Book picks similar to
Cyber Security Basics: Building and improving the cyber security foundation of your organization by Don Franke
ada
computer-science
cyber
cyber-security
Site Reliability Engineering: How Google Runs Production Systems
Betsy Beyer - 2016
So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large-scale computing systems?In this collection of essays and articles, key members of Google's Site Reliability Team explain how and why their commitment to the entire lifecycle has enabled the company to successfully build, deploy, monitor, and maintain some of the largest software systems in the world. You'll learn the principles and practices that enable Google engineers to make systems more scalable, reliable, and efficient--lessons directly applicable to your organization.This book is divided into four sections: Introduction--Learn what site reliability engineering is and why it differs from conventional IT industry practicesPrinciples--Examine the patterns, behaviors, and areas of concern that influence the work of a site reliability engineer (SRE)Practices--Understand the theory and practice of an SRE's day-to-day work: building and operating large distributed computing systemsManagement--Explore Google's best practices for training, communication, and meetings that your organization can use
Object-Oriented Information Systems Analysis and Design Using UML
Simon Bennett - 1999
It can be used as a course book for students who are first encountering systems analysis and design at any level. This second edition contains many updates, including the latest version of the UML standard, and reflects the most up to date approaches to the information systems development process. It provides a clear and comprehensive treatment of UML 1.4 in the context of the systems development life cycle, without assuming previous knowledge of analysis and design. It also discusses implementation issues in detail and gives code fragments to show possible mappings to implementation technology. Extensive use of examples and exercises from two case studies provides the reader with many opportunities to practise the application of UML.
The Secret Sentry: The Untold History of the National Security Agency
Matthew M. Aid - 2009
In February 2006, while researching this book, Matthew Aid uncovered a massive and secret document reclassification program—a revelation that made the front page of the New York Times. This was only one of the discoveries Aid has made during two decades of research in formerly top-secret documents. In The Secret Sentry, Aid provides the first-ever full history of America's largest security apparatus, the National Security Agency. This comprehensive account traces the growth of the agency from 1945 to the present through critical moments in its history, from the cold war up to its ongoing involvement in Afghanistan and Iraq. Aid explores the agency's involvement in the Iraqi weapons intelligence disaster, where evidence that NSA officials called "ambiguous" was used as proof of Iraqi WMD capacity, and details the intense debate within the NSA over its unprecedented role, pressed by the Bush-Cheney administration, in spying on U.S. citizens. Today, the NSA has become the most important source of intelligence for the U.S. government, providing 60 percent of the president's daily intelligence briefing. While James Bamford's New York Times bestseller The Shadow Factory covered the NSA since 9/11, The Secret Sentry contains new information about every period since World War II . It provides a shadow history of global affairs, from the creation of I srael to the War on Terror.
Java SE 6: The Complete Reference
Herbert Schildt - 2006
He includes information on Java Platform Standard Edition 6 (Java SE 6) and offers complete coverage of the Java language, its syntax, keywords, and fundamental programming principles.
Deep Medicine: How Artificial Intelligence Can Make Healthcare Human Again
Eric J. Topol - 2019
The doctor-patient relationship--the heart of medicine--is broken: doctors are too distracted and overwhelmed to truly connect with their patients, and medical errors and misdiagnoses abound. In Deep Medicine, leading physician Eric Topol reveals how artificial intelligence can help. AI has the potential to transform everything doctors do, from notetaking and medical scans to diagnosis and treatment, greatly cutting down the cost of medicine and reducing human mortality. By freeing physicians from the tasks that interfere with human connection, AI will create space for the real healing that takes place between a doctor who can listen and a patient who needs to be heard.Innovative, provocative, and hopeful, Deep Medicine shows us how the awesome power of AI can make medicine better, for all the humans involved.
The Myth of Artificial Intelligence: Why Computers Can't Think the Way We Do
Erik J. Larson - 2021
What hope do we have against superintelligent machines? But we aren't really on the path to developing intelligent machines. In fact, we don't even know where that path might be.A tech entrepreneur and pioneering research scientist working at the forefront of natural language processing, Erik Larson takes us on a tour of the landscape of AI to show how far we are from superintelligence, and what it would take to get there. Ever since Alan Turing, AI enthusiasts have equated artificial intelligence with human intelligence. This is a profound mistake. AI works on inductive reasoning, crunching data sets to predict outcomes. But humans don't correlate data sets: we make conjectures informed by context and experience. Human intelligence is a web of best guesses, given what we know about the world. We haven't a clue how to program this kind of intuitive reasoning, known as abduction. Yet it is the heart of common sense. That's why Alexa can't understand what you are asking, and why AI can only take us so far.Larson argues that AI hype is both bad science and bad for science. A culture of invention thrives on exploring unknowns, not overselling existing methods. Inductive AI will continue to improve at narrow tasks, but if we want to make real progress, we will need to start by more fully appreciating the only true intelligence we know--our own.
Dark Pools: The Rise of Artificially Intelligent Trading Machines and the Looming Threat to Wall Street
Scott Patterson - 2012
In the beginning was Josh Levine, an idealistic programming genius who dreamed of wresting control of the market from the big exchanges that, again and again, gave the giant institutions an advantage over the little guy. Levine created a computerized trading hub named Island where small traders swapped stocks, and over time his invention morphed into a global electronic stock market that sent trillions in capital through a vast jungle of fiber-optic cables. By then, the market that Levine had sought to fix had turned upside down, birthing secretive exchanges called dark pools and a new species of trading machines that could think, and that seemed, ominously, to be slipping the control of their human masters. Dark Pools is the fascinating story of how global markets have been hijacked by trading robots--many so self-directed that humans can't predict what they'll do next.
The Linux Command Line
William E. Shotts Jr. - 2012
Available here:readmeaway.com/download?i=1593279523The Linux Command Line, 2nd Edition: A Complete Introduction PDF by William ShottsRead The Linux Command Line, 2nd Edition: A Complete Introduction PDF from No Starch Press,William ShottsDownload William Shotts’s PDF E-book The Linux Command Line, 2nd Edition: A Complete Introduction
Mastering Vmware Vsphere 5
Scott Lowe - 2011
You'll learn how to install, configure, operate, manage, and secure the latest release.Covers all the new features and capabilities of the much-anticipated new release of VMware vSphere Discusses the planning, installation, operation, and management for the latest release Reviews migration to the latest vSphere software Offers hands-on instruction and clear explanations with real-world examples Mastering VMware vSphere is the strategic guide you need to maximize the opportunities of virtualization.
Introducing Windows Azure for IT Professionals
Mitch Tulloch - 2013
It is offered for sale in print format as a convenience.Get a head start evaluating Windows Azure - with technical insights from a Microsoft MVP Mitch Tulloch. This guide introduces the latest features and capabilities, with scenario-based advice on how the platform can meet the needs of your business. Get the high-level overview you need to begin preparing your deployment now.Topics include: Understanding Windows Azure Windows Azure Compute Services Windows Azure Network Services Windows Azure Data Services Windows Azure App Services Getting Started with Windows Azure
Networking for Dummies
Doug Lowe - 2000
You'll discover the hottest topics for setting up a network at home or in the office.Popular For Dummies author Doug Lowe knows what the networking beginner is looking for, so to that end, he offers you networking fundamentals written in his easy-to-understand style and discusses topics such as Windows 7 and Windows Server 2008.Walks you through networking basics with valuable updates of the latest networking tools and trends Explains exactly what a network is and how to use it Demonstrates how to build a wired or wireless network Addresses securing, optimizing, and troubleshooting a network Discusses networking with all major operating systems Networking For Dummies, 9th Edition is the guide you need to start sharing resources and exchanging data today.
