Book picks similar to
Firewalls: 24seven by Matthew Strebe


computers
home
it-business
technical-reference

Game free sampler


Anders de la Motte - 2013
    As their lives spiral out of control, HP faces a challenge he never expected. Can he outwit The Game before it’s too late?

The Emperor's New Mind: Concerning Computers, Minds and the Laws of Physics


Roger Penrose - 1989
    Admittedly, computers now play chess at the grandmaster level, but do they understand the game as we do? Can a computer eventually do everything a human mind can do? In this absorbing and frequently contentious book, Roger Penrose--eminent physicist and winner, with Stephen Hawking, of the prestigious Wolf prize--puts forward his view that there are some facets of human thinking that can never be emulated by a machine. Penrose examines what physics and mathematics can tell us about how the mind works, what they can't, and what we need to know to understand the physical processes of consciousness. He is among a growing number of physicists who think Einstein wasn't being stubborn when he said his little finger told him that quantum mechanics is incomplete, and he concludes that laws even deeper than quantum mechanics are essential for the operation of a mind. To support this contention, Penrose takes the reader on a dazzling tour that covers such topics as complex numbers, Turing machines, complexity theory, quantum mechanics, formal systems, Godel undecidability, phase spaces, Hilbert spaces, black holes, white holes, Hawking radiation, entropy, quasicrystals, the structure of the brain, and scores of other subjects. The Emperor's New Mind will appeal to anyone with a serious interest in modern physics and its relation to philosophical issues, as well as to physicists, mathematicians, philosophers and those on either side of the AI debate.

Dave Barry in Cyberspace


Dave Barry - 1996
    . . BARRY SHINES."--People A self-professed computer geek who actually does Windows 95, bestselling humorist Dave Barry takes us on a hilarious hard drive via the information superhighway--and into the very heart of cyberspace, asking the provocative question: If God had wanted us to be concise, why give us so many fonts?Inside you'll find juicy bytes onHow to Buy and Set Up a Computer; Step One: Get ValiumNerdstock in the Desert; Or: Bill Gates Is ElvisSoftware: Making Your Computer Come Alive So It Can Attack YouWord Processing: How to Press an Enormous Number of Keys Without Ever Actually Writing AnythingSelected Web Sites, including Cursing in Swedish, Deformed Frog Pictures, and The Toilets of Melbourne, AustraliaAnd much, much more!"VERY FUNNY . . . After a day spent staring at a computer monitor, think of the book as a kind of screen saver for your brain."--New York Times Book Review

Physical Chemistry


Ira N. Levine - 1978
    In this title, the treatment is made easy-to-follow by giving step-by-step derivations, explanations and by avoiding advanced mathematics unfamiliar to students. It covers: math and physics thorough review sections; and worked examples, followed by a practice exercise.

Mastering VMware vSphere 4


Scott Lowe - 2009
    Coverage Includes: Shows administrators how to use VMware to realize significant savings in hardware costs while still providing adequate "servers" for their users Demonstrates how to partition a physical server into several virtual machines, reducing the overall server footprint within the operations center Explains how VMware subsumes a network to centralize and simplify its management, thus alleviating the effects of "virtual server sprawl" Now that virtualization is a key cost-saving strategy, Mastering VMware vSphere 4 is the strategic guide you need to maximize the opportunities.

A Little Slice Of Heaven


Gina Ardito - 2008
    Until the night the stray on her doorstep turns out to be a man! A Devil's Bargain' With educated speech and sterling manners, Kyle Hayden isn't the average homeless man. Touched by his situation, Gianna offers him a place to stay and a job. And when he cleans up to reveal a super-hunk, he's the perfect phony, doting boyfriend to escort Gianna to her ex's upcoming wedding. Or maybe this time, love could be for real. Hell Breaks Loose' Until the truth comes out. For while Gianna dreams of happily ever after, Kyle will soon return to the life he left behind--a life that won't include Gianna. Unless he can regain her trust and show her' A Little Slice of Heaven. This is a new release of a previously published edition.

When Things Start to Think


Neil Gershenfeld - 1999
    Gershenfeld offers a glimpse at the brave new post-computerized world, where microchips work for us instead of against us. He argues that we waste the potential of the microchip when we confine it to a box on our desk: the real electronic revolution will come when computers have all but disappeared into the walls around us. Imagine a digital book that looks like a traditional book printed on paper and is pleasant to read in bed but has all the mutability of a screen display. How about a personal fabricator that can organize digitized atoms into anything you want, or a musical keyboard that can be woven into a denim jacket? Gershenfeld tells the story of his Things that Think group at MIT's Media Lab, the group of innovative scientists and researchers dedicated to integrating digital technology into the fabric of our lives.

