Success: 30 Interviews with Entrepreneurs & Executives


Jason Navallo - 2015
    Learn to apply their proven insight and methods for success into your own life!

The Silent Intelligence: The Internet of Things


Daniel Kellmereit - 2013
    We talk about the history, trends, technology ecosystem and future of Connected Cities, Connected Homes, Connected Health and Connected Cars. We also discuss the most exciting growth areas for entrepreneurs and venture capital investors. We share exciting stories and unique opinions of more than 30 industry veterans, experts and visionaries from Google, Ericsson, AT&T, Qualcomm, SAP, MIT, Jawbone and many others. We called this book The Silent Intelligence because most of the activity and growth in the space so far has been outside of mainstream visibility. Our aim is to help executives, entrepreneurs, investors and everybody who is interested in this topic, better understand the opportunities and challenges of the Internet of Things. We also hope that the new growth opportunities discussed in this book will be as exciting to you as they are to us.

The Information: A History, a Theory, a Flood


James Gleick - 2011
    The story of information begins in a time profoundly unlike our own, when every thought and utterance vanishes as soon as it is born. From the invention of scripts and alphabets to the long-misunderstood talking drums of Africa, Gleick tells the story of information technologies that changed the very nature of human consciousness. He provides portraits of the key figures contributing to the inexorable development of our modern understanding of information: Charles Babbage, the idiosyncratic inventor of the first great mechanical computer; Ada Byron, the brilliant and doomed daughter of the poet, who became the first true programmer; pivotal figures like Samuel Morse and Alan Turing; and Claude Shannon, the creator of information theory itself. And then the information age arrives. Citizens of this world become experts willy-nilly: aficionados of bits and bytes. And we sometimes feel we are drowning, swept by a deluge of signs and signals, news and images, blogs and tweets. The Information is the story of how we got here and where we are heading.

Junk to Gold: From Salvage to the World's Largest Online Auto Auction


Willis Johnson - 2014
    Willis Johnson, the founder of Copart [CPRT], offers up a personal and inspirational account of this journey to the top including lessons he learned from love, war and building a global, multi-billion dollar business. Even at the pinnacle of success, Willis remained grounded in his family-first values. His stories will inspire and provoke the entrepreneur in everyone to start building their dream.

The Amazing Story of Quantum Mechanics: A Math-Free Exploration of the Science that Made Our World


James Kakalios - 2010
    Using illustrations and examples from science fiction pulp magazines and comic books, The Amazing Story of Quantum Mechanics explains the fundamental principles of quantum mechanics that underlie the world we live in.Watch a Video

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

DSLR Cinema: Crafting the Film Look with Video


Kurt Lancaster - 2010
    Exploring the cinematic quality and features offered by hybrid DSLRs, this book empowers the filmmaker to craft visually stunning images inexpensively.Learn to think more like a cinematographer than a videographer, whether shooting for a feature, short fiction, documentary, video journalism, or even a wedding. DSLR Cinema offers insight into different shooting styles, real-world tips and techniques, and advice on postproduction workflow as it guides you in crafting a film-like look.Case studies feature an international cast of cutting edge DSLR shooters today, including Philip Bloom (England), Bernardo Uzeda (Brazil), Rii Schroer (Germany), Jeremy Ian Thomas (United States), Shane Hurlbut, ASC (United States), and Po Chan (Hong Kong). Their films are examined in detail, exploring how each exemplifies great storytelling, exceptional visual character, and how you can push the limits of your DSLR.

WikiLeaks and the Age of Transparency


Micah L. Sifry - 2011
    Now we are told a small, international band of renegades armed with nothing more than laptops presents the greatest threat to the U.S. regime since the close of the Cold War. WikiLeaks’ release of a massive trove of secret official documents has riled politicians from across the spectrum. Even noted free-speech advocate Floyd Abrams blames WikiLeaks founder Julian Assange for the certain defeat of federal shield-law legislation protecting journalists. Hyperbole, hysteria? Certainly. Welcome to the Age of Transparency.But political analyst and writer Micah Sifry argues that WikiLeaks is not the whole story: It is a symptom, an indicator of an ongoing generational and philosophical struggle between older, closed systems, and the new open culture of the Internet. Despite Assange’s arrest, the publication of secret documents continues. As Sifry shows, this is part of a larger movement for greater governmental and corporate transparency: “When you combine connectivity with transparency—the ability for more people to see, share and shape what is going on around them—the result is a huge increase in social energy, which is being channeled in all kinds of directions.”

Taming the Sun: Innovations to Harness Solar Energy and Power the Planet


Varun Sivaram - 2018
    What's more, its potential is nearly limitless--every hour the sun beams down more energy than the world uses in a year. But in Taming the Sun, energy expert Varun Sivaram warns that the world is not yet equipped to harness erratic sunshine to meet most of its energy needs. And if solar's current surge peters out, prospects for replacing fossil fuels and averting catastrophic climate change will dim.Innovation can brighten those prospects, Sivaram explains, drawing on firsthand experience and original research spanning science, business, and government. Financial innovation is already enticing deep-pocketed investors to fund solar projects around the world, from the sunniest deserts to the poorest villages. Technological innovation could replace today's solar panels with coatings as cheap as paint and employ artificial photosynthesis to store intermittent sunshine as convenient fuels. And systemic innovation could add flexibility to the world's power grids and other energy systems so they can dependably channel the sun's unreliable energy.Unleashing all this innovation will require visionary public policy: funding researchers developing next-generation solar technologies, refashioning energy systems and economic markets, and putting together a diverse clean energy portfolio. Although solar can't power the planet by itself, it can be the centerpiece of a global clean energy revolution.A Council on Foreign Relations Book

Frank Wood's Business Accounting, Volume 2


Frank Wood - 1993
    Now in its eleventh edition, it has become the standard introductory text for accounting students and professionals alike. The book is used on a wide variety of courses in accounting and business, both at secondary and tertiary level and for those studying for professional qualifications. It builds on Business Accounting 1 to cover advanced aspects of financial accounting. It also covers introductory aspects of management accounting suitable for use at all levels up to and including professional foundation level courses and first-year degree courses.