Cyberpunk: The Big Book of Hardware, Software, Wetware, Revolution and Evolution
Victoria Blake - 2012
Cyberpunk writers, serious, smart, and courageous in the face of change, exposed the naiveté of a society rushing headlong into technological unknowns. Technology could not save us, they argued, and it might in fact ruin us. Now, thirty years after The Movement party-crashed the science fiction scene, the cyberpunk reality has largely come to be. The future they imagined is here.Contents: * Introduction (Cyberpunk: Stories of Hardware, Software, Wetware, Revolution and Evolution) • essay by Victoria Blake * Johnny Mnemonic (1981) / short story by William Gibson * Mozart in Mirrorshades (1985) / short story by Lewis Shiner and Bruce Sterling * Interview with the Crab (2005) / short fiction by Jonathan Lethem * El Pepenador / short fiction by Benjamin Parzybok * Down and Out in the Year 2000 (1986) / short story by Kim Stanley Robinson * Getting to Know You [North American Future] (1997) / novelette by David Marusek * User-Centric (1999) / short story by Bruce Sterling * The Blog at the End of the World (2008) / short story by Paul Tremblay * Memories of Moments, Bright as Falling Stars (2006) / short story by Cat Rambo * Rock On (1984) / short story by Pat Cadigan * Blue Clay Blues (1992) / novelette by Gwyneth Jones * The Lost Technique of Blackmail (2009) / short fiction by Mark Teppo * Fall of the House of Escher / short fiction by Greg Bear (variant of The Fall of the House of Escher 1996) * Soldier, Sailor (1990) / short story by Lewis Shiner * The Nostalgist (2009) / short story by Daniel H. Wilson * The Jack Kerouac Disembodied School of Poetics (1982) / short story by Rudy Rucker * Mr. Boy (1990) / novella by James Patrick Kelly * Wolves of the Plateau (1988) / short story by John Shirley * Life in the Anthropocene (2010) / short story by Paul Di Filippo * When Sysadmins Ruled the Earth (2006) / novelette by Cory Doctorow.
Tools and Weapons: The Promise and the Peril of the Digital Age
Brad Smith - 2019
This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. Now, though, we have reached an inflection point: Silicon Valley has moved fast and it has broken things. A new understanding has emerged that companies that create technology must accept greater responsibility for the future. And governments will need to regulate technology by moving faster and catching up with the pace of innovation that is impacting our communities and changing the world.In Tools and Weapons, Brad Smith takes us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of AI, big tech's relationship to inequality and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book opens up the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. Every tool can be a weapon in the wrong person's hands, and companies are being challenged in entirely new ways to embrace the totality of their responsibilities. We have moved from a world in which Silicon Valley could take no prisoners to one in which tech companies and governments must work together to address the challenges and adapt to the changes technology has unleashed. There are huge ramifications to be thought through, and Brad Smith provides a marvelous and urgently necessary contribution to that effort.
The New Digital Age: Reshaping the Future of People, Nations and Business
Eric Schmidt - 2013
And, the Director of Google Ideas, Jared Cohen, formerly an advisor to both Secretaries of State Condoleezza Rice and Hillary Clinton.Never before has the future been so vividly and transparently imagined. From technologies that will change lives (information systems that greatly increase productivity, safety and our quality of life, thought controlled motion technology that can revolutionize medical procedures, and near-perfect translation technology that allows us to have more diversified interactions) to our most important future considerations (curating our online identity and fighting those who would do harm with it) to the widespread political change that will transform the globe (through transformations in conflict, increasingly active and global citizenries, a new wave of cyber-terrorism and states operating simultaneously in the physical and virtual realms) to the ever present threats to our privacy and security, Schmidt and Cohen outline in great detail and scope all the promise and peril awaiting us in the coming decades.
Words Their Way: Word Sorts for Within Word Pattern Spellers
Marcia A. Invernizzi - 2008
Notes for the Teacher, Organizational tips, and follow-up activities all assist teachers and future teachers to begin using word sorts with minimal preparation and to easily reinforce previous word sort skills as students learn and build new ones. KEY TOPICS: Designed for use as part of a reading curriculum where word pattern spelling is covered, topics provide step-by-step instructions on how to introduce and guide students through the sorting lesson. MARKET: Designed for use as part of a reading curriculum where word pattern spelling is covered.