Book picks similar to
Cryptography: A Very Short Introduction by Fred C. Piper
science
non-fiction
mathematics
vsi
The Mongols: A Very Short Introduction
Morris Rossabi - 2012
But as Morris Rossabi reveals in this VeryShort Introduction, within two generations of their bloody conquests, the Mongols evolved from conquerors and predators to wise rulers who devised policies to foster the economies of the lands they had subjugated. By adopting political and economic institutions familiar to the local populations andrecruiting native officials, they won over many of their non-Mongol subjects. In addition, Mongol nobles were ardent patrons of art and culture, supporting the production of Chinese porcelains and textiles, Iranian tiles and illustrated manuscripts, and Russian metalwork. Perhaps most important, thepeace imposed by the Mongols on much of Asia and their promotion of trade resulted in considerable interaction among merchants, scientists, artists, and missionaries of different ethnic groups--including Europeans. Modern Eurasian and perhaps global history starts with the Mongol empire.
Agnosticism: A Very Short Introduction
Robin Le Poidevin - 2010
Agnosticism emerges here as a much more sophisticated, and much more interesting, attitude than a simple failure to either commit to, or reject, religious belief. Le Poidevin challenges the common wisdom about agnosticism among both believers and atheists, and invites the reader to rethink their own position on the issues. Indeed, in arguing in favor of agnosticism as a respectable position to take, this stimulating and provocative guide takes issue on many points with the assertions of prominent atheists such as Richard Dawkins.
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
Parmy Olson - 2012
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Brian Krebs - 2014
Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies and countless viruses, phishing, and spyware attacks he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma" who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords, Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can—and do—hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime, before it's too late."Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals. His track record of scoops has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting."
Bloomberg Businessweek
Computers and Intractability: A Guide to the Theory of NP-Completeness
Michael R. Garey - 1979
Johnson. It was the first book exclusively on the theory of NP-completeness and computational intractability. The book features an appendix providing a thorough compendium of NP-complete problems (which was updated in later printings of the book). The book is now outdated in some respects as it does not cover more recent development such as the PCP theorem. It is nevertheless still in print and is regarded as a classic: in a 2006 study, the CiteSeer search engine listed the book as the most cited reference in computer science literature.
The Algorithm Design Manual
Steven S. Skiena - 1997
Drawing heavily on the author's own real-world experiences, the book stresses design and analysis. Coverage is divided into two parts, the first being a general guide to techniques for the design and analysis of computer algorithms. The second is a reference section, which includes a catalog of the 75 most important algorithmic problems. By browsing this catalog, readers can quickly identify what the problem they have encountered is called, what is known about it, and how they should proceed if they need to solve it. This book is ideal for the working professional who uses algorithms on a daily basis and has need for a handy reference. This work can also readily be used in an upper-division course or as a student reference guide. THE ALGORITHM DESIGN MANUAL comes with a CD-ROM that contains: * a complete hypertext version of the full printed book. * the source code and URLs for all cited implementations. * over 30 hours of audio lectures on the design and analysis of algorithms are provided, all keyed to on-line lecture notes.
The United Nations: A Very Short Introduction
Jussi M. Hanhimäki - 2008
With this much-needed introduction to the UN, Jussi Hanhim�ki engages the current debate over the organizations effectiveness as he provides a clear understanding of how it was originally conceived, how it has come to its present form, and how it must confront new challenges in a rapidly changing world.After a brief history of the United Nations and its predecessor, the League of Nations, the author examines the UN's successes and failures as a guardian of international peace and security, as a promoter of human rights, as a protector of international law, and as an engineer of socio-economic development. Hanhim�ki stresses that the UN's greatest problem has been the impossibly wide gap between its ambitions and capabilities. In the area of international security, for instance, the UN has to settle conflicts--be they between or within states--without offending the national sovereignty of its member states, and without being sidelined by strong countries, as happened in the 2003 intervention of Iraq. Hanhim�ki also provides a clear accounting of the UN and its various arms and organizations (such as UNESCO and UNICEF), and he offers a critical overview of how effective it has been in the recent crises in Rwanda and the former Yugoslavia, for example--and how likely it is to meet its overall goals in the future.The United Nations, Hanhim�ki concludes, is an indispensable organization that has made the world a better place. But it is also a deeply flawed institution, in need of constant reform.About the Series: Oxford's Very Short Introductions series offers concise and original introductions to a wide range of subjects--from Islam to Sociology, Politics to Classics, Literary Theory to History, and Archaeology to the Bible. Not simply a textbook of definitions, each volume in this series provides trenchant and provocative--yet always balanced and complete--discussions of the central issues in a given discipline or field. Every Very Short Introduction gives a readable evolution of the subject in question, demonstrating how the subject has developed and how it has influenced society. Eventually, the series will encompass every major academic discipline, offering all students an accessible and abundant reference library. Whatever the area of study that one deems important or appealing, whatever the topic that fascinates the general reader, the Very Short Introductions series has a handy and affordable guide that will likely prove indispensable.
