Book picks similar to
The Hacker Ethic: A Radical Approach to the Philosophy of Business by Pekka Himanen
non-fiction
technology
philosophy
business
Bitcoin Billionaires: A True Story of Genius, Betrayal, and Redemption
Ben Mezrich - 2019
While nursing their wounds in Ibiza, they accidentally run into an eccentric character who tells them about a brand-new idea: cryptocurrency. Immersing themselves in what is then an obscure and sometimes sinister world, they begin to realize “crypto” is, in their own words, "either the next big thing or total bulls--t." There’s nothing left to do but make a bet.From the Silk Road to the halls of the Securities and Exchange Commission, Bitcoin Billionaires will take us on a wild and surprising ride while illuminating a tantalizing economic future. On November 26, 2017, the Winklevoss brothers became the first bitcoin billionaires. Here’s the story of how they got there—as only Ben Mezrich could tell it.
R for Data Science: Import, Tidy, Transform, Visualize, and Model Data
Hadley Wickham - 2016
This book introduces you to R, RStudio, and the tidyverse, a collection of R packages designed to work together to make data science fast, fluent, and fun. Suitable for readers with no previous programming experience, R for Data Science is designed to get you doing data science as quickly as possible.
Authors Hadley Wickham and Garrett Grolemund guide you through the steps of importing, wrangling, exploring, and modeling your data and communicating the results. You’ll get a complete, big-picture understanding of the data science cycle, along with basic tools you need to manage the details. Each section of the book is paired with exercises to help you practice what you’ve learned along the way.
You’ll learn how to:
Wrangle—transform your datasets into a form convenient for analysis
Program—learn powerful R tools for solving data problems with greater clarity and ease
Explore—examine your data, generate hypotheses, and quickly test them
Model—provide a low-dimensional summary that captures true "signals" in your dataset
Communicate—learn R Markdown for integrating prose, code, and results
The Square and the Tower: Networks and Power, from the Freemasons to Facebook
Niall Ferguson - 2017
It's about states, armies and corporations. It's about orders from on high. Even history "from below" is often about trade unions and workers' parties. But what if that's simply because hierarchical institutions create the archives that historians rely on? What if we are missing the informal, less well documented social networks that are the true sources of power and drivers of change?The 21st century has been hailed as the Age of Networks. However, in The Square and the Tower, Niall Ferguson argues that networks have always been with us, from the structure of the brain to the food chain, from the family tree to freemasonry. Throughout history, hierarchies housed in high towers have claimed to rule, but often real power has resided in the networks in the town square below. For it is networks that tend to innovate. And it is through networks that revolutionary ideas can contagiously spread. Just because conspiracy theorists like to fantasize about such networks doesn't mean they are not real.From the cults of ancient Rome to the dynasties of the Renaissance, from the founding fathers to Facebook, The Square and the Tower tells the story of the rise, fall and rise of networks, and shows how network theory--concepts such as clustering, degrees of separation, weak ties, contagions and phase transitions--can transform our understanding of both the past and the present.Just as The Ascent of Money put Wall Street into historical perspective, so The Square and the Tower does the same for Silicon Valley. And it offers a bold prediction about which hierarchies will withstand this latest wave of network disruption--and which will be toppled.
