Book picks similar to
The OSSI Model - The Gannon Transcripts by Kent Stern
highly-rated
society
not_on_libby
computers
Legions of the Forest
Mark L. Richards - 2014
Varus, a lawyer and former governor of Syria, has frighteningly little experience as a military leader. He is resolved to prove himself as one, nevertheless. He believes the Germanic people to be conquered. He is wrong.His ranks are filled with seasoned veterans and novices alike, the latter of which includes Lucius, a young man whose conscription into the Roman imperial legions represents only the first step in his epic, and terrifying, destiny.Valerius Maximus, a young Roman tribune, enters the legions of the Rhine as well—only to find that the danger he anticipated from abroad actually lies within his own ranks. The vicious politics of the officer corps prove to be more treacherous.Meanwhile, German nobleman Arminius lies in wait, preparing for the inevitable appearance of the Roman legions and growing in his determination to liberate his people from Rome’s rule at any cost.The fates of these men soon converge in a bloody battle that will decide the course of their countries…and their lives. The Germanic foes spring a monstrous ambush in a driving rain storm. The future of Western civilization turns in the blink of an eye.
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything
Francis Dacosta - 2013
Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - chirps. Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things will entail a widely distributed topology incorporating simpler chirp protocols towards at the edges of the network. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored. What you'll learn Teaches the difference between the "normal" Internet and the Internet of Things, Describes a new architecture and its components in the "chirp" context. Explains the shortcomings of IP for IoT. Describes the anatomy of the IoT. Re-frames key ideas such as reliability. Describes how to build the IoT Who this book is forThought leaders, executives, architectural, standards and development leaders in the evolving IoT industry
Introduction to Networking: How the Internet Works
Charles Severance - 2015
While very complex, the Internet operates on a few relatively simple concepts that anyone can understand. Networks and networked applications are embedded in our lives. Understanding how these technologies work is invaluable. This book was written for everyone - no technical knowledge is required!While this book is not specifically about the Network+ or CCNA certifications, it as a way to give students interested in these certifications a starting point.
Where Wizards Stay Up Late: The Origins of the Internet
Katie Hafner - 1996
Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960's, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski - 2005
Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
Eric S. Raymond - 1999
According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and studied by many of the biggest players in the high-tech industry, from Sun Microsystems to IBM to Intel.The Cathedral & the Bazaar is a must for anyone who cares about the future of the computer industry or the dynamics of the information economy. Already, billions of dollars have been made and lost based on the ideas in this book. Its conclusions will be studied, debated, and implemented for years to come. According to Bob Young, "This is Eric Raymond's great contribution to the success of the open source revolution, to the adoption of Linux-based operating systems, and to the success of open source users and the companies that supply them."The interest in open source software development has grown enormously in the past year. This revised and expanded paperback edition includes new material on open source developments in 1999 and 2000. Raymond's clear and effective writing style accurately describing the benefits of open source software has been key to its success. With major vendors creating acceptance for open source within companies, independent vendors will become the open source story in 2001.
C# 4.0 in a Nutshell
Joseph Albahari - 2010
It is a book I recommend." --Scott Guthrie, Corporate Vice President, .NET Developer Platform, Microsoft Corporation
"A must-read for a concise but thorough examination of the parallel programming features in the .NET Framework 4." --Stephen Toub, Parallel Computing Platform Program Manager, Microsoft
"This wonderful book is a great reference for developers of all levels." -- Chris Burrows, C# Compiler Team, Microsoft
When you have questions about how to use C# 4.0 or the .NET CLR, this highly acclaimed bestseller has precisely the answers you need. Uniquely organized around concepts and use cases, this fourth edition includes in-depth coverage of new C# topics such as parallel programming, code contracts, dynamic programming, security, and COM interoperability. You'll also find updated information on LINQ, including examples that work with both LINQ to SQL and Entity Framework. This book has all the essential details to keep you on track with C# 4.0.
Get up to speed on C# language basics, including syntax, types, and variables Explore advanced topics such as unsafe code and preprocessor directives Learn C# 4.0 features such as dynamic binding, type parameter variance, and optional and named parameters Work with .NET 4's rich set of features for parallel programming, code contracts, and the code security model Learn .NET topics, including XML, collections, I/O and networking, memory management, reflection, attributes, security, and native interoperability
AI 2041: Ten Visions for Our Future
Kai-Fu Lee - 2021
Though the term has been around for half a century, it is only now, Kai-Fu Lee argues, that AI is poised to upend our society, just as the arrival of technologies like electricity and smart phones did before it. In the past five years, AI has shown it can learn games like chess in mere hours--and beat humans every time. AI has surpassed humans in speech and object recognition, even outperforming radiologists in diagnosing lung cancer. AI is at a tipping point. What comes next?Within two decades, aspects of daily life may be unrecognizable. Humankind needs to wake up to AI, both its pathways and perils. In this provocative work that juxtaposes speculative storytelling and science, Lee, one of the world's leading AI experts, has teamed up with celebrated novelist Chen Qiufan to reveal how AI will trickle down into every aspect of our world by 2041. In ten gripping narratives that crisscross the globe, coupled with incisive analysis, Lee and Chen explore AI's challenges and its potential:- Ubiquitous AI that knows you better than you know yourself - Genetic fortune-telling that predicts risk of disease or even IQ - AI sensors that creates a fully contactless society in a future pandemic - Immersive personalized entertainment to challenge our notion of celebrity - Quantum computing and other leaps that both eliminate and increase riskBy gazing toward a not-so-distant horizon, AI 2041 offers powerful insights and compelling storytelling for everyone interested in our collective future.
