How to Disappear: Erase your Digital Footprint, Leave False Trails, and Vanish without A Trace


Frank M. Ahearn - 2010
    How to Disappear is the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who’s ever entertained the fantasy of disappearing—whether actually dropping out of sight or by eliminating the traceable evidence of their existence.

PCs for Dummies


Dan Gookin - 1992
    They have also sprouted new and wondrous capabilities at a dizzying pace. This 11th Edition of the all-time bestselling PC guide has been polished and honed to deliver everything you need to know about your twenty-first-century PC -- from what plugs into what to adjusting your monitor to burning DVDs, and much more.Whether you want to go online, install a firewall, live the digital life, or finally get a handle on the whole computer software concept, this fun, plain-English handbook is here to answer all your questions PC questions. You'll find out why Windows Vista is the way to go and how to use it to get everywhere else. And, you'll pick up Web and email tricks and learn about all the new levels of PC security. Discover how to: Set up your PC Use Vista menus Store your stuff on Memory Cards Record live TV Download digital photos Connect to a wireless network Explore the Internet safely Print perfect documents, photos, and more Use your PC as the new hub of your digital worldComplete with helpful hints on how to avoid beginner mistakes, a list of extras and accessories you may want for your PC, and insider tips from a PC guru. PCs for Dummies, 11th Edition is the one PC accessory you can't do without.

Now You See It: How the Brain Science of Attention Will Transform the Way We Live, Work, and Learn


Cathy N. Davidson - 2011
     When Cathy Davidson and Duke University gave free iPods to the freshman class in 2003, critics said they were wasting their money. Yet when students in practically every discipline invented academic uses for their music players, suddenly the idea could be seen in a new light-as an innovative way to turn learning on its head. This radical experiment is at the heart of Davidson's inspiring new book. Using cutting-edge research on the brain, she shows how "attention blindness" has produced one of our society's greatest challenges: while we've all acknowledged the great changes of the digital age, most of us still toil in schools and workplaces designed for the last century. Davidson introduces us to visionaries whose groundbreaking ideas-from schools with curriculums built around video games to companies that train workers using virtual environments-will open the doors to new ways of working and learning. A lively hybrid of Thomas Friedman and Norman Doidge, Now You See It is a refreshingly optimistic argument for a bold embrace of our connected, collaborative future.

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family


Theresa M. Payton - 2014
    The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.

Lauren Ipsum


Carlos Bueno - 2011
    If the idea of a computer science book without computers upsets you, please close your eyes until you’ve finished reading the rest of this page.The truth is that computer science is not really about the computer. It is just a tool to help you see ideas more clearly. You can see the moon and stars without a telescope, smell the flowers without a fluoroscope, have fun without a funoscope, and be silly sans oscilloscope.You can also play with computer science without... you-know-what. Ideas are the real stuff of computer science. This book is about those ideas, and how to find them.

Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age


Michael A. Hiltzik - 1999
    And they did it without fanfare or recognition from their employer. Hiltzik's Dealers of Lightning provides a fascinating look at technohistory that sets the record straight. In Dealers of Lightning, Hiltzik describes the forces and faces behind the revolution that the Xerox PARC team single-handedly spawned. The Xerox PARC group was composed solely of top technical minds. The decision was made at Xerox headquarters to give the team complete freedom from deadlines and directives, in hopes of fostering a true creative environment. It worked — perhaps too well. The team responded with a steady output of amazing technology, including the first version of the Internet, the first personal computer, user-friendly word-processing programs, and pop-up menus. Xerox, far from ready for the explosion of innovation, failed to utilize the technology dreamed up by the group. Out of all the dazzling inventions born at Xerox PARC, only a handful were developed and marketed by Xerox. However, one of these inventions, the laser printer, proved successful enough to earn billions for the company, therefore justifying its investment in the research center. Most oftheteam's creations would go on to be developed and perfected by other companies, such as IBM, Apple, and Microsoft. Drawing from interviews with the engineers, executives, and scientists involved in the Xerox PARC, Dealers of Lightning chronicles an amazing era of egos, ideas, and inventions at the dawn of the computer age.

