Book picks similar to
Blockchain and the Law: The Rule of Code by Primavera De Filippi
blockchain
law
technology
crypto
Postcapitalism: A Guide to Our Future
Paul Mason - 2015
Over the past two centuries or so, capitalism has undergone continual change - economic cycles that lurch from boom to bust - and has always emerged transformed and strengthened. Surveying this turbulent history, Paul Mason wonders whether today we are on the brink of a change so big, so profound, that this time capitalism itself, the immensely complex system by which entire societies function, has reached its limits and is changing into something wholly new.At the heart of this change is information technology: a revolution that, as Mason shows, has the potential to reshape utterly our familiar notions of work, production and value; and to destroy an economy based on markets and private ownership - in fact, he contends, it is already doing so. Almost unnoticed, in the niches and hollows of the market system, whole swathes of economic life are changing.. Goods and services that no longer respond to the dictates of neoliberalism are appearing, from parallel currencies and time banks, to cooperatives and self-managed online spaces. Vast numbers of people are changing their behaviour, discovering new forms of ownership, lending and doing business that are distinct from, and contrary to, the current system of state-backed corporate capitalism.In this groundbreaking book Mason shows how, from the ashes of the recent financial crisis, we have the chance to create a more socially just and sustainable global economy. Moving beyond capitalism, he shows, is no longer a utopian dream. This is the first time in human history in which, equipped with an understanding of what is happening around us, we can predict and shape, rather than simply react to, seismic change.
Python Pocket Reference
Mark Lutz - 1998
Hundreds of thousands of Python developers around the world rely on Python for general-purpose tasks, Internet scripting, systems programming, user interfaces, and product customization. Available on all major computing platforms, including commercial versions of Unix, Linux, Windows, and Mac OS X, Python is portable, powerful and remarkable easy to use.With its convenient, quick-reference format, "Python Pocket Reference," 3rd Edition is the perfect on-the-job reference. More importantly, it's now been refreshed to cover the language's latest release, Python 2.4. For experienced Python developers, this book is a compact toolbox that delivers need-to-know information at the flip of a page. This third edition also includes an easy-lookup index to help developers find answers fast!Python 2.4 is more than just optimization and library enhancements; it's also chock full of bug fixes and upgrades. And these changes are addressed in the "Python Pocket Reference," 3rd Edition. New language features, new and upgraded built-ins, and new and upgraded modules and packages--they're all clarified in detail.The "Python Pocket Reference," 3rd Edition serves as the perfect companion to "Learning Python" and "Programming Python."
The Visual Display of Quantitative Information
Edward R. Tufte - 1983
Theory and practice in the design of data graphics, 250 illustrations of the best (and a few of the worst) statistical graphics, with detailed analysis of how to display data for precise, effective, quick analysis. Design of the high-resolution displays, small multiples. Editing and improving graphics. The data-ink ratio. Time-series, relational graphics, data maps, multivariate designs. Detection of graphical deception: design variation vs. data variation. Sources of deception. Aesthetics and data graphical displays. This is the second edition of The Visual Display of Quantitative Information. Recently published, this new edition provides excellent color reproductions of the many graphics of William Playfair, adds color to other images, and includes all the changes and corrections accumulated during 17 printings of the first edition.
The Model Thinker: What You Need to Know to Make Data Work for You
Scott E. Page - 2018
But as anyone who has ever opened up a spreadsheet packed with seemingly infinite lines of data knows, numbers aren't enough: we need to know how to make those numbers talk. In The Model Thinker, social scientist Scott E. Page shows us the mathematical, statistical, and computational models—from linear regression to random walks and far beyond—that can turn anyone into a genius. At the core of the book is Page's "many-model paradigm," which shows the reader how to apply multiple models to organize the data, leading to wiser choices, more accurate predictions, and more robust designs. The Model Thinker provides a toolkit for business people, students, scientists, pollsters, and bloggers to make them better, clearer thinkers, able to leverage data and information to their advantage.
Python for Everybody: Exploring Data in Python 3
Charles Severance - 2016
You can think of the Python programming language as your tool to solve data problems that are beyond the capability of a spreadsheet.Python is an easy to use and easy to learn programming language that is freely available on Macintosh, Windows, or Linux computers. So once you learn Python you can use it for the rest of your career without needing to purchase any software.This book uses the Python 3 language. The earlier Python 2 version of this book is titled "Python for Informatics: Exploring Information".
The Four: The Hidden DNA of Amazon, Apple, Facebook, and Google
Scott Galloway - 2017
Just about everyone thinks they know how they got there. Just about everyone is wrong. For all that's been written about the Four over the last two decades, no one has captured their power and staggering success as insightfully as Scott Galloway.Instead of buying the myths these compa-nies broadcast, Galloway asks fundamental questions. How did the Four infiltrate our lives so completely that they're almost impossible to avoid (or boycott)? Why does the stock market forgive them for sins that would destroy other firms? And as they race to become the world's first trillion-dollar company, can anyone chal-lenge them?In the same irreverent style that has made him one of the world's most celebrated business professors, Galloway deconstructs the strategies of the Four that lurk beneath their shiny veneers. He shows how they manipulate the fundamental emotional needs that have driven us since our ancestors lived in caves, at a speed and scope others can't match. And he reveals how you can apply the lessons of their ascent to your own business or career.Whether you want to compete with them, do business with them, or simply live in the world they dominate, you need to understand the Four.