Collector Bro: The Quixotic 'Thallals' of a Civil Servant


Prasanth Nair - 2021
    An untold one that played out in the district of Kozhikode when a young IAS officer took charge as the District Collector in 2015. Over the next two years, he led the district and transformed the very concept of public administration with the use of social media, public consultation, usage of technology, volunteerism and public participation in governance. The two year tenure of 'Collector Bro' in Kozhikode transformed the landscape and narrative of district administration and communication with the citizens forever.Within a couple of months, 'Collector Kozhikode' Facebook page became a trendsetter in Kerala, and the most followed district administration page in India. It still is. With initiatives like Compassionate Kozhikode, Operation Sulaimani, Savari Giri Giri, Kozhipedia, Freedom Café, Yo Appooppa and Tere Mere Beach Mein, IAS officer Prasanth Nair, who was the District Collector of Kozhikode at that time, ushered in a new language of governance that endeavoured to bridge the gap between the district administration and citizens through the optimal employment of social media. The District Collector descended from the colonial ivory towers and mingled as one amongst the common man, totally dismantling the hierarchical stereotypes that the society was used to.This book traces the story of how exactly this happened and how and why the public responded so overwhelmingly to such an initiative. It also chronicles how these experiences transformed the young officer also - from a hesitant public speaker to a crowd-puller, from an introvert to a seemingly extrovert energetic leader. For the first time, the emotional roller-coaster of events that re-shaped the attitude and language of engagement by District administration is narrated with all the inside-stories. Straight from the horse's mouth. The author however takes pains not to take centre-stage in the book and manages that somewhat with wit and self-deprecating humour. This book has got nothing to do with government; but it is all about governance, life and compassion. At one level it is a collection of case-studies, the most readable and engrossing ones, narrated with fun and illustrations. At another level it is a chronicle of a personal journey of a compassionate administrator. This is not a typical arrogant bureaucratic ‘I did this’ book, but an ‘I went through this’ book. Not a high-horsed motivational ‘you can do it’ book, but a book that makes you think and prioritise what you want to do in life.As Dr. Shashi Tharoor says in the foreword, a must read for all civil servants, civil-service aspirants, students of public administration and all citizens who dream for a better tomorrow.

Search Engine Optimization (SEO) Secrets


Danny Dover - 2010
    This unique book taps the relatively unknown market of advanced SEO knowledge, and reveals secrets used by only the best SEO consultants.You'll take your Internet marketing skills to the next level as you gain a thorough understanding of standard SEO techniques such as on-page optimization, off-page optimization, and link building. Packed with real-world examples, this essential guide demonstrates how real SEO consultants work with Fortune 500 companies to get the results they desire.Coverage includes: Understanding Search Engine OptimizationRelearning How You See the WebPicking the Right SEO ToolsFinding SEO ProblemsSolving SEO ProblemsSEO Best PracticesThe SEO Consulting ProcessComprehensive Site Audit (Informational Website)Comprehensive Site Audit (E-Commerce Website)Understanding the SEO IndustrySearch Engine VerticalsOptimizing for Alternative Search EnginesSetting Up a Testing PlatformSEO ResourcesAttending SEO Conferences

My Tiny Life: Crime and Passion in a Virtual World


Julian Dibbell - 1999
    Bungle and of the author's journey, in consequence thereof, to the heart of a half-real world called LambdaMoo.From In Cold Blood to Midnight in the Garden of Good and Evil, readers have been gripped by the novelistic rering of eccentric communities torn apart by violent crime.Julian Dibbell's reporting of the "Mr. Bungle" rape case first appeared as the cover story in The Village Voice. Since that time it has become a cause célèbre, cited as a landmark case in numerous books and articles and a source of less discussion on the Internet. That's because the scene of the crime was a "Multi-User Domain," an electronic "salon" where Internet junkies have created their own interactive fantasy realm. In a "place" where race, ger, and identity are infinitely malleable, the addictive denizens had thought they'd escaped all traditional cultural and moral limits. Yet Mr. Bungle's primal transgression challenged all their illusions, confronting even this electronic utopia with the same issues of order and social norms that humanity has faced since the Stone Age. When this fantasy imbroglio threatens Dibbell's actual marriage, we see how the virtual world at once mirrors and mocks real life.

More Programming Pearls: Confessions of a Coder


Jon L. Bentley - 1988
    These techniques deal with real programs and they are realistically illustrated, using the C and Awk languages. Bentley also provides the reader with some tricks of the programmer's trade, like a collection of rules of thumb and hints for finding simple solutions to hard problems.These essays also originally appeared in the author's column in Communication of the ACM, and have been substantially revised, incorporating new sections, problems, and reader comments.

Teaching Science with Interactive Notebooks


Kellie Marcarelli - 2010
    Packed with student examples, this detailed guide explains the unique features that make interactive notebooks more effective tools than conventional notebooks for science classrooms. This resource:Describes the nuts and bolts of implementing interactive notebooks, including execution, time management, and grading Uses the 5E Learning Cycle as the framework for science instruction Emphasizes the importance of writing in science and provides strategies for modeling effective writing Explores strategies to encourage collaborative student inquiry and foster whole-class discussions