted to blaming and condemning individuals than to discerning the web of forces affecting situations and events.Bennett examines the political and theoretical implications of vital materialism through extended discussions of commonplace things and physical phenomena including stem cells, fish oils, electricity, metal, and trash. She reflects on the vital power of material formations such as landfills, which generate lively streams of chemicals, and omega-3 fatty acids, which can transform brain chemistry and mood. Along the way, she engages with the concepts and claims of Spinoza, Nietzsche, Thoreau, Darwin, Adorno, and Deleuze, disclosing a long history of thinking about vibrant matter in Western philosophy, including attempts by Kant, Bergson, and the embryologist Hans Driesch to name the “vital force” inherent in material forms. Bennett concludes by sketching the contours of a “green materialist” ecophilosophy.

Marxism and Literature


Raymond Williams - 1977
    He analyzes previous contributions to a Marxist theory of literature from Marx himself to Lukacs, Althusser, and Goldmann, and develops his own approach by outlining a theory of cultural materialism' which integrates Marxist theories of language with Marxist theories of literature. Williams moves from a review of the growth of the concepts of literature and idealogy to a redefinition of determinism' and hegemony'. His incisive discussion of the 'social material process' of cultural activity culminates in a re-examination of the problems of alignment and commitment and of the creative practice in individual authors and wider social groups.

The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal


M. Mitchell Waldrop - 2001
    C. R. Licklider, whose visionary dream of a human-computer symbiosis transformed the course of modern science and led to the development of the personal computer. Reprint.

Decoding Advertisements: Ideology and Meaning in Advertising


Judith Williamson - 1978
    The overt economic function of this appeal is to make us buy things. Its ideological function, however, is to involve us as 'individuals' in perpetuating the ideas which endorse the economic basis of our society. If it is economic conditions which make ideology necessary, it is ideology which makes those conditions seem necessary.If society is to be changed, this vicious circle of necessity and ideas must be broken. Decoding Advertisements is an attempt to undo one link in the chain which we ourselves help to forge, in our acceptance not only of the images and values of advertising, but of the 'transparent' forms and structures in which they are embodied. It provides not an answer, but a set of tools which we can use to alter our own perceptions of one of society's subtlest and most complex forms of propaganda.Other books by Judith Williamson published by Marion Boyars are Consuming Passions: the Dynamics of Popular Culture and Deadline at Dawn: Film Criticism 1980-1990.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World


Bruce Schneier - 2015
    Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Computers and Intractability: A Guide to the Theory of NP-Completeness


Michael R. Garey - 1979
    Johnson. It was the first book exclusively on the theory of NP-completeness and computational intractability. The book features an appendix providing a thorough compendium of NP-complete problems (which was updated in later printings of the book). The book is now outdated in some respects as it does not cover more recent development such as the PCP theorem. It is nevertheless still in print and is regarded as a classic: in a 2006 study, the CiteSeer search engine listed the book as the most cited reference in computer science literature.

Reinforcement Learning: An Introduction


Richard S. Sutton - 1998
    Their discussion ranges from the history of the field's intellectual foundations to the most recent developments and applications.Reinforcement learning, one of the most active research areas in artificial intelligence, is a computational approach to learning whereby an agent tries to maximize the total amount of reward it receives when interacting with a complex, uncertain environment. In Reinforcement Learning, Richard Sutton and Andrew Barto provide a clear and simple account of the key ideas and algorithms of reinforcement learning. Their discussion ranges from the history of the field's intellectual foundations to the most recent developments and applications. The only necessary mathematical background is familiarity with elementary concepts of probability.The book is divided into three parts. Part I defines the reinforcement learning problem in terms of Markov decision processes. Part II provides basic solution methods: dynamic programming, Monte Carlo methods, and temporal-difference learning. Part III presents a unified view of the solution methods and incorporates artificial neural networks, eligibility traces, and planning; the two final chapters present case studies and consider the future of reinforcement learning.

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency


Parmy Olson - 2012
    WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.