The Nomadic Developer: Surviving and Thriving in the World of Technology Consulting
Aaron Erickson - 2009
More and more often, those companies look to technology consultants to fulfill their needs. There are real advantages to being a consultant. You make contacts with a lot of different people; you get exposure to many industries; and most important, unlike a software developer in the IT department for a brick-and-mortar company, as a technology consultant, you are the profit center…so long as you are billing. Consulting can be hugely rewarding—but it’s easy to fail if you are unprepared. To succeed, you need a mentor who knows the lay of the land. Aaron Erickson is your mentor, and this is your guidebook. Erickson has done it all—from Practice Leadership to the lowest level project work. In The Nomadic Developer, he brings together his hardwon insights on becoming successful and achieving success through tough times and relentless change. You’ll find 100% practical advice and real experiences—his own and annotations from those in the trenches. In addition, renowned consultants—such as David Chappell, Bruce Eckel, Deborah Kurata, and Ted Neward—share some of their hard-earned lessons. With this useful guidebook, you can Objectively assess whether the consultant’s life makes sense for you Break into thebusiness and build a career path that works Avoid the Seven Deadly Firms by identifying unscrupulous technology consultancies and avoiding their traps and pitfalls Understand the business models and mechanics that virtually all consulting firms use Master secret consulting success tips that are typically left unstated or overlooked Gain a competitive advantage by adding more value than your competitors Continue your professional development so you stay billable even during bad times Profit from both fixed-bid and time-and-materials projects Build a personal brand that improves your resiliency no matter what happens
Fluent Python: Clear, Concise, and Effective Programming
Luciano Ramalho - 2015
With this hands-on guide, you'll learn how to write effective, idiomatic Python code by leveraging its best and possibly most neglected features. Author Luciano Ramalho takes you through Python's core language features and libraries, and shows you how to make your code shorter, faster, and more readable at the same time.Many experienced programmers try to bend Python to fit patterns they learned from other languages, and never discover Python features outside of their experience. With this book, those Python programmers will thoroughly learn how to become proficient in Python 3.This book covers:Python data model: understand how special methods are the key to the consistent behavior of objectsData structures: take full advantage of built-in types, and understand the text vs bytes duality in the Unicode ageFunctions as objects: view Python functions as first-class objects, and understand how this affects popular design patternsObject-oriented idioms: build classes by learning about references, mutability, interfaces, operator overloading, and multiple inheritanceControl flow: leverage context managers, generators, coroutines, and concurrency with the concurrent.futures and asyncio packagesMetaprogramming: understand how properties, attribute descriptors, class decorators, and metaclasses work"
How Linux Works: What Every Superuser Should Know
Brian Ward - 2004
Some books try to give you copy-and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view. With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you.
Peopleware: Productive Projects and Teams
Tom DeMarco - 1987
The answers aren't easy -- just incredibly successful.
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
Ashlee Vance - 2015
Ashlee Vance captures the full spectacle and arc of the genius's life and work, from his tumultuous upbringing in South Africa and flight to the United States to his dramatic technical innovations and entrepreneurial pursuits. Vance uses Musk's story to explore one of the pressing questions of our age: can the nation of inventors and creators who led the modern world for a century still compete in an age of fierce global competition? He argues that Musk is an amalgam of legendary inventors and industrialists including Thomas Edison, Henry Ford, Howard Hughes, and Steve Jobs. More than any other entrepreneur today, Musk has dedicated his energies and his own vast fortune to inventing a future that is as rich and far-reaching as the visionaries of the golden age of science-fiction fantasy
Inside Steve's Brain
Leander Kahney - 2008
Hes also one of the most controversial CEOs in history, allegedly throwing epic tantrums, firing staff in elevators, and taking credit for other peoples achievements. So whats the real story? According to Leander Kahney, who has covered Jobs since the early 1990s as a reporter, editor, and book author, hes a fascinating bundle of contradictions. Hes an elitist who thinks most people are bozosbut he makes gadgets so easy to use, a bozo can master them. Hes a mercurial obsessive with a filthy temperbut he forges deep partnerships with creative geniuses like Steve Wozniak, Jonathan Ive, and John Lasseter. Hes a Buddhist and antimaterialistbut he produces mass-market products in Asian factories, and he promotes them with absolute mastery of the crassest medium, advertising. In short, Jobs has embraced the personality traits that some consider flawsnarcissism, perfectionism, total faith in his intuitionto lead Apple and Pixar to triumph against steep odds. And in the process, he has become a self-made billionaire. After interviewing more Apple insiders than any previous author, Kahney has distilled the principles that guide Jobs as he launches killer products, attracts fanatically loyal customers, and manages some of the worlds most powerful brands.