How Innovation Works: Serendipity, Energy and the Saving of Time


Matt Ridley - 2020
    Forget short-term symptoms like Donald Trump and Brexit, it is innovation itself that explains them and that will itself shape the 21st century for good and ill. Yet innovation remains a mysterious process, poorly understood by policy makers and businessmen, hard to summon into existence to order, yet inevitable and inexorable when it does happen.Matt Ridley argues in this book that we need to change the way we think about innovation, to see it as an incremental, bottom-up, fortuitous process that happens to society as a direct result of the human habit of exchange, rather than an orderly, top-down process developing according to a plan. Innovation is crucially different from invention, because it is the turning of inventions into things of practical and affordable use to people. It speeds up in some sectors and slows down in others. It is always a collective, collaborative phenomenon, not a matter of lonely genius. It is gradual, serendipitous, recombinant, inexorable, contagious, experimental and unpredictable. It happens mainly in just a few parts of the world at any one time. It still cannot be modelled properly by economists, but it can easily be discouraged by politicians. Far from there being too much innovation, we may be on the brink of an innovation famine.Ridley derives these and other lessons, not with abstract argument, but from telling the lively stories of scores of innovations, how they started and why they succeeded or in some cases failed. He goes back millions of years and leaps forward into the near future. Some of the innovation stories he tells are about steam engines, jet engines, search engines, airships, coffee, potatoes, vaping, vaccines, cuisine, antibiotics, mosquito nets, turbines, propellers, fertiliser, zero, computers, dogs, farming, fire, genetic engineering, gene editing, container shipping, railways, cars, safety rules, wheeled suitcases, mobile phones, corrugated iron, powered flight, chlorinated water, toilets, vacuum cleaners, shale gas, the telegraph, radio, social media, block chain, the sharing economy, artificial intelligence, fake bomb detectors, phantom games consoles, fraudulent blood tests, faddish diets, hyperloop tubes, herbicides, copyright and even – a biological innovation -- life itself.

Creating Mobile Apps with Xamarin.Forms: Cross-Platform C# Programming for iOS, Android, and Windows Phone


Charles Petzold - 2014
    Xamarin.Forms lets you write shared user-interface code in C# and XAML that maps to native controls on these three platforms.

The Simulation Hypothesis


Rizwan Virk - 2019
    Riz is the Executive Director of Play Labs @ MIT, a video game startup incubator at the MIT Game Lab.Drawing from research and concepts from computer science, artificial intelligence, video games, quantum physics, and referencing both speculative fiction and ancient eastern spiritual texts, Virk shows how all of these traditions come together to point to the idea that we may be inside a simulated reality like the Matrix.The Simulation Hypothesis is the idea that our physical reality, far from being a solid physical universe, is part of an increasingly sophisticated video game-like simulation, where we all have multiple lives, consisting of pixels with its own internal clock run by some giant Artificial Intelligence. Simulation theory explains some of the biggest mysteries of quantum and relativistic physics, such as quantum indeterminacy, parallel universes, and the integral nature of the speed of light.Recently, the idea that we may be living in a giant video game has received a lot of attention:"There's a one in a billion chance we are not living in a simulation" -Elon Musk"I find it hard to argue we are not in a simulation." -Neil deGrasse Tyson"We are living in computer generated reality." -Philip K. DickVideo game technology has developed from basic arcade and text adventures to MMORPGs. Video game designer Riz Virk shows how these games may continue to evolve in the future, including virtual reality, augmented reality, Artificial Intelligence, and quantum computing. This book shows how this evolution could lead us to the point of being able to develop all encompassing virtual worlds like the Oasis in Ready Player One, or the simulated reality in the Matrix.While the idea sounds like science fiction, many scientists, engineers, and professors have given the Simulation Hypothesis serious consideration. Futurist Ray Kurzweil has popularized the idea of downloading our consciousness into a silicon based device, which would mean we are just digital information after all. Some, like Oxford lecturer Nick Bostrom, goes further and thinks we may in fact be artificially intelligent consciousness inside such a simulation already!But the Simulation Hypothesis is not just a modern idea. Philosophers like Plato have been telling us that we live in a "cave" and can only see shadows of the real world. Mystics of all traditions have long contended that we are living in some kind of "illusion "and that there are other realities which we can access with our minds. While even Judeo-Christian traditions have this idea, Eastern traditions like Buddhism and Hinduism make this idea part of their core tradition -- that we are inside a dream world ("Maya" or illusion, or Vishnu's Dream), and we have "multiple lives" playing different characters when one dies, continuing to gain experience and "level up" after completing certain challenges. Sounds a lot like a video game!Whether you are a computer scientist, a fan of science fiction like the Matrix movies, a video game enthusiast, or a spiritual seeker, The Simulation Hypothesis touches on all these areas, and you will never look at the world the same way again!

