Book picks similar to
Twitter for Dummies by Laura Fitton


non-fiction
nonfiction
social-media
reference

Guerrilla Publishing: Dangerously Effective Writing and Book Marketing Strategies


Derek Murphy - 2017
    Even worse, the publishing industry is full of predatory promotion services that don't work, or use old-school tactics that do nothing to sell books. Eager authors, frustrated by lack of sales, then resort to spammy tactics that give self-publishers a bad name. In Book Marketing is Dead I wrote that what passes for book marketing these days is virtually useless, but I didn't provide a way forward. I wanted to show that there was a more effective way to sell books, so I built a platform from scratch, grew a list of over 50K subscribers, got 1000+ book reviews, and sold over 20K books in less than a year. I even made some money (enough to rent a castle for Nanowrimo). I'm still doing a lot wrong, but I've proven that:  You CAN make a living with your writing  Book marketing isn't hard if you do it right  SELL MORE BOOKS WITH LESS MARKETINGThis book is a crash course on some of the more creative book marketing strategies I've discovered in my first year of publishing fiction. It will provide simple, actionable steps to publishing a high quality book quickly, doing only as much marketing as is necessary to launch your book like a rockstar, and keep it selling enough to support you while you write more books. I only mention the things I actually use, that I know work, and ignore all the other things that don't get results. We'll discuss:  how to write books readers love  self-publishing without getting ripped off  how to get hundreds of book reviews  paid advertising and release strategies  pricing and pre-orders  book giveaways for rapid listbuilding  how to target your audience  viral exposure and press coverage  setting up automated funnels so you spend less time promoting  marketing hacks so good they should be illegal  and how to reach your first $1000 on Kindle  LAUNCH BIG EVEN IF YOU'RE STARTING SMALL "Guerrilla" is a style of warfare intended to surprise and harass enemies. It can also mean using unconventional and usually inexpensive means to generate interest or raise concern among the public. That's basically how I'll use it: book marketing strategies from the trenches to help you win the publishing war. However, instead of "surprise and harass" I will focus on "surprise and delight." First you need to show up and get in front of the right people. Then you need to surprise and delight them. You need to be remarkable enough to be noticed. Few authors are using these strategies (yet) so it's relatively easy to outrank your competition, get more visibility and reach new readers. FREE BONUS WORKBOOK This book is mostly theory and ideas, and links to a lot of external resources, but I've recently finished a companion workbook that goes into more detail and gives exact, step-by-step plans to follow. For a limited time, this book includes access to the 67-page PDF.

Letting Go of the Words: Writing Web Content that Works


Janice G. Redish - 2007
    Ironically, I must recommend that you read her every word so that you can find out why your customers won't read very many words on your website -- and what to do about it.-- Jakob Nielsen, Principal, Nielsen Norman Group"There are at least twelve billion web pages out there. Twelve billion voices talking, but saying mostly nothing. If just 1% of those pages followed Ginny's practical, clear advice, the world would be a better place. Fortunately, you can follow her advice for 100% of your own site's pages, so pick up a copy of Letting Go of the Words and start communicating effectively today."--Lou Rosenfeld, co-author, Information Architecture for the World Wide WebOn the web, whether on the job or at home, we usually want to grab information and use it quickly. We go to the web to get answers to questions or to complete tasks - to gather information, reading only what we need. We are all too busy to read much on the web.This book helps you write successfully for web users. It offers strategy, process, and tactics for creating or revising content for the web. It helps you plan, organize, write, design, and test web content that will make web users come back again and again to your site.Learn how to create usable and useful content for the web from the master - Ginny Redish. Ginny has taught and mentored hundreds of writers, information designers, and content owners in the principles and secrets of creating web information that is easy to scan, easy to read, and easy to use.This practical, informative book will help anyone creating web content do it better.Features* Clearly-explained guidelines with full color illustrations and examples from actual web sites throughout the book. * Written in easy-to-read style with many befores and afters.* Specific guidelines for web-based press releases, legal notices, and other documents.* Tips on making web content accessible for people with special needs.Janice (Ginny) Redish has been helping clients and colleagues communicate clearly for more than 20 years. For the past ten years, her focus has been helping people create usable and useful web sites. She is co-author of two classic books on usability: A Practical Guide to Usability Testing (with Joseph Dumas), and User and Task Analysis for Interface Design (with JoAnn Hackos), and is the recipient of many awards.