The Sciences of the Artificial
Herbert A. Simon - 1969
There are updates throughout the book as well. These take into account important advances in cognitive psychology and the science of design while confirming and extending the book's basic thesis: that a physical symbol system has the necessary and sufficient means for intelligent action. The chapter "Economic Reality" has also been revised to reflect a change in emphasis in Simon's thinking about the respective roles of organizations and markets in economic systems."People sometimes ask me what they should read to find out about artificial intelligence. Herbert Simon's book The Sciences of the Artificial is always on the list I give them. Every page issues a challenge to conventional thinking, and the layman who digests it well will certainly understand what the field of artificial intelligence hopes to accomplish. I recommend it in the same spirit that I recommend Freud to people who ask about psychoanalysis, or Piaget to those who ask about child psychology: If you want to learn about a subject, start by reading its founding fathers." -- George A. Miller
The Pattern on the Stone: The Simple Ideas that Make Computers Work
William Daniel Hillis - 1998
What they don't realize—and what Daniel Hillis's short book brilliantly demonstrates—is that computers' seemingly complex operations can be broken down into a few simple parts that perform the same simple procedures over and over again.Computer wizard Hillis offers an easy-to-follow explanation of how data is processed that makes the operations of a computer seem as straightforward as those of a bicycle. Avoiding technobabble or discussions of advanced hardware, the lucid explanations and colorful anecdotes in The Pattern on the Stone go straight to the heart of what computers really do.Hillis proceeds from an outline of basic logic to clear descriptions of programming languages, algorithms, and memory. He then takes readers in simple steps up to the most exciting developments in computing today—quantum computing, parallel computing, neural networks, and self-organizing systems.Written clearly and succinctly by one of the world's leading computer scientists, The Pattern on the Stone is an indispensable guide to understanding the workings of that most ubiquitous and important of machines: the computer.
Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath
Ted Koppel - 2015
Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn’t just a scenario. A well-designed attack on just one of the nation’s three electric power grids could cripple much of our infrastructure—and in the age of cyberwarfare, a laptop has become the only necessary weapon. Several nations hostile to the United States could launch such an assault at any time. In fact, as a former chief scientist of the NSA reveals, China and Russia have already penetrated the grid. And a cybersecurity advisor to President Obama believes that independent actors—from “hacktivists” to terrorists—have the capability as well. “It’s not a question of if,” says Centcom Commander General Lloyd Austin, “it’s a question of when.” And yet, as Koppel makes clear, the federal government, while well prepared for natural disasters, has no plan for the aftermath of an attack on the power grid. The current Secretary of Homeland Security suggests keeping a battery-powered radio.In the absence of a government plan, some individuals and communities have taken matters into their own hands. Among the nation’s estimated three million “preppers,” we meet one whose doomsday retreat includes a newly excavated three-acre lake, stocked with fish, and a Wyoming homesteader so self-sufficient that he crafted the thousands of adobe bricks in his house by hand. We also see the unrivaled disaster preparedness of the Mormon church, with its enormous storehouses, high-tech dairies, orchards, and proprietary trucking company – the fruits of a long tradition of anticipating the worst. But how, Koppel asks, will ordinary civilians survive?With urgency and authority, one of our most renowned journalists examines a threat unique to our time and evaluates potential ways to prepare for a catastrophe that is all but inevitable.
Hacking Exposed: Network Security Secrets & Solutions
Joel Scambray - 2003
Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material:
New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
New wireless and RFID security tools, including multilayered encryption and gateways
All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
Fully updated chapters on hacking the Internet user, web hacking, and securing code
Calling Bullshit: The Art of Skepticism in a Data-Driven World
Carl T. Bergstrom - 2020
Now, two science professors give us the tools to dismantle misinformation and think clearly in a world of fake news and bad data.It's increasingly difficult to know what's true. Misinformation, disinformation, and fake news abound. Our media environment has become hyperpartisan. Science is conducted by press release. Startup culture elevates bullshit to high art. We are fairly well equipped to spot the sort of old-school bullshit that is based in fancy rhetoric and weasel words, but most of us don't feel qualified to challenge the avalanche of new-school bullshit presented in the language of math, science, or statistics. In Calling Bullshit, Professors Carl Bergstrom and Jevin West give us a set of powerful tools to cut through the most intimidating data.You don't need a lot of technical expertise to call out problems with data. Are the numbers or results too good or too dramatic to be true? Is the claim comparing like with like? Is it confirming your personal bias? Drawing on a deep well of expertise in statistics and computational biology, Bergstrom and West exuberantly unpack examples of selection bias and muddled data visualization, distinguish between correlation and causation, and examine the susceptibility of science to modern bullshit.We have always needed people who call bullshit when necessary, whether within a circle of friends, a community of scholars, or the citizenry of a nation. Now that bullshit has evolved, we need to relearn the art of skepticism.
Inside Apple
Adam Lashinsky - 2011
Based on numerous interviews, this book reveals exclusive new information about how Apple innovates, deals with its suppliers, and is handling the transition into the post Jobs era.