Hackers: Heroes of the Computer Revolution
Steven Levy - 1984
That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused here-is alive and well.
Ethics in Information Technology
George W. Reynolds - 2002
This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.
Bad Ideas?: An Arresting History of Our Inventions
Robert Winston - 2009
Indeed our ability to do so is what separates we humans from the rest of the animal world. The moment man first converted a stone to a useful tool set him on a relentless path toward greater power over his environment. But have our creative ideas always produced desirable results in line with their original good intention? Have they really served us well?BAD IDEAS? traces the fascinating history of our attempts at self-improvement but also questions their value. The dubious consequences of the development of weaponry, for example, is self-evident. But what of apparently more innocuous inventions such as farming, writing or medicine? All started off for the greater good but have since produced unforeseen fallout that continues to this day. What are their undesirable side-effects, when did they emerge and where will they take us in the future?Written against a huge historical canvas, we join Robert Winston on a thrilling journey from our earliest days to the present. We learn about the history of modern science, engineering, IT and much more. We meet the individuals who played a key role in their development, and share quirky anecdotes about their lives and brainwaves. Inspiring, unusual, and at times controversial, BAD IDEAS? assesses the past and also looks forward to the opportunities and ethical challenges of the future. In so doing it celebrates man's extraordinary capacity for achievement whilst warning us that his good intentions can sometimes end up as thoroughly bad ideas.
The Pirate's Dilemma: How Youth Culture Is Reinventing Capitalism
Matt Mason - 2007
Hip-hop, rave, graffiti, and gaming took it to another level, and now modern technology has made the ideas and innovations of youth culture increasingly intimate and increasingly global at the same time.In "The Pirate's Dilemma," "VICE" magazine's Matt Mason -- poised to become the Malcolm Gladwell of the iPod Generation -- brings the exuberance of a passionate music fan and the technological savvy of an IT wizard to the task of sorting through the changes brought about by the interface of pop culture and innovation. He charts the rise of various youth movements -- from pirate radio to remix culture -- and tracks their ripple effect throughout larger society. Mason brings a passion and a breadth of intelligence to questions such as the following: How did a male model who messed with disco records in the 1970s influence the way Boeing designs airplanes? Who was the nun who invented dance music, and how is her influence undermining capitalism as we know it? Did three high school kids who remixed Nazis into Smurfs in the 1980s change the future of the video game industry? Can hip-hop really bring about world peace? Each chapter crystallizes the idea behind one of these fringe movements and shows how it combined with technology to subvert old hierarchies and empower the individual.With great wit and insight -- and a cast of characters that includes such icons as the Ramones, Andy Warhol, Madonna, Russell Simmons, and 50 Cent -- Mason uncovers the trends that have transformed countercultural scenes into burgeoning global industries and movements, ultimately changing our way of life.
Sonic Wonderland: A Scientific Odyssey of Sound
Trevor J. Cox - 2014
Until the day he heard something so astonishing that he had an epiphany: rather than quashing rare or bizarre sounds, we should be celebrating these sonic treasures.This is the story of his investigation into the mysteries of these Sonic Wonders of the World. In the Mojave Desert he finds sand dunes that sing. In France he discovers an echo that tells jokes. In California he drives down a musical road that plays the William Tell Overture. In Cathedrals across the world he learns how acoustics changed the history of the Church.Touching on physics, music, archaeology, neuroscience, biology, and design, Cox explains how sound is made and altered by the environment and how our body reacts to peculiar noises – from the exotic sonic wonders he encounters on his journey, or the equally unique and surprising sounds of our everyday environment.In a world dominated by the visual, Sonic Wonderland encourages us to become better listeners and to open our ears to the glorious cacophony around us. Listen to a selection of astonishing sounds here: https://soundcloud.com/sonicwonderland
Understanding and Using C Pointers
Richard Reese - 2013
With this practical book, you’ll learn how pointers provide the mechanism to dynamically manipulate memory, enhance support for data structures, and enable access to hardware. Author Richard Reese shows you how to use pointers with arrays, strings, structures, and functions, using memory models throughout the book.Difficult to master, pointers provide C with much flexibility and power—yet few resources are dedicated to this data type. This comprehensive book has the information you need, whether you’re a beginner or an experienced C or C++ programmer or developer.Get an introduction to pointers, including the declaration of different pointer typesLearn about dynamic memory allocation, de-allocation, and alternative memory management techniquesUse techniques for passing or returning data to and from functionsUnderstand the fundamental aspects of arrays as they relate to pointersExplore the basics of strings and how pointers are used to support themExamine why pointers can be the source of security problems, such as buffer overflowLearn several pointer techniques, such as the use of opaque pointers, bounded pointers and, the restrict keyword
You Don't Know JS: Up & Going
Kyle Simpson - 2015
With the "You Don’t Know JS" book series, you’ll get a more complete understanding of JavaScript, including trickier parts of the language that many experienced JavaScript programmers simply avoid.The series’ first book, Up & Going, provides the necessary background for those of you with limited programming experience. By learning the basic building blocks of programming, as well as JavaScript’s core mechanisms, you’ll be prepared to dive into the other, more in-depth books in the series—and be well on your way toward true JavaScript.With this book you will:
Learn the essential programming building blocks, including operators, types, variables, conditionals, loops, and functions
Become familiar with JavaScript's core mechanisms such as values, function closures, this, and prototypes
Get an overview of other books in the series—and learn why it’s important to understand all parts of JavaScript
Mason Bee Revolution: How the Hardest Working Bee Can Save the World - One Backyard at a Time
Dave Hunter - 2016
Honeybees Make Honey; Mason Bees Make Food.
Head First Design Patterns
Eric Freeman - 2004
At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take advantage of the best practices and experience of others, so that you can spend your time on...something else. Something more challenging. Something more complex. Something more fun. You want to learn about the patterns that matter--why to use them, when to use them, how to use them (and when NOT to use them). But you don't just want to see how patterns look in a book, you want to know how they look "in the wild". In their native environment. In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java's built-in pattern support in your own code. You want to learn the real OO design principles and why everything your boss told you about inheritance might be wrong (and what to do instead). You want to learn how those principles will help the next time you're up a creek without a design pattern. Most importantly, you want to learn the "secret language" of Design Patterns so that you can hold your own with your co-worker (and impress cocktail party guests) when he casually mentions his stunningly clever use of Command, Facade, Proxy, and Factory in between sips of a martini. You'll easily counter with your deep understanding of why Singleton isn't as simple as it sounds, how the Factory is so often misunderstood, or on the real relationship between Decorator, Facade and Adapter. With Head First Design Patterns, you'll avoid the embarrassment of thinking Decorator is something from the "Trading Spaces" show. Best of all, in a way that won't put you to sleep! We think your time is too important (and too short) to spend it struggling with academic texts. If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, Head First Design Patterns will load patterns into your brain in a way that sticks. In a way that lets you put them to work immediately. In a way that makes you better at solving software design problems, and better at speaking the language of patterns with others on your team.
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Brian Krebs - 2014
Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies and countless viruses, phishing, and spyware attacks he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma" who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords, Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can—and do—hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime, before it's too late."Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals. His track record of scoops has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting."
Bloomberg Businessweek
Make: More Electronics: Learning Through Discovery
Charles Platt - 2013
Right away, you'll start working on real projects, and you'll explore all the key components and essential principles through the book's collection of experiments. You'll build the circuits first, then learn the theory behind them! This book picks up where Make: Electronics left off: you'll learn about power amplification, switching, and motors. This book also covers analog integrated circuits, randomicity, and an assortment of sensors. With step-by-step instructions, and hundreds of color photographs and illustrations, this book will help you use -- and understand -- intermediate to advanced electronics concepts and techniques.
