Book picks similar to
Protect Your Tech: Your geek-free guide to a secure and private digital life by Mish Slade
ebook
have
1-computing-net
computer
Veggies Not Included: Tales of a Triple Digit Weight Loss from the Fast Food Lane
Christine Leo - 2014
Christine Leo lost 130 pounds following a wakeup call that included a gyno trip from hell, a bridal boutique snub and a Jumbotron screen. The girl who had been picked on and pushed around since primary school decided it was finally time to take back control of her life. Instead of following the diet paths most frequently traveled, she lost 7 pant sizes by counting calories in her favorite types of fast food (cheeseburgers, burritos, ice cream, cookies, and the like). She has kept the weight off for nearly five years and did it all without ever donning the dieting superhero cape most do. Readers looking for a down-to-earth weight loss perspective and a glimpse of the life after the new body euphoria has worn off will appreciate Veggies Not Included.
Homo Deus: A History of Tomorrow
Yuval Noah Harari - 2015
This may seem hard to accept, but, as Harari explains in his trademark style—thorough, yet riveting—famine, plague and war have been transformed from incomprehensible and uncontrollable forces of nature into manageable challenges. For the first time ever, more people die from eating too much than from eating too little; more people die from old age than from infectious diseases; and more people commit suicide than are killed by soldiers, terrorists and criminals put together. The average American is a thousand times more likely to die from binging at McDonalds than from being blown up by Al Qaeda.What then will replace famine, plague, and war at the top of the human agenda? As the self-made gods of planet earth, what destinies will we set ourselves, and which quests will we undertake? Homo Deus explores the projects, dreams and nightmares that will shape the twenty-first century—from overcoming death to creating artificial life. It asks the fundamental questions: Where do we go from here? And how will we protect this fragile world from our own destructive powers? This is the next stage of evolution. This is Homo Deus.With the same insight and clarity that made Sapiens an international hit and a New York Times bestseller, Harari maps out our future.
Building Microservices: Designing Fine-Grained Systems
Sam Newman - 2014
But developing these systems brings its own set of headaches. With lots of examples and practical advice, this book takes a holistic view of the topics that system architects and administrators must consider when building, managing, and evolving microservice architectures.Microservice technologies are moving quickly. Author Sam Newman provides you with a firm grounding in the concepts while diving into current solutions for modeling, integrating, testing, deploying, and monitoring your own autonomous services. You'll follow a fictional company throughout the book to learn how building a microservice architecture affects a single domain.Discover how microservices allow you to align your system design with your organization's goalsLearn options for integrating a service with the rest of your systemTake an incremental approach when splitting monolithic codebasesDeploy individual microservices through continuous integrationExamine the complexities of testing and monitoring distributed servicesManage security with user-to-service and service-to-service modelsUnderstand the challenges of scaling microservice architectures
76 Fallacies
Michael LaBossiere - 2012
That is, it is a piece of bad logic. Just as it is a good idea to avoid eating bad food, it is also a rather good idea to avoid bad reasoning. Unfortunately, bad reasoning is all too common—it pours out of the television and infests the web like an army of venomous spiders. Perhaps even worse than the fallacies inflicted from the outside are self-inflicted fallacies. These can lead people to make poor decisions about matters great and small.Fortunately, there is a defense against bad reasoning, namely knowledge. This concise book provides the reader with definitions and examples of seventy-six common fallacies—the knowledge a person needs to defend herself in a world awash in fallacies.In addition to combining the content of my 42 Fallacies and 30 More Fallacies, this book features some revisions as well as a new section on common formal fallacies. The focus is on providing the reader with definitions and examples of these common fallacies rather than being a handbook on winning arguments or a text on general logic.The book presents the following 73 informal fallacies:Accent, Fallacy ofAccident, Fallacy ofAd HominemAd Hominem Tu QuoqueAmphiboly, Fallacy ofAnecdotal Evidence, Fallacy OfAppeal to the Consequences of a BeliefAppeal to Authority, FallaciousAppeal to BeliefAppeal to Common PracticeAppeal to EmotionAppeal to EnvyAppeal to FearAppeal to FlatteryAppeal to Group IdentityAppeal to GuiltAppeal to NoveltyAppeal to PityAppeal to PopularityAppeal to RidiculeAppeal to SpiteAppeal to TraditionAppeal to SilenceAppeal to VanityArgumentum ad HitlerumBegging the QuestionBiased GeneralizationBurden of ProofComplex QuestionComposition, Fallacy ofConfusing Cause and EffectConfusing Explanations and ExcusesCircumstantial Ad HominemCum Hoc, Ergo Propter HocDivision, Fallacy ofEquivocation, Fallacy ofFallacious ExampleFallacy FallacyFalse DilemmaGambler’s FallacyGenetic FallacyGuilt by AssociationHasty GeneralizationHistorian’s FallacyIllicit ConversionIgnoring a Common CauseIncomplete EvidenceMiddle GroundMisleading VividnessMoving the Goal PostsOversimplified CauseOverconfident Inference from Unknown StatisticsPathetic FallacyPeer PressurePersonal AttackPoisoning the WellPositive Ad HominemPost HocProving X, Concluding YPsychologist's fallacyQuestionable CauseRationalizationRed HerringReification, Fallacy ofRelativist FallacySlippery SlopeSpecial PleadingSpotlightStraw ManTexas Sharpshooter FallacyTwo Wrongs Make a RightVictim FallacyWeak AnalogyThe book contains the following three formal (deductive) fallacies:Affirming the ConsequentDenying the AntecedentUndistributed Middle
Without Their Permission: How the 21st Century Will Be Made, Not Managed
Alexis Ohanian - 2013
And when that power is harnessed to create new communities, technologies, businesses or charities, the results can be absolutely stunning. In this book, Alexis will share his ideas, tips and even his own doodles about harnessing the power of the web for good, and along the way, he will share his philosophy with young entrepreneurs all over the globe. At 29, Ohanian has come to personify the dorm-room tech entrepreneur, changing the world without asking permission. Within a couple of years of graduating from the University of Virginia, Ohanian did just that, selling reddit for millions of dollars. He's gone on to start many other companies, like hipmunk and breadpig, all while representing Y Combinator and investing in over sixty other tech startups. Without Their Permission is his personal guidebook as to how other aspiring entrepreneurs can follow in his footsteps.
Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture
David Kushner - 2003
Together, they ruled big business. They transformed popular culture. And they provoked a national controversy. More than anything, they lived a unique and rollicking American Dream, escaping the broken homes of their youth to produce the most notoriously successful game franchises in history—Doom and Quake— until the games they made tore them apart. This is a story of friendship and betrayal, commerce and artistry—a powerful and compassionate account of what it's like to be young, driven, and wildly creative.
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
Design Patterns: Elements of Reusable Object-Oriented Software
Erich Gamma - 1994
Previously undocumented, these 23 patterns allow designers to create more flexible, elegant, and ultimately reusable designs without having to rediscover the design solutions themselves.The authors begin by describing what patterns are and how they can help you design object-oriented software. They then go on to systematically name, explain, evaluate, and catalog recurring designs in object-oriented systems. With Design Patterns as your guide, you will learn how these important patterns fit into the software development process, and how you can leverage them to solve your own design problems most efficiently. Each pattern describes the circumstances in which it is applicable, when it can be applied in view of other design constraints, and the consequences and trade-offs of using the pattern within a larger design. All patterns are compiled from real systems and are based on real-world examples. Each pattern also includes code that demonstrates how it may be implemented in object-oriented programming languages like C++ or Smalltalk.
Nmap Cookbook: The Fat-free Guide to Network Scanning
Nicholas Marsh - 2010
Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and security auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - A Nmap scan comparison utilitySimplified coverage of Nmap 5.00 features.
Systems Analysis & Design in a Changing World
John W. Satzinger - 2000
The Fourth Edition maintains the dual focus on the concepts and techniques from both the traditional, structured approach and the object-oriented approach to systems development. Instructors have the flexibility to emphasize one approach over the other, or both, while referring to one integrated case study that runs through every chapter.
Concrete Mathematics: A Foundation for Computer Science
Ronald L. Graham - 1988
"More concretely," the authors explain, "it is the controlled manipulation of mathematical formulas, using a collection of techniques for solving problems."
Five Steps to Communicating with Spirit: Book 1: Open the Door to the Spirit World in 5 Easy Steps!
Clare McNaul - 2012
- The difference between spirit guides and your loved ones in spirit - yes, there is a difference! - The importance of Intention and Meditation. - The TRUTH about Protection. What it is and what it is NOT. This is important information that everyone who wants to nurture his or her relationship with the spirit world must know. - The significance of symbols. - The two most powerful steps that will make all the difference to your development and success! …and more! Five Steps to Communicating with Spirit has been designed to support, encourage and help those who are just starting out on their journey to connecting with spirit. It offers safe and sound guidance from an experienced, natural born medium who has been in your shoes. While aimed at beginners, those who have already begun their development and are looking for ways to improve their skills or add to their practice will also find this book valuable. You are just a few pages away from knowing exactly how to start developing and nurturing your ability to communicate with spirit! Don't miss Five MORE Steps to Communicating with Spirit Book 2: Mobilize Your Medium Within! available on Amazon NOW. Get your copy today!
The Internet is a Playground
David Thorne - 2010
The complete collection of articles and emails from 27bslash6 such as Overdue Account, Party in Apartment 3 and Strata Agreement plus articles too litigious to be on the website.
Zero Day: The Threat In Cyberspace
Robert O'Harrow Jr. - 2013
For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.
Python Programming for Beginners: An Introduction to the Python Computer Language and Computer Programming (Python, Python 3, Python Tutorial)
Jason Cannon - 2014
There can be so much information available that you can't even decide where to start. Or worse, you start down the path of learning and quickly discover too many concepts, commands, and nuances that aren't explained. This kind of experience is frustrating and leaves you with more questions than answers.Python Programming for Beginners doesn't make any assumptions about your background or knowledge of Python or computer programming. You need no prior knowledge to benefit from this book. You will be guided step by step using a logical and systematic approach. As new concepts, commands, or jargon are encountered they are explained in plain language, making it easy for anyone to understand. Here is what you will learn by reading Python Programming for Beginners:
When to use Python 2 and when to use Python 3.
How to install Python on Windows, Mac, and Linux. Screenshots included.
How to prepare your computer for programming in Python.
The various ways to run a Python program on Windows, Mac, and Linux.
Suggested text editors and integrated development environments to use when coding in Python.
How to work with various data types including strings, lists, tuples, dictionaries, booleans, and more.
What variables are and when to use them.
How to perform mathematical operations using Python.
How to capture input from a user.
Ways to control the flow of your programs.
The importance of white space in Python.
How to organize your Python programs -- Learn what goes where.
What modules are, when you should use them, and how to create your own.
How to define and use functions.
Important built-in Python functions that you'll use often.
How to read from and write to files.
The difference between binary and text files.
Various ways of getting help and find Python documentation.
Much more...
Every single code example in the book is available to download, providing you with all the Python code you need at your fingertips! Scroll up, click the Buy Now With 1 Click button and get started learning Python today!