The Big Necessity: The Unmentionable World of Human Waste and Why It Matters


Rose George - 2008
    But we should--even those of us who take care of our business in pristine, sanitary conditions. For it's not only in developing countries that human waste is a major public health threat: population growth is taxing even the most advanced sewage systems, and the disease spread by waste kills more people worldwide every year than any other single cause of death. Even in America, 1.95 million people have no access to an indoor toilet. Yet the subject remains unmentionable."The Big Necessity "takes aim at the taboo, revealing everything that matters about how people do--and don't--deal with their own waste. Moving from the deep underground sewers of Paris, London, and New York--an infrastructure disaster waiting to happen--to an Indian slum where ten toilets are shared by 60,000 people, Rose George stops along the way to explore the potential saviors: China's five million biogas digesters, which produce energy from waste; the heroes of third world sanitation movements; the inventor of the humble Car Loo; and the U.S. Army's personal lasers used by soldiers to zap their feces in the field.With razor-sharp wit and crusading urgency, mixing levity with gravity, Rose George has turned the subject we like to avoid into a cause with the most serious of consequences.

CMOS VLSI Design: A Circuits and Systems Perspective


Neil H.E. Weste - 2004
    The authors draw upon extensive industry and classroom experience to explain modern practices of chip design. The introductory chapter covers transistor operation, CMOS gate design, fabrication, and layout at a level accessible to anyone with an elementary knowledge of digital electornics. Later chapters beuild up an in-depth discussion of the design of complex, high performance, low power CMOS Systems-on-Chip.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance


Julia Angwin - 2014
    We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.

The Georgian Star: How William and Caroline Herschel Revolutionized Our Understanding of the Cosmos


Michael D. Lemonick - 2008
    Though he is still best known for this finding, his partnership with his sister Caroline yielded groundbreaking work, including techniques that remain in use today. The duo pioneered comprehensive surveys of the night sky, carefully categorizing every visible object in the void. Caroline wrote an influential catalogue of nebulae, and William discovered infrared radiation. Celebrated science writer Michael Lemonick guides readers through the depths of the solar system and into his protagonists' private lives: William developed bizarre theories about inhabitants of the sun; he procured an unheard-of salary for Caroline even while haggling with King George III over the funding for an enormous, forty-foot telescope; the siblings feuded over William's marriage and eventually reconciled. Erudite and accessible, The Georgian Star is a lively portrait of the pair who invented modern astronomy.

Freshwater Aquariums for Dummies


Maddy Hargrove - 2006
    This friendly guide answers all your questions, from setting up your tank and selecting fish to the water, chemicals, plants, and much more. There's also expanded guidance on combining different species of fish, maintaining a tank, cleaning gravel, and dealing with common problems such as algae. Discover how to * Choose the right aquarium * Select the best fish * Get good deals on equipment * Maintain a clean, healthy environment * Handle tank pitfalls * Breed your fish

Secrets and Lies: Digital Security in a Networked World


Bruce Schneier - 2000
    Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.

Hertzian Tales: Electronic Products, Aesthetic Experience, and Critical Design


Anthony Dunne - 1999
    Designers of electronic products, writes Anthony Dunne in "Hertzian Tales," must begin to think more broadly about the aesthetic role of electronic products in everyday life. Industrial design has the potential to enrich our daily lives -- to improve the quality of our relationship to the artificial environment of technology, and even, argues Dunne, to be subverted for socially beneficial ends.The cultural speculations and conceptual design proposals in "Hertzian Tales" are not utopian visions or blueprints; instead, they embody a critique of present-day practices, "mixing criticism with optimism." Six essays explore design approaches for developing the aesthetic potential of electronic products outside a commercial context--considering such topics as the post-optimal object and the aesthetics of user-unfriendliness -- and five proposals offer commentary in the form of objects, videos, and images. These include "Electroclimates," animations on an LCD screen that register changes in radio frequency; "When Objects Dream...," consumer products that "dream" in electromagnetic waves; "Thief of Affection," which steals radio signals from cardiac pacemakers; "Tuneable Cities," which uses the car as it drives through overlapping radio environments as an interface of hertzian and physical space; and the "Faraday Chair: Negative Radio," enclosed in a transparent but radio-opaque shield.Very little has changed in the world of design since "Hertzian Tales "was first published by the Royal College of Art in 1999, writes Dunne in his preface to this MIT Press edition: "Design is not engaging with the social, cultural, and ethical implications of the technologies it makes so sexy and consumable." His project and proposals challenge it to do so.