Programming Pearls
Jon L. Bentley - 1986
Jon has done a wonderful job of updating the material. I am very impressed at how fresh the new examples seem." - Steve McConnell, author, Code CompleteWhen programmers list their favorite books, Jon Bentley's collection of programming pearls is commonly included among the classics. Just as natural pearls grow from grains of sand that irritate oysters, programming pearls have grown from real problems that have irritated real programmers. With origins beyond solid engineering, in the realm of insight and creativity, Bentley's pearls offer unique and clever solutions to those nagging problems. Illustrated by programs designed as much for fun as for instruction, the book is filled with lucid and witty descriptions of practical programming techniques and fundamental design principles. It is not at all surprising that
Programming Pearls
has been so highly valued by programmers at every level of experience. In this revision, the first in 14 years, Bentley has substantially updated his essays to reflect current programming methods and environments. In addition, there are three new essays on (1) testing, debugging, and timing; (2) set representations; and (3) string problems. All the original programs have been rewritten, and an equal amount of new code has been generated. Implementations of all the programs, in C or C++, are now available on the Web.What remains the same in this new edition is Bentley's focus on the hard core of programming problems and his delivery of workable solutions to those problems. Whether you are new to Bentley's classic or are revisiting his work for some fresh insight, this book is sure to make your own list of favorites.
The Creators: A History of Heroes of the Imagination
Daniel J. Boorstin - 1992
Boorstin explores the development of artistic innovation over 3,000 years. A hugely ambitious chronicle of the arts that Boorstin delivers with the scope that made his Discoverers a national bestseller.
The LEGO MINDSTORMS NXT 2.0 Discovery Book: A Beginner's Guide to Building and Programming Robots
Laurens Valk - 2010
The LEGO MINDSTORMS NXT 2.0 Discovery Book is the complete, illustrated, beginner's guide to MINDSTORMS that you've been looking for. The crystal clear instructions in the Discovery Book will show you how to harness the capabilities of the NXT 2.0 set to build and program your own robots. Author and robotics instructor Laurens Valk walks you through the set, showing you how to use its various pieces, and how to use the NXT software to program robots. Interactive tutorials make it easy for you to reach an advanced level of programming as you learn to build robots that move, monitor sensors, and use advanced programming techniques like data wires and variables. You'll build eight increasingly sophisticated robots like the Strider (a six-legged walking creature), the CCC (a climbing vehicle), the Hybrid Brick Sorter (a robot that sorts by color and size), and the Snatcher (an autonomous robotic arm). Numerous building and programming challenges throughout encourage you to think creatively and to apply what you've learned as you develop the skills essential to creating your own robots.Requirements: One LEGO MINDSTORMS NXT 2.0 set (#8547)FeaturesA complete introduction to LEGO MINDSTORMS NXT 2.0 Building and programming instructions for eight innovative robots 50 sample programs and 72 programming challenges (ranging from easy to hard) encourage you to explore newly learned programming techniques 15 building challenges expand on the robot designs and help you develop ideas for new robotsWho is this book for? This is a perfect introduction for those new to building and programming with the LEGO MINDSTORMS NXT 2.0 set. The book also includes intriguing robot designs and useful programming tips for more seasoned MINDSTORMS builders.
Darknet: A Beginner's Guide to Staying Anonymous
Lance Henderson - 2012
This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving you peace of mind with TOTAL 100% ANONYMITY. Don't waste months scouring the internet for info. Just read this! You'll be hooked in five minutes. It's all here: CIA techniques, how the NSA catches Tor users, Truecrypt and the FBI, nuking tracking cookies, private browsing, preventing identity theft. I will show you: -How to Be Anonymous Online -Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more -Browser Fingerprinting -Anti-Hacking and Counter-Forensic Techniques -Photo & Video Metadata -How to Encrypt Files (I make this super simple) -How to Defeat NSA Spying -How to Browse the Deep Web -How to Protect Your Identity -How to Hide Anything! You've probably read How to Be Invisible by J. J. Luna and Incognito Toolkit by Rob Robideau, and while they are fine books, you need this companion piece to take it to the next level!