The Secret Life: Three True Stories
Andrew O'Hagan - 2017
We no longer question the reality of online experiences but the reality of selfhood in the digital age.In The Secret Life: Three True Stories, Andrew O'Hagan issues three bulletins from the porous border between cyberspace and the 'real world'. 'Ghosting' introduces us to the beguiling and divisive Wikileaks founder Julian Assange, whose autobiography the author agrees to ghostwrite with unforeseen-and unforgettable-consequences. 'The Invention of Ronnie Pinn' finds the author using the actual identity of a deceased young man to construct an entirely new one in cyberspace, leading him on a journey into the deep web's darkest realms. And 'The Satoshi Affair' chronicles the strange case of Craig Wright, the Australian web developer who may or may not be the mysterious inventor of Bitcoin, and who may or may not be willing, or even able, to reveal the truth.What does it mean when your very sense of self becomes, to borrow a phrase from the tech world, 'disrupted'? Perhaps it takes a novelist, an inventor of selves, armed with the tools of a trenchant reporter, to find an answer.
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Joseph Menn - 2010
His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government.Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought—and why the Internet might not survive.
Apple: The Inside Story of Intrigue, Egomania, and Business Blunders
Jim Carlton - 1997
Based on exclusive interviews with over 150 people, among them Microsoft's Bill Gates and the inner circle of Apple's top executives, this book reveals new information in an ongoing saga. photo insert.
Database Systems: The Complete Book
Jeffrey D. Ullman - 1999
Written by well-known computer scientists, this introduction to database systems offers a comprehensive approach, focusing on database design, database use, and implementation of database applications and database management systems. The first half of the book provides in-depth coverage of databases from the point of view of the database designer, user, and application programmer. It covers the latest database standards SQL:1999, SQL/PSM, SQL/CLI, JDBC, ODL, and XML, with broader coverage of SQL than most other texts. The second half of the book provides in-depth coverage of databases from the point of view of the DBMS implementor. It focuses on storage structures, query processing, and transaction management. The book covers the main techniques in these areas with broader coverage of query optimization than most other texts, along with advanced topics including multidimensional and bitmap indexes, distributed transactions, and information integration techniques.
The Age of Spiritual Machines: When Computers Exceed Human Intelligence
Ray Kurzweil - 1998
Now he offers a framework for envisioning the twenty-first century--an age in which the marriage of human sensitivity and artificial intelligence fundamentally alters and improves the way we live. Kurzweil's prophetic blueprint for the future takes us through the advances that inexorably result in computers exceeding the memory capacity and computational ability of the human brain by the year 2020 (with human-level capabilities not far behind); in relationships with automated personalities who will be our teachers, companions, and lovers; and in information fed straight into our brains along direct neural pathways. Optimistic and challenging, thought-provoking and engaging, The Age of Spiritual Machines is the ultimate guide on our road into the next century.
Bitwise: A Life in Code
David Auerbach - 2018
With a philosopher's sense of inquiry, Auerbach recounts his childhood spent drawing ferns with the programming language Logo on the Apple IIe, his adventures in early text-based video games, his education as an engineer, and his contributions to instant messaging technology developed for Microsoft and the servers powering Google's data stores. A lifelong student of the systems that shape our lives--from the psychiatric taxonomy of the Diagnostic and Statistical Manual to how Facebook tracks and profiles its users--Auerbach reflects on how he has experienced the algorithms that taxonomize human speech, knowledge, and behavior and that compel us to do the same.Into this exquisitely crafted, wide-ranging memoir of a life spent with code, Auerbach has woven an eye-opening and searing examination of the inescapable ways in which algorithms have both standardized and coarsened our lives. As we engineer ever more intricate technology to translate our experiences and narrow the gap that divides us from the machine, Auerbach argues, we willingly erase our nuances and our idiosyncrasies--precisely the things that make us human.
Stealing the Network: How to Own a Shadow
Johnny Long - 2007
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries