Book picks similar to
Break the Code: Cryptography for Beginners by Bud Johnson


t_puzzles_riddles
crypto
ljc_sd_to_sort
middle-school-math-friends

Raggedy Ann's Wishing Pebble


Jan Palmer - 1925
    It's up to Raggedy Ann and Andy to get the magic pebble back -- and to teach the trickster a valuable lesson about kindness. In this new version of a classic, retold for young children, Raggedy Ann and the other dolls in the nursery come to life with humor and spirit.

A Brief History of Artificial Intelligence: What It Is, Where We Are, and Where We Are Going


Michael Wooldridge - 2021
    As an AI researcher with 25 years of experience, professor Mike Wooldridge has learned to be obsessively cautious about such claims, while still promoting an intense optimism about the future of the field. There have been genuine scientific breakthroughs that have made AI systems possible in the past decade that the founders of the field would have hailed as miraculous. Driverless cars and automated translation tools are just two examples of AI technologies that have become a practical, everyday reality in the past few years, and which will have a huge impact on our world.While the dream of conscious machines remains, Professor Wooldridge believes, a distant prospect, the floodgates for AI have opened. Wooldridge's A Brief History of Artificial Intelligence is an exciting romp through the history of this groundbreaking field--a one-stop-shop for AI's past, present, and world-changing future.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Metaprogramming Elixir


Chris McCord - 2015
    Maybe you’ve played with the basics or written a few macros. Now you want to take it to the next level. This book is a guided series of metaprogramming tutorials that take you step by step to metaprogramming mastery. You’ll extend Elixir with powerful features and write faster, more maintainable programs in ways unmatched by other languages.You’ll start with the basics of Elixir’s metaprogramming system and find out how macros interact with Elixir’s abstract format. Then you’ll extend Elixir with your own first-class features, write a testing framework, and discover how Elixir treats source code as building blocks, rather than rote lines of instructions. You’ll continue your journey by using advanced code generation to create essential libraries in strikingly few lines of code. Finally, you’ll create domain-specific languages and learn when and where to apply your skills effectively.When you’re done, you will have mastered metaprogramming, gained insights into Elixir’s internals, and have the confidence to leverage macros to their full potential in your own projects.

Passage to Avalon


Mike Thayer - 2018
    He’s also the only person in Avalon with a bag of high-tech spy gear, a solar-powered cell phone with intermittent signal back to Earth, a YouTube account, and a murderous wizard-emperor on his tail…so he’s got a lot going for him. When an earthquake hits his hometown of Bozeman, Montana, Sam gets inexplicably transported to Avalon, a strange world in which aether defines all aspects of life: the rich, the poor, the weak, the powerful, the oppressed, and the oppressors. Sam soon discovers that not only is he immune to aether’s magical effects, but that he possesses the rare ability to destroy the stuff on contact. This phenomenon poses something of a major concern for the Emperor of Avalon, a tyrant who has dedicated his life to amassing more aether than all his subjects combined. While trying to find a way back home, Sam learns that his best hope lies with meeting the emperor head on, and draining the tyrant of his power. To do that, Sam will need to band together with a medieval cowboy, a young aether prodigy, and a curious dryad, all while using his whole bag of technological tricks…and posting about it on social media, of course. In Passage to Avalon, Mike Thayer takes a humorous, action-packed, and modern spin on the portal fantasy genre in the first book of The Epic Adventures of the Techno Wizard, a series that combines magical fantasy with near future technology and social media.

Manufacturing Engineering and Technology


Serope Kalpakjian - 2000
    Manufacturing Engineering and Technology describes both time-tested and modern methods of manufacturing engineering materials, and sets the standard for introducing readers to the scope and variety of manufacturing processes.

Business Plans for Dummies


Paul Tiffany - 1997
    Yet, sometimes business owners go full speed ahead without even having a destination in mind, much less a map on how to get there. That's why so many businesses never make it. In today's competitive marketplace, 3/4 of all new businesses fail within two to three years. Whether you're launching a new business or working to strengthen or expand an established one, a business plan is your road map to success. Business Plans For Dummies, 2nd Edition helps you keep your businesses on track and reach your goals. Written by Paul Tiffany, PhD, professor at UC Berkley Haas Business School and the Wharton School of Business and Steven Peterson, PhD, Professor at UC Berkeley Haas Business School and CEO of Strategic Play, it helps youRealistically determine where your business is and where you want to go Create a detailed business plan and put it into action instead of in a drawer Use the plan to secure financing Prepare for opportunities avoid common pitfalls In short, Business Plans for Dummies helps you determine where you want your business to go and create a map for getting there. You'll discover how to:Identify and approach potential financial backers, including venture capital firms, angels, bankers, and others Clarify and crystallize your company's mission, vision, and values Analyze your industry and your competition Identify your customers, including their needs, habits, purchase triggers, and decision-making processes Objectively analyze your company's strengths and weaknesses Analyze your financial situation in order to do realistic forecasts and budgets Recognize trends and anticipate changes, both in the overall economy and in your industry Plan for growth, considering the product life cycle, new products, or new markets Structure your organization and nurture leadership Complete with diverse techniques and approaches plus a sample business plan, Business Plans For Dummies gives you detailed how-to for designing a dynamic, business plan that will keep you on course in spite of the inevitable curves and detours in today's marketplace. It's a plantastic resource for business owners and entrepreneurs.

Andrea Carter and the Long Ride Home


Susan K. Marlow - 2005
    Twelve-year-old Andrea "Andi" Carter attracts trouble the way her palomino horse, Taffy, attracts flies on a hot summer day. Andi's entire family and the staff at the Circle C Ranch treat her like such a pesky kid that she sometimes wonders if they would all be better off without her. After a particularly scary incident where Andi gets in trouble once again, she saddles up Taffy and runs away from home. But her escape quickly leads to frightening encounters with a horse thief and a vicious young lady. All of which makes Andi realize that there really is no place like home.

The Ultimate Player's Guide to Minecraft


Stephen O'Brien - 2013
    Take an experienced guide who'll help you constantly... from living through your first night, to hosting your own Minecraft server! Stephen O'Brien has been obsessing over Minecraft since its earliest betas. He's seen it all! Now, he'll take you deep inside craft and mine, cave and menagerie, farm and village. He'll reveal combat traps and tricks you needto know... take you deep inside hidden temples... teach you enchantments of unimaginable power... help you survive where few dare to go... help you OWN the infinite worlds of Minecraft! Get registered and get started NOWCustomize your experience: monstrous, peaceful, and moreHarvest resources, craft tools and shelters--let there be lightGrab your pickaxe: mine iron, gold, diamonds, and redstoneEscape (or defeat!) 14 types of hostile mobsGet friendly mobs on your side and build automated farmsBrew potions to cure ills, gain superpowers, and throw at enemiesTransform your shelter into a palace (or a secret underwater base)Create new worlds and master the fine art of terraformingLearn the secrets of redstone devices, and build incredible rail systemsPlay safely through The Nether and The EndDiscover mods that will blow your mindRun your own LAN games, adventures, and worldsProvides complete coverage of the PC and Mac versionsTips for using Minecraft on Xbox, iOS and AndroidBonus downloadable crafting guide available from the publisher's web site

Click'd


Tamara Ireland Stone - 2017
    CLICK'D pairs users based on common interests and sends them on a fun (and occasionally rule-breaking) scavenger hunt to find each other. And it's a hit. By the second day of school, everyone is talking about CLICK'D.Watching her app go viral is amazing. Leaderboards are filling up! Everyone's making new friends. And with all the data Allie is collecting, she has an even better shot at beating her archenemy, Nathan, at the upcoming youth coding competition. But when Allie discovers a glitch that threatens to expose everyone's secrets, she has to figure out how to make things right, even if that means sharing the computer lab with Nathan. Can Allie fix her app, stop it from doing any more damage, and win back the friends it hurt-all before she steps on stage to present CLICK'D to the judges?

