Book picks similar to
The Networking CD Bookshelf by O'Reilly & Associates Inc
computer-networking
computers
geek
stem
Beautiful Code: Leading Programmers Explain How They Think
Andy OramLincoln Stein - 2007
You will be able to look over the shoulder of major coding and design experts to see problems through their eyes.This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. Beautiful Code is an opportunity for master coders to tell their story. All author royalties will be donated to Amnesty International.
The Chip: How Two Americans Invented the Microchip and Launched a Revolution
T.R. Reid - 1984
The world's brightest engineers were stymied in their quest to make these machines small and affordable until the solution finally came from two ingenious young Americans. Jack Kilby and Robert Noyce hit upon the stunning discovery that would make possible the silicon microchip, a work that would ultimately earn Kilby the Nobel Prize for physics in 2000. In this completely revised and updated edition of The Chip, T.R. Reid tells the gripping adventure story of their invention and of its growth into a global information industry. This is the story of how the digital age began.
TCP/IP Illustrated, Volume 1: The Protocols
Kevin R. Fall - 2009
Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: " Remote procedure call " Identity management (access control / authentication) " Network and transport layer security (authentication / privacy) " File access protocols, including NFS and SMB/CIFS " Host initialization and DHCP " NAT and firewalls " E-mail " Web and web services " Wireless and wireless security " New tools, including Ethereal, nmap and netcat
Service-Oriented Architecture: Concepts, Technology, and Design
Thomas Erl - 2005
Using Service-Oriented Architecture (SOA), enterprises can deliver high-value business services more rapidly and effectively, and gain unprecedented flexibility and value from existing IT infrastructure. SOA has earned the support of virtually every major software provider, and some 75% of enterprises surveyed are now investing in SOA technology and expertise. In Service-Oriented Architecture: Concepts, Technology, and Design, the author of 2004's best-selling SOA book presents the first end-to-end-tutorial for modeling and designing successful service-oriented architectures from the ground up. Writing in plain English, Thomas Erl provides step-by-step process descriptions for analyzing and designing any service or service-oriented business process definition.
Don't Be Evil: How Big Tech Betrayed Its Founding Principles -- and All of Us
Rana Foroohar - 2019
Today, the utopia they sought to create is looking more dystopian than ever: from digital surveillance and the loss of privacy to the spreading of misinformation and hate speech to predatory algorithms targeting the weak and vulnerable to products that have been engineered to manipulate our desires. How did we get here? How did these once-scrappy and idealistic enterprises become rapacious monopolies with the power to corrupt our elections, co-opt all our data, and control the largest single chunk of corporate wealth—while evading all semblance of regulation and taxes? In Don’t Be Evil, Financial Times global business columnist Rana Foroohar tells the story of how Big Tech lost its soul—and ate our lunch. Through her skilled reporting and unparalleled access—won through nearly thirty years covering business and technology—she shows the true extent to which behemoths like Google, Facebook, Apple, and Amazon are monetizing both our data and our attention, without us seeing a penny of those exorbitant profits. Finally, Foroohar lays out a plan for how we can resist, by creating a framework that fosters innovation while also protecting us from the dark side of digital technology.Praise for
Don’t Be Evil
“At first sight, Don’t Be Evil looks like it’s doing for Google what muckraking journalist Ida Tarbell did for Standard Oil over a century ago. But this whip-smart, highly readable book’s scope turns out to be much broader. Worried about the monopolistic tendencies of big tech? The addictive apps on your iPhone? The role Facebook played in Donald Trump’s election? Foroohar will leave you even more worried, but a lot better informed.”—Niall Ferguson, Milbank Family Senior Fellow at the Hoover Institution, Stanford, and author of The Square and the Tower
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
John P. Carlin - 2018
We've seen North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage against American companies, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us.As the former Assistant Attorney General and Chief of Staff to FBI Director Robert Mueller, John Carlin has spent 15 years on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed.The Internet of Broken Things makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them.
Hacking: The Art of Exploitation
Jon Erickson - 2003
This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
Tableau Your Data!: Fast and Easy Visual Analysis with Tableau Software
Dan Murray - 2013
It illustrates little-known features and techniques for getting the most from the Tableau toolset, supporting the needs of the business analysts who use the product as well as the data and IT managers who support it.This comprehensive guide covers the core feature set for data analytics, illustrating best practices for creating and sharing specific types of dynamic data visualizations. Featuring a helpful full-color layout, the book covers analyzing data with Tableau Desktop, sharing information with Tableau Server, understanding Tableau functions and calculations, and Use Cases for Tableau Software.Includes little-known, as well as more advanced features and techniques, using detailed, real-world case studies that the author has developed as part of his consulting and training practice Explains why and how Tableau differs from traditional business information analysis tools Shows you how to deploy dashboards and visualizations throughout the enterprise Provides a detailed reference resource that is aimed at users of all skill levels Depicts ways to leverage Tableau across the value chain in the enterprise through case studies that target common business requirements Endorsed by Tableau Software Tableau Your Data shows you how to build dynamic, best-of-breed visualizations using the Tableau Software toolset.