Book picks similar to
Deep Learning for Computer Architects by Brandon Reagen
computer-science
electrical-engineering
machine-learning
system-architecture
Rocket Man: Elon Musk In His Own Words
Jessica Easto - 2017
Rocket Man: Elon Musk In His Own Words is a comprehensive guide to the inner workings of the man dubbed "the real Tony Stark." Hundreds of his best quotes, comprising thoughts on business, clean energy, innovation, engineering, technology, space, electric vehicles, entrepreneurship, life lessons, and more, provide an intimate and direct look into Silicon Valley's most ambitious industrialist.Even with no prior experience in the complex, ultra-high-barrier-of-entry automotive and space industries, Musk has excelled. Tesla, the first successful American car startup in more than 90 years, received more than 325,000 reservations for its economical Model 3 in a single week—advancing the company’s cause to “accelerate the advent of sustainable transport” via affordable, reliable electric vehicles. SpaceX, the first private company to launch, orbit, and recover a rocket and dock at the International Space Station, has drastically reduced the cost of launching and manufacturing reusable spacecraft, which the company sees as the first step toward its "ultimate goal" of making life multiplanetary. In the words of Richard Branson, "Whatever skeptics have said can’t be done, Elon has gone out and made real."How could a young man who at one time seemed like "just" another Internet entrepreneur have gone on to build two highly disruptive companies and innovate technologies related to everything from electric batteries to rocket manufacturing? There's no better way to learn than through his own words.This book curates Musk quotes from interviews, public appearances, online postings, company blogs, press releases, and more. What emerges is a 'word portrait' of the man whose companies' swift rise to the top will undoubtedly keep their status-quo competitors scrambling to keep up.
The Algorithmic Leader: How to Be Smart When Machines Are Smarter Than You
Mike Walsh - 2019
M.O.D.
J.C. Allen - 2011
Scott Carver is asked to make this decision when "M.O.D." asks him to help plan a revolution.
Digital Communications: Fundamentals and Applications
Bernard Sklar - 1987
It can serve both as an excellent introduction for the graduate student with some background in probability theory or as a valuable reference for the practicing ommunication system engineer. For both communities, the treatment is clear and well presented." - Andrew Viterbi, The Viterbi Group Master every key digital communications technology, concept, and technique. Digital Communications, Second Edition is a thoroughly revised and updated edition of the field's classic, best-selling introduction. With remarkable clarity, Dr. Bernard Sklar introduces every digital communication technology at the heart of today's wireless and Internet revolutions, providing a unified structure and context for understanding them -- all without sacrificing mathematical precision. Sklar begins by introducing the fundamentals of signals, spectra, formatting, and baseband transmission. Next, he presents practical coverage of virtually every contemporary modulation, coding, and signal processing technique, with numeric examples and step-by-step implementation guidance. Coverage includes: Signals and processing steps: from information source through transmitter, channel, receiver, and information sinkKey tradeoffs: signal-to-noise ratios, probability of error, and bandwidth expenditureTrellis-coded modulation and Reed-Solomon codes: what's behind the mathSynchronization and spread spectrum solutionsFading channels: causes, effects, and techniques for withstanding fadingThe first complete how-to guide to turbo codes: squeezing maximum performance out of digital connectionsImplementing encryption with PGP, the de facto industry standard Whether you're building wireless systems, xDSL, fiber or coax-based services, satellite networks, or Internet infrastructure, Sklar presents the theory and the practical implementation details you need. With nearly 500 illustrations and 300 problems and exercises, there's never been a faster way to master advanced digital communications. CD-ROM INCLUDED The CD-ROM contains a complete educational version of Elanix' SystemView DSP design software, as well as detailed notes for getting started, a comprehensive DSP tutorial, and over 50 additional communications exercises.
Kill Process
William Hertling - 2016
She can't change her own traumatic past, but she can save other women. When Tomo introduces a deceptive new product that preys on users' fears to drive up its own revenue, Angie sees Tomo for what it really is--another evil abuser. Using her coding and hacking expertise, she decides to destroy Tomo by building a new social network that is completely distributed, compartmentalized, and unstoppable. If she succeeds, it will be the end of all centralized power in the Internet. But how can an anti-social, one-armed programmer with too many dark secrets succeed when the world's largest tech company is out to crush her and a no-name government black ops agency sets a psychopath to look into her growing digital footprint?"
Digital Design: Principles and Practices Package
John F. Wakerly - 1990
Blends academic precision and practical experience in an authoritative introduction to basic principles of digital design and practical requirements. With over 30 years of experience in both industrial and university settings, the author covers the most widespread logic design practices while building a solid foundation of theoretical and engineering principles for students to use as they go forward in this fast moving field.
Computer Organization
V. Carl Hamacher - 1978
*A comprehensive overview of hardware and software issues make this a "must-have" for electrical and computer engineers*Contains new material on RISC processors, performance analysis, multiprocessors and memory systems*New two-color design and illustrations illuminate the text
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
Modern Database Management
Jeffrey A. Hoffer - 1994
Intended for professional development programs in introductory database management.
Machine Learning: New and Collected Stories
Hugh Howey - 2017
These stories explore everything from artificial intelligence to parallel universes to video games, and each story is accompanied by an author’s note exploring the background and genesis of each story. Howey’s incisive mind makes Machine Learning: New and Collected Stories a compulsively readable and thought-provoking selection of short works—from a modern master at the top of his game.
Mechatronics: Electronic Control Systems in Mechanical and Electrical Engineering
W. Bolton - 1996
This book provides a clear and comprehensive introduction to the application of electronic control systems in mechanical and electrical engineering. It gives a framework of knowledge that allows engineers and technicians to develop an interdisciplinary understanding and integrated approach to engineering.
Artificial Intelligence and Intelligent Systems
N.P. Padhy - 2005
The focus of this text is to solve real-world problems using the latest AI techniques. Intelligent systems like expert systems, fuzzy systems, artificial neural networks, genetic algorithms and ant colony systems are discussed in detail with case studies to facilitate in- depth understanding. Since the ultimate goal of AI is the construction of programs to solve problems, an entire chapter has been devoted to the programming languages used in AI problem solving. The theory is well supported by a large number of illustrations and end-chapter exercises. With its comprehensive coverage of the subject in a clear and concise manner this text would be extremely useful not only for undergraduate students, but also to postgraduate students.
Decision Support Systems and Intelligent Systems
Efraim Turban - 1998
Amazon Simple Storage Service (S3) Getting Started Guide
Amazon Web Services - 2012
This guide introduces the basic concepts of Amazon S3, the bucket and the object. It walks you through the process of using the AWS Management Console, a browser-based graphical user interface, to create a bucket and then upload, view, move, and delete an object.
PIC Microcontroller and Embedded Systems: Using Assembly and C for PIC18
Muhammad Ali Mazidi - 2007
Offering numerous examples and a step-by-step approach, it covers both the Assembly and C programming languages and devotes separate chapters to interfacing with peripherals such as Timers, LCD, Serial Ports, Interrupts, Motors and more. A unique chapter on hardware design of the PIC system and the PIC trainer round out coverage. Systematic coverage of the PIC18 family of Microcontrollers. Assembly language and C language programming and interfacing techniques. Thorough coverage of Architectures and Assembly language programming of the PIC18. Thorough coverage of C language programming of the PIC18. Separate chapters on programming and interfacing the PIC with peripherals - Includes information on how to interface the PIC with LCD, keyboard, ADC, DAC, Sensors, Serial Ports, Timers, DC and Stepper Motors, Optoisolators, and RTC. Covers how to program each peripheral, first using the Assembly language and then using the C language. Those involved with PIC programming and interfacing using Assembly and C languages."