Ideology: A Very Short Introduction
Michael Freeden - 2003
This book examines the reasons for those views, and explains why ideologies deserve respect as a major form of political thinking. It investigates the centrality of ideologyboth as a political phenomenon and as an organizing framework of political thought and action. It explores the changing understandings of ideology as a concept, and the arguments of the main ideologies. By employing the latest insights from a range of disciplines, the reader is introduced to thevitality and force of a crucial resource at the disposal of societies, through which sense and purpose is assigned to the political world.
The Devil: A Very Short Introduction
Darren Oldridge - 2012
This Very Short Introduction looks at the Devil in the history of ideas and in the lives of real people. Darren Oldridge shows us that the Devil is an important figure in western history--a richly complex and contradictory one. Oldridge focuses on three main themes: the idea of the Devil being integral to western thought from the early Middle Ages to the beginnings of modernity; the belief that the Devil represents the mirror image of goodness; and the multiplicity and instability of ideas about the Devil. Oldridge concludes by exploring "demonological" ways of thinking in our own time, including allegations of "satanic ritual abuse."
Rousseau: A Very Short Introduction
Robert Wokler - 1995
He was also its most formidable critic, condemning the political, economic, theological, and sexual trappings of civilization along lines that would excite the enthusiasm of romantic individualists and radical revolutionaries alike. In this study of Rousseau's life and works, Robert Wolker shows how his philosophy of history, his theories of music and politics, his fiction, educational, and religious writings, and even his botany, were all inspired by revolutionary ideals of mankind's self-realization in a condition of unfettered freedom. He explains how, in regressing to classical republicanism, ancient mythology, direct communication with God, and solitude, Rousseau anticipated some post-modernist rejections of the Enlightenment as well.
Bitcoin for the Befuddled
Conrad Barski - 2014
Already used by people and companies around the world, many forecast that Bitcoin could radically transform the global economy. The value of a bitcoin has soared from less than a dollar in 2011 to well over $1000 in 2013, with many spikes and crashes along the way. The rise in value has brought Bitcoin into the public eye, but the cryptocurrency still confuses many people. Bitcoin for the Befuddled covers everything you need to know about Bitcoin—what it is, how it works, and how to acquire, store, and use bitcoins safely and securely. You'll also learn about Bitcoin's history, its complex cryptography, and its potential impact on trade and commerce. The book includes a humorous, full-color comic explaining Bitcoin concepts, plus a glossary of terms for easy reference.
Our Mathematical Universe: My Quest for the Ultimate Nature of Reality
Max Tegmark - 2012
Our Big Bang, our distant future, parallel worlds, the sub-atomic and intergalactic - none of them are what they seem. But there is a way to understand this immense strangeness - mathematics. Seeking an answer to the fundamental puzzle of why our universe seems so mathematical, Tegmark proposes a radical idea: that our physical world not only is described by mathematics, but that it is mathematics. This may offer answers to our deepest questions: How large is reality? What is everything made of? Why is our universe the way it is?Table of ContentsPreface 1 What Is Reality? Not What It Seems • What’s the Ultimate Question? • The Journey Begins Part One: Zooming Out 2 Our Place in Space Cosmic Questions • How Big Is Space? • The Size of Earth • Distance to the Moon • Distance to the Sun and the Planets • Distance to the Stars • Distance to the Galaxies • What Is Space? 3 Our Place in TimeWhere Did Our Solar System Come From? • Where Did theGalaxies Come From? • Where Did the Mysterious MicrowavesCome From? • Where Did the Atoms Come From? 4 Our Universe by NumbersWanted: Precision Cosmology • Precision Microwave-Background Fluctuations • Precision Galaxy Clustering • The Ultimate Map of Our Universe • Where Did Our Big Bang Come From? 5 Our Cosmic Origins What’s Wrong with Our Big Bang? • How Inflation Works • The Gift That Keeps on Giving • Eternal Inflation 6 Welcome to the Multiverse The Level I Multiverse • The Level II Multiverse • Multiverse Halftime Roundup Part Two: Zooming In 7 Cosmic Legos Atomic Legos • Nuclear Legos • Particle-Physics Legos • Mathematical Legos • Photon Legos • Above the Law? • Quanta and Rainbows • Making Waves • Quantum Weirdness • The Collapse of Consensus • The Weirdness Can’t Be Confined • Quantum Confusion 8 The Level III Multiverse The Level III Multiverse • The Illusion of Randomness • Quantum Censorship • The Joys of Getting Scooped • Why Your Brain Isn’t a Quantum Computer • Subject, Object and Environment • Quantum Suicide • Quantum Immortality? • Multiverses Unified • Shifting Views: Many Worlds or Many Words? Part Three: Stepping Back 9 Internal Reality, External Reality and Consensus Reality External Reality and Internal Reality • The Truth, the Whole Truth and Nothing but the Truth • Consensus Reality • Physics: Linking External to Consensus Reality 10 Physical Reality and Mathematical Reality Math, Math Everywhere! • The Mathematical Universe Hypothesis • What Is a Mathematical Structure? 