Practical Cryptography
Niels Ferguson - 2003
The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
Web Analytics 2.0: The Art of Online Accountability & Science of Customer Centricity [With CDROM]
Avinash Kaushik - 2009
"Web Analytics 2.0" presents a new framework that will permanently change how you think about analytics. It provides specific recommendations for creating an actionable strategy, applying analytical techniques correctly, solving challenges such as measuring social media and multichannel campaigns, achieving optimal success by leveraging experimentation, and employing tactics for truly listening to your customers. The book will help your organization become more data driven while you become a super analysis ninja Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Habeas Data: Privacy vs. the Rise of Surveillance Tech
Cyrus Farivar - 2018
That means all of the technologies that have made our lives easier, faster, better, and/or more efficient have also simultaneously made it easier to keep an eye on our activities. Or, as we recently learned from reports about Cambridge Analytica, our data might be turned into a propaganda machine against us. In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy.
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.
Invisible Women: Data Bias in a World Designed for Men
Caroline Criado Pérez - 2019
From economic development, to healthcare, to education and public policy, we rely on numbers to allocate resources and make crucial decisions. But because so much data fails to take into account gender, because it treats men as the default and women as atypical, bias and discrimination are baked into our systems. And women pay tremendous costs for this bias, in time, money, and often with their lives.Celebrated feminist advocate Caroline Criado Perez investigates the shocking root cause of gender inequality and research in Invisible Women, diving into women’s lives at home, the workplace, the public square, the doctor’s office, and more. Built on hundreds of studies in the US, the UK, and around the world, and written with energy, wit, and sparkling intelligence, this is a groundbreaking, unforgettable exposé that will change the way you look at the world.
Jony Ive: The Genius Behind Apple's Greatest Products
Leander Kahney - 2013
Doing something that’s genuinely better is very hard.” —Jony IveIn 1997, Steve Jobs returned to Apple as CEO with the unenviable task of turning around the company he had founded. One night, Jobs discovered a scruffy British designer toiling away at Apple’s corporate headquarters, surrounded by hundreds of sketches and prototypes. It was then that Jobs realized he had found a talent who could reverse the company’s long decline.That young designer was Jony Ive. Jony Ive’s collaboration with Jobs would produce some of the world’s most iconic technology products, including the iMac, iPod, iPad, and iPhone. The designs have not only made Apple a hugely valuable company, they’ve overturned entire industries, built a loyal fan base, and created a globally powerful brand. Along the way, Jony Ive has become the world’s leading technology innovator, won countless design awards, earned a place on the 2013 Time 100 list, and was even knighted for his “services to design and enterprise.”Yet despite his triumphs, little is known about the shy and soft-spoken whiz whom Jobs referred to as his “spiritual partner” at Apple. Jony Ive reveals the true story of Apple’s real innovator-in-chief.Leander Kahney, the bestselling author of Inside Steve’s Brain, offers a detailed portrait of a creative genius. He shows us how Jony Ive went from an English art school student with dyslexia to the man whose immense insights have altered the pattern of our lives. From his early interest in industrial design, fostered by his designer father, through his education at Newcastle Polytechnic and meteoric rise at Apple, we discover the principles and practices that he developed to become the designer of his generation.Based on interviews with Jony Ive’s former colleagues and Kahney’s own familiarity with the world of Apple, this book gives insight into how Jony Ive (now senior vice president of design) has redefined the ways in which we work, entertain, and communicate with one another.
How Music Got Free: The End of an Industry, the Turn of the Century, and the Patient Zero of Piracy
Stephen Richard Witt - 2015
It’s about the greatest pirate in history, the most powerful executive in the music business, a revolutionary invention and an illegal website four times the size of the iTunes Music Store. Journalist Stephen Witt traces the secret history of digital music piracy, from the German audio engineers who invented the mp3, to a North Carolina compact-disc manufacturing plant where factory worker Dell Glover leaked nearly two thousand albums over the course of a decade, to the high-rises of midtown Manhattan where music executive Doug Morris cornered the global market on rap, and, finally, into the darkest recesses of the Internet.Through these interwoven narratives, Witt has written a thrilling book that depicts the moment in history when ordinary life became forever entwined with the world online — when, suddenly, all the music ever recorded was available for free. In the page-turning tradition of writers like Michael Lewis and Lawrence Wright, Witt’s deeply-reported first book introduces the unforgettable characters—inventors, executives, factory workers, and smugglers—who revolutionized an entire artform, and reveals for the first time the secret underworld of media pirates that transformed our digital lives.An irresistible never-before-told story of greed, cunning, genius, and deceit, How Music Got Free isn’t just a story of the music industry—it’s a must-read history of the Internet itself.
Eniac: The Triumphs and Tragedies of the World's First Computer
Scott McCartney - 1999
10 illustrations.
Data Science for Business: What you need to know about data mining and data-analytic thinking
Foster Provost - 2013
This guide also helps you understand the many data-mining techniques in use today.Based on an MBA course Provost has taught at New York University over the past ten years, Data Science for Business provides examples of real-world business problems to illustrate these principles. You’ll not only learn how to improve communication between business stakeholders and data scientists, but also how participate intelligently in your company’s data science projects. You’ll also discover how to think data-analytically, and fully appreciate how data science methods can support business decision-making.Understand how data science fits in your organization—and how you can use it for competitive advantageTreat data as a business asset that requires careful investment if you’re to gain real valueApproach business problems data-analytically, using the data-mining process to gather good data in the most appropriate wayLearn general concepts for actually extracting knowledge from dataApply data science principles when interviewing data science job candidates