Blogging All-In-One for Dummies


Susan Gunelius - 2010
    To stand out from the masses, bloggers need the detailed information and advice packed into this all-in-one guide.Here's what new bloggers need to get started and what experienced bloggers need to upgrade and even earn money from their blogs. Eight self-contained minibooks cover joining the blogosphere, blogging software, tools that extend your blog, marketing your blog, microblogging, making money from your blog, corporate blogging, and niche blogging.Blogging is replacing traditional media and gaining credibility; to succeed, bloggers need a greater understanding of blogging basics, tools, and techniques Eight minibooks cover getting started, software, other tools, blog marketing, microblogging (including Twitter), monetizing your blog, and corporate and niche blogging Helps new bloggers become active and productive members of the blogging community Provides vital information for both hobby bloggers and those who want to build a career around blogging Presented in the fun and friendly For Dummies style, Blogging All-in-One For Dummies is a complete reference guide to starting and maintaining a successful blog.

Computer Networks


Andrew S. Tanenbaum - 1981
    In this revision, the author takes a structured approach to explaining how networks function.

The Soul of a New Machine


Tracy Kidder - 1981
    Tracy Kidder got a preview of this world in the late 1970s when he observed the engineers of Data General design and build a new 32-bit minicomputer in just one year. His thoughtful, prescient book, The Soul of a New Machine, tells stories of 35-year-old "veteran" engineers hiring recent college graduates and encouraging them to work harder and faster on complex and difficult projects, exploiting the youngsters' ignorance of normal scheduling processes while engendering a new kind of work ethic.These days, we are used to the "total commitment" philosophy of managing technical creation, but Kidder was surprised and even a little alarmed at the obsessions and compulsions he found. From in-house political struggles to workers being permitted to tease management to marathon 24-hour work sessions, The Soul of a New Machine explores concepts that already seem familiar, even old-hat, less than 20 years later. Kidder plainly admires his subjects; while he admits to hopeless confusion about their work, he finds their dedication heroic. The reader wonders, though, what will become of it all, now and in the future. —Rob Lightner

The Google Story: Inside the Hottest Business, Media and Technology Success of Our Time


David A. Vise - 2005
    The Google Story takes you deep inside the company's wild ride from an idea that struggled for funding in 1998 to a firm that rakes in billions in profits, making Brin and Page the wealthiest young men in America. Based on scrupulous research and extraordinary access to Google, this fast-moving narrative reveals how an unorthodox management style and culture of innovation enabled a search engine to shake up Madison Avenue and Wall Street, scoop up YouTube, and battle Microsoft at every turn. Not afraid of controversy, Google is expanding in Communist China and quietly working on a searchable genetic database, initiatives that test the founders' guiding mantra: DON'T BE EVIL.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

Crush It With Kindle - How to self publish your books on Kindle and promote them to #1 bestseller status


John Tighe - 2012
    With simplified methods and helpful techniques John guides authors on the road to promoting their books to bestseller status in the Kindle Store.

