Book picks similar to
IBM's Early Computers by Charles J. Bashe
computer-history
tech-history
history
cs
The Windows Command Line Beginner's Guide (Computer Beginner's Guides)
Jonathan Moeller - 2011
The Windows Command Line Beginner's Guide gives users new to the Windows command line an overview of the Command Prompt, from simple tasks to network configuration.In the Guide, you'll learn how to:-Manage the Command Prompt.-Copy & paste from the Windows Command Prompt.-Create batch files.-Remotely manage Windows machines from the command line.-Manage disks, partitions, and volumes.-Set an IP address and configure other network settings.-Set and manage NTFS and file sharing permissions.-Customize and modify the Command Prompt.-Create and manage file shares.-Copy, move, and delete files and directories from the command line.-Manage PDF files and office documents from the command line.-And many other topics.
The Information: A History, a Theory, a Flood
James Gleick - 2011
The story of information begins in a time profoundly unlike our own, when every thought and utterance vanishes as soon as it is born. From the invention of scripts and alphabets to the long-misunderstood talking drums of Africa, Gleick tells the story of information technologies that changed the very nature of human consciousness. He provides portraits of the key figures contributing to the inexorable development of our modern understanding of information: Charles Babbage, the idiosyncratic inventor of the first great mechanical computer; Ada Byron, the brilliant and doomed daughter of the poet, who became the first true programmer; pivotal figures like Samuel Morse and Alan Turing; and Claude Shannon, the creator of information theory itself. And then the information age arrives. Citizens of this world become experts willy-nilly: aficionados of bits and bytes. And we sometimes feel we are drowning, swept by a deluge of signs and signals, news and images, blogs and tweets. The Information is the story of how we got here and where we are heading.
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Jack Koziol - 2004
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
Gene Kim - 2013
It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited. In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.
Objects First with Java: A Practical Introduction Using BlueJ
David J. Barnes - 2002
It takes a truly objects first approach to teaching problem solving using Java. These are complicated concepts so the book uses the development environment BlueJ to help the student's understanding. BlueJ has a strong emphasis on visualization and interaction techniques, and allows the students to manipulate objects and call methods as a first exercise. BlueJ is free and freely available, and has been developed specifically for teaching. The book is loaded with projects so that the student can really get a grip on actually solving problems; and it takes a spiral approach , introducing a topic in a simple context early on, then revisiting it later in the book to deepen understanding. It also comes with a CD containing JDK, BlueJ, a BlueJ tutorial and code for all the projects. The website contains style guide for all examples, PowerPoints for lecturers and also a Solutions Manual.
iPad For Dummies
Edward C. Baig - 2010
This full-color guide is the perfect companion to help you get up to speed and on the go with Apple's revolutionary iPad.Veteran For Dummies authors and Mac gurus begin with a look at the multi-touch interface and then move on to setting up iTunes, surfing the Web, and sending and receiving e-mail. You'll discover how to share, store, and import photos; buy and read your favorite books; get directions and use maps; rent, buy, and watch movies and TV shows; listen to the latest music; play games; shop for cool new apps; and much more.Popular authors Edward Baig and Bob "Dr. Mac" LeVitus begin with the basics as they walk you through setting up and using the iPad in this full-color guide Offers a straightforward-but-fun approach to the many exciting functions of the iPad: listening to music, synchronizing your data, working with the calendar, setting up iTunes, and getting online via Wi-Fi, to name a few Presents an easy-to-understand approach to sending and receiving e-mail; shopping for movies, iBooks, and music at the iTunes Store; browsing the Web; sharing photos; downloading and watch movies and TV shows; and downloading apps from the App Store Explains how to use your iPad as a portable game console and how to manage your contacts and to-do lists Covers protecting your information and troubleshooting From no-nonsense basics to useful tips and techniques, iPad For Dummies will help you discover all the cool things your iPad can do.
Micro-Isv: From Vision to Reality
Bob Walsh - 2006
As for the latter, are you a programmer and curious about being your own boss? Where do you turn for information? Until now, online and traditional literature havent caught up with the reality of the post-dot com bust.Micro-ISV: From Vision to Reality explains what works and why in today's emerging micro-ISV sector. Currently, thousands of programmers build and deliver great solutions ISV-style, earning success and revenues much larger than you might guess. Written by and for micro-ISVs, with help from some of the leaders of the field, this book takes you beyond just daydreaming to running your own business. It thoroughly explores how it is indeed possible to launch and maintain a small and successful ISV business, and is an ideal read if you're interested in getting started.
The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World
Pedro Domingos - 2015
In The Master Algorithm, Pedro Domingos lifts the veil to give us a peek inside the learning machines that power Google, Amazon, and your smartphone. He assembles a blueprint for the future universal learner--the Master Algorithm--and discusses what it will mean for business, science, and society. If data-ism is today's philosophy, this book is its bible.
This is Reggae Music
Lloyd Bradley - 2001
Nevertheless, it has exerted a more powerful hold on international popular music than any nation besides England and America. From Prince Buster to Burning Spear, Lee "Scratch" Perry to Yellowman, Bob Marley to Shabba Ranks, reggae music is one of the most dynamic and powerful musical forms of the twentieth century. And, as Lloyd Bradley shows in his deft, definitive, and always entertaining book, it is and always has been the people's music. Born in the sound systems of the Kingston slums, reggae was the first music poor Jamaicans could call their own, and as it spread throughout the world, it always remained fluid, challenging, and distinctly Jamaican. Based on six years of research -- original interviews with most of reggae's key producers, musicians, and international players -- and a lifelong enthusiasm for one of the most remarkable of the world's musics, This Is Reggae Music is the definitive history of reggae.
