Book picks similar to
The Real-Time Specification for Java by James Gosling
00otherlanguages
it-wikipedia
technology
Aloha, Magnum: Larry Manetti's Magnum, P.I. Memories
Larry Manetti - 1999
Aloha Magnum is a chronicle of Larry Manetti's wild childhood, his crazy days in Hollywood, his moonlighting as a prominent restaurateur, and his escapades with the rich, famous, and equally outrageous.
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier - 2000
Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.
Radiohead: Hysterical and Useless
Martin Clarke - 1999
Starting with the band's origins in Oxford, journalist Martin Clarke covers the essential points: Radiohead's breakout single "Creep," the pivotal album OK Computer, Thom Yorke's continuing political and artistic evolution, and the band's future. This revised edition includes a close look at how the band escaped the rock straightjacket with Kid A and Amnesiac , as well as their most recent album, Hail to the Thief . Clark also offers an in-depth examination of the outspoken, mysterious Yorke, offering insight into the personal demons the vocalist has battled throughout his career as Radiohead's frontman. An incisive look at one of the world's most beloved, followed musical acts, Radiohead: Hysterical and Useless provides stimulating coverage of a provocative group.
Essays in Science
Albert Einstein - 1934
That unfortunate situation began to change when Einstein published several of the papers and speeches contained in this book which explain the central core of the theory in clear and often beautiful language accessible to any interested reader.In addition to lucid explications of both the Special and General theories, Einstein holds forth on the principles of research, the nature of scientific truth, and the method of theoretical physics. He also offers acute analyses and appreciation of the work of such giants as Johannes Kepler, Isaac Newton, Clerk Maxwell, and Niels Bohr.
1001 Video Games You Must Play Before You Die
Tony MottMitch Krpata - 2010
The video game has arrived as entertainment and as an art form. This is the first serious critical evaluation ever published of the best video games and is a testament to the medium’s innovativeness and increasing emphasis on aesthetics. Organized chronologically and for all platforms (PC, Xbox, PlayStation, etc.) and covering all genres from the bold (Grand Theft Auto and Halo) and dark (Resident Evil and Silent Hill) to the spiritual (Final Fantasy) and whimsical (Legend of Zelda), the book traces the video game from the rough early days of Pong to the latest visual fantasia.
Documents on the Rape of Nanking
Timothy Brook - 1999
What ended in one atrocity began with another: the savage military takeover of China's capital city, which quickly became known as the Rape of Nanking. The Japanese Army's conduct from December 1937 to February 1938 constitutes one of the most barbarous events not just of the war but of the century. The violence was documented at the time and then redocumented during the war crimes trial in Tokyo after the war. This book brings together materials from both moments to provide the first comprehensive dossier of primary sources on the Rape.Part 1, "The Records," includes two sources written as the Rape was underway. The first is a long set of documents produced by the International Committee for the Nanking Safety Zone, a group of foreigners who strove to protect the Chinese residents. The second is a series of letters that American surgeon Dr. Robert Wilson wrote for his family during the same period. These letters are published here for the first time.The evidence compiled by the International Committee and its members would be decisive for the indictments against Japanese leaders at the International Military Tribunal for the Far East in Tokyo. Part 2, "The Judgments," reprints portions of the tribunal's 1948 judgment dealing with the Rape of Nanking, its judicial consequences, and sections of the dissenting judgment of Justice Radhabinod Pal.These contemporary records and judgments create an intimate firsthand account of the Rape of Nanking. Together they are intended to stimulate deeper reflection than previously possible on how and why we assess and assign the burden of war guilt.Timothy Brook is Professor of Chinese History and Associate Director of the Joint Centre for Asia Pacific Studies, University of Toronto, and is coeditor of Nation Work: Asian Elites and National Identities and Cultureand Economy: The Shaping of Capitalism in Eastern Asia, both published by the University of Michigan Press.
Black Knight: Ritchie Blackmore
Jerry Bloom - 2006
Dubbed the 'man in black', guitarist Ritchie Blackmore found fame with Seventies rock giants Deep Purple, then walked away from them to create Rainbow, only to abandon them and form another band in 1997 - Blackmore's Night.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
Smart Mobs: The Next Social Revolution
Howard Rheingold - 2002
The coming wave, says Rheingold, is the result of super-efficient mobile communications-cellular phones, personal digital assistants, and wireless-paging and Internet-access devices that will allow us to connect with anyone, anywhere, anytime. From the amusing ("Lovegetty" devices in Japan that light up when a person with the right date-potential characteristics appears in the vicinity) to the extraordinary (the overthrow of a repressive regime in the Philippines by political activists who mobilized by forwarding text messages via cell phones), Rheingold gives examples of the fundamentally new ways in which people are already engaging in group or collective action. He also considers the dark side of this phenomenon, such as the coordination of terrorist cells, threats to privacy, and the ability to incite violent behavior. Applying insights from sociology, artificial intelligence, engineering, and anthropology, Rheingold offers a penetrating perspective on the brave new convergence of pop culture, cutting-edge technology, and social activism. At the same time, he reminds us that, as with other technological revolutions, the real impact of mobile communications will come not from the technology itself but from how people use it, resist it, adapt to it, and ultimately use it to transform themselves, their communities, and their institutions.
Who Controls the Internet?: Illusions of a Borderless World
Jack L. Goldsmith - 2006
It's a book about the fate of one idea--that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Google's struggles with the French government and Yahoo's capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBay's struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them.While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance.Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.