Data for the People: How to Make Our Post-Privacy Economy Work for You


Andreas Weigend - 2017
    In many ways this has improved our lives, yet, we as individuals do not benefit from this wealth of data as much as we could. Moreover, whether it is a bank evaluating our credit worthiness, an insurance company determining our risk level, or a potential employer deciding whether we get a job, it is likely that this data will be used against us rather than for us. In Data for the People, Andreas Weigend draws on his years as a consultant for commerce, education, healthcare, travel and finance companies to outline how Big Data can work better for all of us. As of today, how much we benefit from Big Data depends on how closely the interests of big companies align with our own. Too often, outdated standards of control and privacy force us into unfair contracts with data companies, but it doesn't have to be this way. Weigend makes a powerful argument that we need to take control of how our data is used to actually make it work for us. Only then can we the people get back more from Big Data than we give it. Big Data is here to stay. Now is the time to find out how we can be empowered by it.

Learning JavaScript


Shelley Powers - 2006
    JavaScript lets designers add sparkle and life to web pages, while more complex JavaScript has led to the rise of Ajax -- the latest rage in web development that allows developers to create powerful and more responsive applications in the browser window."Learning JavaScript" introduces this powerful scripting language to web designers and developers in easy-to-understand terms. Using the latest examples from modern browser development practices, this book teaches you how to integrate the language with the browser environment, and how to practice proper coding techniques for standards-compliant web sites. By the end of the book, you'll be able to use all of the JavaScript language and many of the object models provided by web browsers, and you'll even be able to create a basic Ajax application.

The Road Ahead


Bill Gates - 1995
    Includes a compact disc which is playable on CD-ROM and audio CD players.

System Error: Where Big Tech Went Wrong and How We Can Reboot


Mehran Sahami - 2021
    A forward-thinking manifesto from three Stanford professors—experts who have worked at ground zero of the tech revolution for decades—which reveals how big tech’s obsession with optimization and efficiency has sacrificed fundamental human values and outlines steps we can take to change course, renew our democracy, and save ourselves.

Patterns of Enterprise Application Architecture


Martin Fowler - 2002
    Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace. These new tools and technologies are capable of building powerful applications, but they are not easily implemented. Common failures in enterprise applications often occur because their developers do not understand the architectural lessons that experienced object developers have learned. Patterns of Enterprise Application Architecture is written in direct response to the stiff challenges that face enterprise application developers. The author, noted object-oriented designer Martin Fowler, noticed that despite changes in technology--from Smalltalk to CORBA to Java to .NET--the same basic design ideas can be adapted and applied to solve common problems. With the help of an expert group of contributors, Martin distills over forty recurring solutions into patterns. The result is an indispensable handbook of solutions that are applicable to any enterprise application platform. This book is actually two books in one. The first section is a short tutorial on developing enterprise applications, which you can read from start to finish to understand the scope of the book's lessons. The next section, the bulk of the book, is a detailed reference to the patterns themselves. Each pattern provides usage and implementation information, as well as detailed code examples in Java or C#. The entire book is also richly illustrated with UML diagrams to further explain the concepts. Armed with this book, you will have the knowledge necessary to make important architectural decisions about building an enterprise application and the proven patterns for use when building them. The topics covered include - Dividing an enterprise application into layers - The major approaches to organizing business logic - An in-depth treatment of mapping between objects and relational databases - Using Model-View-Controller to organize a Web presentation - Handling concurrency for data that spans multiple transactions - Designing distributed object interfaces

Magic Spirit the Dream Horse


Pippa Funnell - 2009
    Learning about riding, training and caring for horses, and making new friends along the way, Tilly discovers that at Silver Shoe Farm anything is possible.Perfectly heart-warming pony tales packed with expert advice from champion rider and Grand Slam winner, Pippa Funnell, on everything you ever wanted to know about horses.

The Cult of Mac


Leander Kahney - 2004
    Apple's machines have legions of loyal, sometimes demented fans. The Cult of Mac surveys the devoted following that has grown up around Macintosh computers. Like fans of a football team or a rock group, Macintosh fanatics have their own subculture, with clearly defined obsessions, rites, and passages. Famously dedicated to their computers, many Mac fans eat, sleep, and breathe the Macintosh. Fans who get Mac tattoos and haircuts, people who attend Apple Store openings like they are Grateful Dead shows, counterculture icons who love the Mac, people who turn old Macs into aquariums (or bongs), Ellen Fein lookalike contests, erotic fiction featuring Steve Jobs; it's all here. Technology reporter Leander Kahney exposes all sides of Mac fanaticism, from the innocuous to the insane.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.