The Social Life of Ink


Ted Bishop - 2014
    Ink is so much a part of daily life that we take it for granted, yet its invention was as significant as the wheel. Ink not only recorded culture, it bought political power, divided peoples, and led to murderous rivalries. Ancient letters on a page were revered as divine light, and precious ink recipes were held secret for centuries. And, when it first hit markets not so long ago, the excitement over the disposable ballpoint pen equalled that for a new smartphone--with similar complaints to the manufacturers. Curious about its impact on culture, literature, and the course of history, Ted Bishop sets out to explore the story of ink. From Budapest to Buenos Aires, he traces the lives of the innovators who created the ballpoint pen--revolutionary technology that still requires exact engineering today. Bishop visits a ranch in Utah to meet a master ink-maker who relishes igniting linseed oil to make traditional printers' ink. In China, he learns that ink can be an exquisite object, the subject of poetry, and a means of strengthening (or straining) family bonds. And in the Middle East, he sees the world's oldest Qur'an, stained with the blood of the caliph who was assassinated while reading it. An inquisitive and personal tour around the world, Ink asks us to look more closely at something we see so often that we don't see it at all.

Digital Marketing Analytics: Making Sense of Consumer Data in a Digital World


Chuck Hemann - 2013
    Do It Now! Why hasn't all that data delivered a whopping competitive advantage? Because you've barely begun to use it, that's why! Good news: neither have your competitors. It's hard! But digital marketing analytics is 100% doable, it offers colossal opportunities, and all of the data is accessible to you. Chuck Hemann and Ken Burbary will help you chop the problem down to size, solve every piece of the puzzle, and integrate a virtually frictionless system for moving from data to decision, action to results! Scope it out, pick your tools, learn to listen, get the metrics right, and then distill your digital data for maximum value for everything from R&D to CRM to social media marketing! - Prioritize--because you can't measure, listen to, and analyze everything - Use analysis to craft experiences that profoundly reflect each customer's needs, expectations, and behaviors - Measure real social media ROI: sales, leads, and customer satisfaction - Track the performance of all paid, earned, and owned social media channels - Leverage "listening data" way beyond PR and marketing: for strategic planning, product development, and HR - Start optimizing web and social content in real time - Implement advanced tools, processes, and algorithms for accurately measuring influence - Integrate paid and social data to drive more value from both - Make the most of surveys, focus groups, and offline research synergies - Focus new marketing and social media investments where they'll deliver the most value Foreword by Scott Monty Global Head of Social Media, Ford Motor Company

WordPress All-In-One for Dummies


Lisa Sabin-Wilson - 2011
    Eight minibooks provide you with expanded coverage of the most important topics to the WordPress community, such as WordPress basics, theme designs, plug-in development, social media integration, SEO, customization, and running multiple sites. Veteran author Lisa Sabin-Wilson leads an authoritative team of authors who offer their unique knowledge and skillset while sharing invaluable advice for maximizing your site's potential and visitor experience.Presents straightforward and easy-to-understand coverage of the basics of WordPress, the most popular blog software in use today Delves into the topics that matter most to the WordPress community, such as theme design, plug-in development, and social media integration Addresses ways to handle a variety of WordPress security issues Examines the WordPress network The word on the street is that WordPress All-in-One For Dummies presents everything you need to know about WordPress in one convenient book!

Stealing the Network: How to Own an Identity


Raven Alder - 2005
    Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

The Bletchley Girls


Tessa Dunlop - 2015
    Many were just school girls at the outbreak of war; the next six years would change their lives forever. This vivid portrayal of their experiences, sacrifices, and memories is a poignant reminder that without the work of thousands of young women Bletchley Park's extraordinary achievements would not have been possible. By meeting and talking to these fascinating female secret-keepers who are still alive today, Tessa Dunlop captures their extraordinary journeys into an adult world of war, secrecy, love, and loss. Through the voices of the women themselves, this is the story of life at Bletchley Park beyond the celebrated code-breakers; it's the story of the girls behind Britain's ability to consistently outsmart the enemy.