Hard Drive: Bill Gates and the Making of the Microsoft Empire
James Wallace - 1992
Part entrepreneur, part enfant terrible, Gates has become the most powerful -- and feared -- player in the computer industry, and arguably the richest man in America. In Hard Drive, investigative reporters Wallace and Erickson follow Gates from his days as an unkempt thirteen-year-old computer hacker to his present-day status as a ruthless billionaire CEO. More than simply a "revenge of the nerds" story though, this is a balanced analysis of a business triumph, and a stunningly driven personality. The authors have spoken to everyone who knows anything about Bill Gates and Microsoft -- from childhood friends to employees and business rivals who reveal the heights, and limits, of his wizardry. From Gates's singular accomplishments to his equally extraordinary brattiness, arrogance, and hostility (the atmosphere is so intense at Microsoft that stressed-out programmers have been known to ease the tension of their eighty-hour workweeks by exploding homemade bombs), this is a uniquely revealing glimpse of the person who has emerged as the undisputed king of a notoriously brutal industry.
If the Universe Is Teeming with Aliens ... Where Is Everybody?: Fifty Solutions to the Fermi Paradox and the Problem of Extraterrestrial Life
Stephen Webb - 2002
He provides readers with non-trivial insights into research fields they may not have encountered previously . . . I think everyone who has ever considered the possibility that other intelligent civilizations exist elsewhere within our galaxy will enjoy Where Is Everybody? They will find much to agree with, and much to argue about, in this very accessible volume.� �SCIENCE During a Los Alamos lunchtime conversation that took place more than 50 years ago, four world-class scientists agreed, given the size and age of the Universe, that advanced extraterrestrial civilizations simply had to exist. The sheer numbers demanded it. But one of the four, the renowned physicist and back-of-the-envelope calculator Enrico Fermi, asked the telling question: If the extraterrestrial life proposition is true, he wondered, "Where IS everybody?" In this lively and thought-provoking book, Stephen Webb presents a detailed discussion of the 50 most cogent and intriguing answers to Fermi's famous question, divided into three distinct groups: - Aliens are already here among us. Here are answers ranging from Leo Szilard's suggestion that they are already here, and we know them as Hungarians, to the theorists who claim that aliens built Stonehenge and the Easter Island statues. - Aliens exist, but have not yet communicated. The theories in this camp range widely, from those who believe we simply don't have the technologies to receive their signals, to those who believe the enormities of space and time work against communication, to those who believe they're hiding from us. - Aliens do not exist. Here are the doubters' arguments, from the Rare Earth theory to the author's own closely argued and cogently stated skepticism. The proposed solutions run the gamut from the crackpot to the highly serious, but all deserve our consideration. The varieties of arguments -- from first-rate scientists, philosophers and historians, and science fiction authors -- turn out to be astonishing, entertaining, and vigorous intellectual exercises for any reader interested in science and the sheer pleasure of speculative thinking. Stephen Webb is a physicist working at the Open University in England and the author of Measuring the Universe.
The Biotech Century
Jeremy Rifkin - 1998
With living proof that such advancements are no longer the stuff of science fiction, a whole new world of possibilities--and dangers--presented itself. Jeremy Rifkin is more concerned with the dangers of this technology, and in The Biotech Century , he presents numerous compelling reasons why we should be, too. Many of these dangers revolve around the seemingly inevitable commercialization of genetically engineered life forms that would come if corporations battled for the rights to patents on new or modified species of plants, animals, or even human beings. Rifkin warns that "designer" babies and genetically perfect humans, along with any other artificial creations, would wreak havoc with the gene pool and the natural environment. While he concedes that there are benefits to biotechnology, he makes it clear that the risks far outweigh the rewards at this time, urging for greater restraint and responsibility before opening what could be a Pandora's box.
Surfaces and Essences: Analogy as the Fuel and Fire of Thinking
Douglas R. Hofstadter - 2011
Hofstadter has been grappling with the mysteries of human thought for over thirty years. Now, with his trademark wit and special talent for making complex ideas vivid, he has partnered with Sander to put forth a highly novel perspective on cognition.We are constantly faced with a swirling and intermingling multitude of ill-defined situations. Our brain’s job is to try to make sense of this unpredictable, swarming chaos of stimuli. How does it do so? The ceaseless hail of input triggers analogies galore, helping us to pinpoint the essence of what is going on. Often this means the spontaneous evocation of words, sometimes idioms, sometimes the triggering of nameless, long-buried memories.Why did two-year-old Camille proudly exclaim, “I undressed the banana!”? Why do people who hear a story often blurt out, “Exactly the same thing happened to me!” when it was a completely different event? How do we recognize an aggressive driver from a split-second glance in our rearview mirror? What in a friend’s remark triggers the offhand reply, “That’s just sour grapes”? What did Albert Einstein see that made him suspect that light consists of particles when a century of research had driven the final nail in the coffin of that long-dead idea?The answer to all these questions, of course, is analogy-making—the meat and potatoes, the heart and soul, the fuel and fire, the gist and the crux, the lifeblood and the wellsprings of thought. Analogy-making, far from happening at rare intervals, occurs at all moments, defining thinking from top to toe, from the tiniest and most fleeting thoughts to the most creative scientific insights.Like Gödel, Escher, Bach before it, Surfaces and Essences will profoundly enrich our understanding of our own minds. By plunging the reader into an extraordinary variety of colorful situations involving language, thought, and memory, by revealing bit by bit the constantly churning cognitive mechanisms normally completely hidden from view, and by discovering in them one central, invariant core—the incessant, unconscious quest for strong analogical links to past experiences—this book puts forth a radical and deeply surprising new vision of the act of thinking.
Michael Jackson: The Visual Documentary
Adrian Grant - 1995
Illustrated with hundreds of photographs, this visual documentary of Michael Jackson presents all the facts and includes his records, concerts, videos and awards, his public appearances and performances, memorabilia and records you never knew existed.