Professional PHP Programming
Sascha Schumann - 1999
PHP is a server-side, HTML-embedded scripting language. It is an open source technology, rapidly gaining popularity as a scripting language for people running dynamic websites. One of its major attractions over Perl, JavaScript and other scripting languages is that PHP has a built-in database integration layer and seamless IP connectivity, with LDAP and TCP as well as the IMAP mail interface. Features; Real world, practical experience and techniques From installation and configuration of the PHP engine to advanced dynamic application design Definitive coverage of core PHP language and database addressing: MySQL is covered in depth. Practical e-commerce and business scripting including database application development, together with PHP and XML applications. LDAP connectivity addressed.
Game Over, Press Start to Continue: How Nintendo Conquered the World
David Sheff - 1993
Whether it is recounting the struggles over the game"Tetris," offering blow-by-blow narrative of Nintendo's bitter legal warfare or its see-saw competition with other companies for market leadership, Game Over is a masterful piece of business journalism and technical reportage-a book both cautionary and hugely entertaining.
Software Project Survival Guide
Steve McConnell - 1997
It's for everyone with a stake in the outcome of a development project--and especially for those without formal software project management training. That includes top managers, executives, clients, investors, end-user representatives, project managers, and technical leads. Here you'll find guidance from the acclaimed author of the classics CODE COMPLETE and RAPID DEVELOPMENT. Steve McConnell draws on solid research and a career's worth of hard-won experience to map the surest path to your goal--what he calls "one specific approach to software development that works pretty well most of the time for most projects." Nineteen chapters in four sections cover the concepts and strategies you need for mastering the development process, including planning, design, management, quality assurance, testing, and archiving. For newcomers and seasoned project managers alike, SOFTWARE PROJECT SURVIVAL GUIDE draws on a vast store of techniques to create an elegantly simplified and reliable framework for project management success. So don't worry about wandering among complex sets of project management techniques that require years to sort out and master. SOFTWARE PROJECT SURVIVAL GUIDE goes straight to the heart of the matter to help your projects succeed. And that makes it a required addition to every professional's bookshelf.
AngularJS: Up and Running: Enhanced Productivity with Structured Web Apps
Shyam Seshadri - 2014
By the end of the book, you'll understand how to develop a large, maintainable, and performant application with AngularJS.Guided by two engineers who worked on AngularJS at Google, you'll learn the components needed to build data-driven applications, using declarative programming and the Model-view-controller pattern. You'll also learn how to conduct unit tests on each part of your application.Learn how to use controllers for moving data to and from viewsUnderstand when to use AngularJS services instead of controllersCommunicate with the server to store, fetch, and update data asynchronouslyKnow when to use AngularJS filters for converting data and values to different formatsImplement single-page applications, using ngRoute to select views and navigationDive into basic and advanced directives for creating reusable componentsWrite an end-to-end test on a live version of your entire applicationUse best practices, guidelines, and tools throughout the development cycle
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Andy Greenberg - 2019
Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.
Thirty-six Years in the White House (1902)
Thomas Franses Pendel - 2016
Pendel's attention. It is very interesting and throws many sidelights on the life of the White House. Pendel writes: "In 1861, or 1862, the Metropolitan Police was established by Congress at the Capital, and I made application for and received an appointment on the force. I made the first arrest, with the assistance of "Buck" Essex. The case was that of a fellow named Grady, one of the English Hill toughs. A roundsman said to us, "Boys, you take a walk down Seventh Street, and if you see anything going on, take a hand in it." Just as we got opposite the Patent Office, this Grady had assaulted, or rather was assaulting, a young fellow with a whip. I went up and grabbed him and put him under arrest, then took him to Squire Dunn's court and preferred charges against him. The Squire was busy writing for some time. When he got through he handed me the paper he was writing, and I was so green at the business I did not know what it was, so said: "What is this, Squire?" He replied, "Why, that is the paper of commitment for this fellow. Take him to jail." "On November 3, 1864, Sergeant John Cronin, Alfonso Dunn, Andrew Smith, and myself were ordered to report at the First Precinct, in the old City Hall, at one o'clock in the afternoon. We supposed we were to be detailed for detective work in New York City on account of the great riot then on there, especially as we were ordered to report in citizens' clothes, to conceal our revolvers, and to be sure to have them all clean and in good order. We arrived at the City Hall, and then were told where we were to go, which was to the President's Mansion, there to report to Marshal Lanham, at that time United States Marshal of the District of Columbia, and a bosom friend of Abraham Lincoln. "These were days that tried men's hearts, and women's, too. Men were falling at the front by hundreds, both in the Union and in the Confederate armies. There was weeping and mourning all over the land. Our nation was trembling with anxiety; we were all hoping that the great strife was over or soon to be. "Marshal Lanham took us upstairs and into the President's office, where we were introduced to him and to his two secretaries, Mr. Nicolay and Mr. Hay, the latter now being Secretary of State. We were then instructed to keep a sharp lookout in the different parts of the house, more particularly in the East Room and at the door of the President's office. " CONTENTS I — Under President Lincoln II — Under President Johnson III — Under President Grant IV — Under President Hayes V — Under President Garfield VI — Under President Arthur VII — Under President Cleveland VIII — Under President Harrison IX — Cleveland's Second Administration X— Under President McKinley XI — Furniture in Executive Mansion Originally published in 1902; reformatted for the Kindle; may contain an occasional imperfections; original spellings have been kept in place.