Coders at Work: Reflections on the Craft of Programming


Peter Seibel - 2009
    As the words "at work" suggest, Peter Seibel focuses on how his interviewees tackle the day–to–day work of programming, while revealing much more, like how they became great programmers, how they recognize programming talent in others, and what kinds of problems they find most interesting. Hundreds of people have suggested names of programmers to interview on the Coders at Work web site: http://www.codersatwork.com. The complete list was 284 names. Having digested everyone’s feedback, we selected 16 folks who’ve been kind enough to agree to be interviewed:- Frances Allen: Pioneer in optimizing compilers, first woman to win the Turing Award (2006) and first female IBM fellow- Joe Armstrong: Inventor of Erlang- Joshua Bloch: Author of the Java collections framework, now at Google- Bernie Cosell: One of the main software guys behind the original ARPANET IMPs and a master debugger- Douglas Crockford: JSON founder, JavaScript architect at Yahoo!- L. Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1- Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation - Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal - Dan Ingalls: Smalltalk implementor and designer- Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler- Donald Knuth: Author of The Art of Computer Programming and creator of TeX- Peter Norvig: Director of Research at Google and author of the standard text on AI- Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress- Ken Thompson: Inventor of UNIX- Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hackerWhat you’ll learn:How the best programmers in the world do their jobWho is this book for?Programmers interested in the point of view of leaders in the field. Programmers looking for approaches that work for some of these outstanding programmers.

Threat Modeling: Designing for Security


Adam Shostack - 2014
    Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

iPad: The Missing Manual


J.D. Biersdorfer - 2010
    That’s where this full-color Missing Manual comes in. Learn how to stream HD video, make video calls, manage your email, surf the Web, listen to music, play games, and maybe even do a little iWork. This is the book that should have been in the box.Build your media library. Fill your iPad with music, movies, TV shows, eBooks, photos, and more.Share with others. Stream music, HD movies, TV shows, and more, to and from your iPad.Create your own media. Use the iPad’s new Photo Booth, iMovie, and GarageBand apps to express yourself.Get online. Connect through WiFi or Wi-Fi+3G, and surf with the iPad’s faster browser.Place video calls. See who’s talking with the iPad’s FaceTime app and its two cameras.Consolidate your email. Read and send messages from any of your accounts.Learn undocumented tips and tricks. Get the lowdown on cool iPad secrets and workarounds.

The Passionate Programmer


Chad Fowler - 2009
    In this book, you'll learn how to become an entrepreneur, driving your career in the direction of your choosing. You'll learn how to build your software development career step by step, following the same path that you would follow if you were building, marketing, and selling a product. After all, your skills themselves are a product. The choices you make about which technologies to focus on and which business domains to master have at least as much impact on your success as your technical knowledge itself--don't let those choices be accidental. We'll walk through all aspects of the decision-making process, so you can ensure that you're investing your time and energy in the right areas. You'll develop a structured plan for keeping your mind engaged and your skills fresh. You'll learn how to assess your skills in terms of where they fit on the value chain, driving you away from commodity skills and toward those that are in high demand. Through a mix of high-level, thought-provoking essays and tactical "Act on It" sections, you will come away with concrete plans you can put into action immediately. You'll also get a chance to read the perspectives of several highly successful members of our industry from a variety of career paths. As with any product or service, if nobody knows what you're selling, nobody will buy. We'll walk through the often-neglected world of marketing, and you'll create a plan to market yourself both inside your company and to the industry in general. Above all, you'll see how you can set the direction of your career, leading to a more fulfilling and remarkable professional life.

Getting Started with OAuth 2.0


Ryan Boyd - 2011
    This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.Understand OAuth 2.0’s role in authentication and authorizationLearn how OAuth’s Authorization Code flow helps you integrate data from different business applicationsDiscover why native mobile apps use OAuth differently than mobile web appsUse OpenID Connect and eliminate the need to build your own authentication system

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage


Gordon Corera - 2015
    The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.

Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future


Cory Doctorow - 2008
    Content is the first collection of Doctorow’s infamous articles, essays, and polemics.Here’s why Microsoft should stop treating its customers as criminals (through relentless digital-rights management); how America chose copyright and Happy Meal toys over jobs; why Facebook is taking a faceplant; how Wikipedia is a poor cousin of The Hitchhiker’s Guide to the Galaxy; and, of course, why free e-books kick ass.Accessible to geeks and noobs (if you’re not sure what that means, it’s you) alike, Content is a must-have compilation from Cory Doctorow, who will be glad to take you along for the ride as he effortlessly surfs the zeitgeist.