507 Mechanical Movements: Mechanisms and Devices


Henry T. Brown - 1984
    Spanning the first century of the Industrial Revolution, this 1868 compilation features simplified, concise illustrations of the mechanisms used in hydraulics, steam engines, pneumatics, presses, horologes, and scores of other machines.The movements of each of the 507 mechanisms are depicted in drawings on the left-hand page, and the facing page presents a brief description of the item's use and operation. Ranging from simple to intricately complex, the mechanisms offer a fascinating view of the variety of small components that constitute complex machinery. A detailed index provides easy reference to specific mechanisms.Inventors, tinkerers, and anyone with an interest in the history of invention and technology will find this volume a treasury of information and inspiration.

The Big Book of Hacks: 264 Amazing DIY Tech Projects


Doug Cantor - 2012
    And it's all brought to you by the DIY masters at Popular Science magazine.Four comprehensive chapters help you create megafun games and toys for the amusement of all: GEEK TOYS Be the life of any party with rad gaming hacks, amazing pyrotechnics, quirky DIY robots, "wow"-inducing projectiles, and lots of ways to make beer even better. HOME IMPROVEMENTS Pimp out your pad with a laser-security system, an improvised sous-vide cooker, and a life-size cardboard display of anyone you want. GADGET UPGRADES Want to stash a flash drive in an old cassette? Use a DIY stylus on a touchscreen? Improvise a fisheye lens for your camera? With this book, you can. THINGS THAT GO Give your motorbike a Tron vibe, deck out your car with an action-figure hood ornament, and keep gadgets charged on the go with a solar-powered backpack.

The Cult of Mac


Leander Kahney - 2004
    Apple's machines have legions of loyal, sometimes demented fans. The Cult of Mac surveys the devoted following that has grown up around Macintosh computers. Like fans of a football team or a rock group, Macintosh fanatics have their own subculture, with clearly defined obsessions, rites, and passages. Famously dedicated to their computers, many Mac fans eat, sleep, and breathe the Macintosh. Fans who get Mac tattoos and haircuts, people who attend Apple Store openings like they are Grateful Dead shows, counterculture icons who love the Mac, people who turn old Macs into aquariums (or bongs), Ellen Fein lookalike contests, erotic fiction featuring Steve Jobs; it's all here. Technology reporter Leander Kahney exposes all sides of Mac fanaticism, from the innocuous to the insane.

13 Free Jewelry Patterns From Prima Bead


Prima Bead - 2014
    This eBook shows you how to make delightful DIY jewelry crafts with:• Step-by-step tutorials• Detailed materials lists• Clear, large photos• Easy-to-understand instructions Check out our tutorials on:• Creating Cuff Bracelets• How to Make a Necklace• Making Cabochon Jewelry• How to Make Earrings• And More! If you want to make beautiful homemade jewelry pieces, this is eBook you need!

Dave Miller's Homebrewing Guide: Everything You Need to Know to Make Great-Tasting Beer


Dave Miller - 1995
    With up-to-date techniques, simple definitions for unfamiliar terminology, and helpful diagrams demonstrating proper equipment layouts and methods, Miller includes everything you need to know to brew great-tasting beer at home. Clear enough for the novice, yet thorough enough to earn a home in the libraries of accomplished brewmasters, Dave Miller’s Homebrewing Guide is packed with useful information that will inspire you to take your beer to the next level.

Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)


Andy Oram - 2009
    Criminals succeed by exercising enormous creativity, and those defending against them must do the same.Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from:Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).

Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door


Brian Krebs - 2014
    Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies and countless viruses, phishing, and spyware attacks he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma" who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords, Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can—and do—hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime, before it's too late."Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals. His track record of scoops has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting." Bloomberg Businessweek