11 Is Time an Illusion? How Can Physical Reality Be Mathematical? • What Are You? • Where Are You? (And What Do You Perceive?) • When Are You? 12 The Level IV Multiverse Why I Believe in the Level IV Multiverse • Exploring the Level IV Multiverse: What’s Out There? • Implications of the Level IV Multiverse • Are We Living in a Simulation? • Relation Between the MUH, the Level IV Multiverse and Other Hypotheses •Testing the Level IV Multiverse 13 Life, Our Universe and Everything How Big Is Our Physical Reality? • The Future of Physics • The Future of Our Universe—How Will It End? • The Future of Life •The Future of You—Are You Insignificant? Acknowledgments Suggestions for Further Reading Index
You Look Like a Thing and I Love You: How Artificial Intelligence Works and Why It's Making the World a Weirder Place
Janelle Shane - 2019
according to an artificial intelligence trained by scientist Janelle Shane, creator of the popular blog "AI Weirdness." She creates silly AIs that learn how to name paint colors, create the best recipes, and even flirt (badly) with humans--all to understand the technology that governs so much of our daily lives.We rely on AI every day for recommendations, for translations, and to put cat ears on our selfie videos. We also trust AI with matters of life and death, on the road and in our hospitals. But how smart is AI really, and how does it solve problems, understand humans, and even drive self-driving cars?Shane delivers the answers to every AI question you've ever asked, and some you definitely haven't--like, how can a computer design the perfect sandwich? What does robot-generated Harry Potter fan-fiction look like? And is the world's best Halloween costume really "Vampire Hog Bride"?In this smart, often hilarious introduction to the most interesting science of our time, Shane shows how these programs learn, fail, and adapt--and how they reflect the best and worst of humanity. You Look Like a Thing and I Love You is the perfect book for anyone curious about what the robots in our lives are thinking.
The Signal and the Noise: Why So Many Predictions Fail—But Some Don't
Nate Silver - 2012
He solidified his standing as the nation's foremost political forecaster with his near perfect prediction of the 2012 election. Silver is the founder and editor in chief of FiveThirtyEight.com. Drawing on his own groundbreaking work, Silver examines the world of prediction, investigating how we can distinguish a true signal from a universe of noisy data. Most predictions fail, often at great cost to society, because most of us have a poor understanding of probability and uncertainty. Both experts and laypeople mistake more confident predictions for more accurate ones. But overconfidence is often the reason for failure. If our appreciation of uncertainty improves, our predictions can get better too. This is the "prediction paradox": The more humility we have about our ability to make predictions, the more successful we can be in planning for the future.In keeping with his own aim to seek truth from data, Silver visits the most successful forecasters in a range of areas, from hurricanes to baseball, from the poker table to the stock market, from Capitol Hill to the NBA. He explains and evaluates how these forecasters think and what bonds they share. What lies behind their success? Are they good-or just lucky? What patterns have they unraveled? And are their forecasts really right? He explores unanticipated commonalities and exposes unexpected juxtapositions. And sometimes, it is not so much how good a prediction is in an absolute sense that matters but how good it is relative to the competition. In other cases, prediction is still a very rudimentary-and dangerous-science.Silver observes that the most accurate forecasters tend to have a superior command of probability, and they tend to be both humble and hardworking. They distinguish the predictable from the unpredictable, and they notice a thousand little details that lead them closer to the truth. Because of their appreciation of probability, they can distinguish the signal from the noise.
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.