Wizzywig: Portrait of a Serial Hacker


Ed Piskor - 2012
    but Kevin "Boingthump" Phenicle could always see more than most people. In the world of phone phreaks, hackers, and scammers, he's a legend. His exploits are hotly debated: could he really get free long-distance calls by whistling into a pay phone? Did his video-game piracy scheme accidentally trigger the first computer virus? And did he really dodge the FBI by using their own wiretapping software against them? Is he even a real person? And if he's ever caught, what would happen to a geek like him in federal prison? Inspired by the incredible stories of real-life hackers, Wizzygig is the thrilling tale of a master manipulator -- his journey from precocious child scammer to federally-wanted fugitive, and beyond. In a world transformed by social networks and data leaks, Ed Piskor's debut graphic novel reminds us how much power can rest in the hands of an audacious kid with a keyboard.

Superintelligence: Paths, Dangers, Strategies


Nick Bostrom - 2014
    The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful--possibly beyond our control. As the fate of the gorillas now depends more on humans than on the species itself, so would the fate of humankind depend on the actions of the machine superintelligence.But we have one advantage: we get to make the first move. Will it be possible to construct a seed Artificial Intelligence, to engineer initial conditions so as to make an intelligence explosion survivable? How could one achieve a controlled detonation?

Understanding and Using C Pointers


Richard Reese - 2013
    With this practical book, you’ll learn how pointers provide the mechanism to dynamically manipulate memory, enhance support for data structures, and enable access to hardware. Author Richard Reese shows you how to use pointers with arrays, strings, structures, and functions, using memory models throughout the book.Difficult to master, pointers provide C with much flexibility and power—yet few resources are dedicated to this data type. This comprehensive book has the information you need, whether you’re a beginner or an experienced C or C++ programmer or developer.Get an introduction to pointers, including the declaration of different pointer typesLearn about dynamic memory allocation, de-allocation, and alternative memory management techniquesUse techniques for passing or returning data to and from functionsUnderstand the fundamental aspects of arrays as they relate to pointersExplore the basics of strings and how pointers are used to support themExamine why pointers can be the source of security problems, such as buffer overflowLearn several pointer techniques, such as the use of opaque pointers, bounded pointers and, the restrict keyword

Leading Snowflakes


Oren Ellenbogen - 2013
    Leading Snowflakes offers you proven tools and practices for improving your management skills that you can implement – starting today.

Comptia Security+: Get Certified Get Ahead: Sy0-301 Study Guide


Darril Gibson - 2011
    The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he's honed in the classroom that have helped hundreds of students master the Security+ content. You'll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what's important. Over 450 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 100 question pre-test, a 100 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You'll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you'll be a step ahead for other exams. This SY0-301 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author supplements the book with blog posts here: http: //blogs.getcertifiedgetahead.com/. This page provides a full listing of mobile device apps from the author: http: //learnzapp.com/partners/darrilgibson/

Computer Science Illuminated


Nell B. Dale - 2002
    Written By Two Of Today'S Most Respected Computer Science Educators, Nell Dale And John Lewis, The Text Provides A Broad Overview Of The Many Aspects Of The Discipline From A Generic View Point. Separate Program Language Chapters Are Available As Bundle Items For Those Instructors Who Would Like To Explore A Particular Programming Language With Their Students. The Many Layers Of Computing Are Thoroughly Explained Beginning With The Information Layer, Working Through The Hardware, Programming, Operating Systems, Application, And Communication Layers, And Ending With A Discussion On The Limitations Of Computing. Perfect For Introductory Computing And Computer Science Courses, Computer Science Illuminated, Third Edition's Thorough Presentation Of Computing Systems Provides Computer Science Majors With A Solid Foundation For Further Study, And Offers Non-Majors A Comprehensive And Complete Introduction To Computing.