Book picks similar to
Machine Learning: Fundamental Algorithms for Supervised and Unsupervised Learning With Real-World Applications by Joshua Chapmann
technology
machine-learning
technology-and-science
_check-this-out
Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom)
Adam Fisher - 2018
It will take us all back to our roots in the counterculture, and will remind us of the true nature of the innovation process, before we tried to tame it with slogans and buzzwords." -- Po Bronson, #1 New York Times bestselling author of The Nudist on the Late Shift and NurtureshockA candid, colorful, and comprehensive oral history that reveals the secrets of Silicon Valley -- from the origins of Apple and Atari to the present day clashes of Google and Facebook, and all the start-ups and disruptions that happened along the way.Rarely has one economy asserted itself as swiftly--and as aggressively--as the entity we now know as Silicon Valley. Built with a seemingly permanent culture of reinvention, Silicon Valley does not fight change; it embraces it, and now powers the American economy and global innovation. So how did this omnipotent and ever-morphing place come to be? It was not by planning. It was, like many an empire before it, part luck, part timing, and part ambition. And part pure, unbridled genius...Drawing on over two hundred in-depth interviews, VALLEY OF GENIUS takes readers from the dawn of the personal computer and the internet, through the heyday of the web, up to the very moment when our current technological reality was invented. It interweaves accounts of invention and betrayal, overnight success and underground exploits, to tell the story of Silicon Valley like it has never been told before. Read it to discover the stories that Valley insiders tell each other: the tall tales that are all, improbably, true.
Your Happiness Was Hacked: Why Tech Is Winning the Battle to Control Your Brain--And How to Fight Back
Vivek Wadhwa - 2018
This is the most important book ever written about one of the most significant aspects of our lives--the consequences of our addiction to online technology and how we can liberate ourselves and our children from it."--Dean Ornish, M.D. Founder & President, Preventive Medicine Research Institute, Clinical Professor of Medicine, UCSF, Author, The SpectrumTechnology: your master, or your friend? Do you feel ruled by your smartphone and enslaved by your e-mail or social-network activities? Digital technology is making us miserable, say bestselling authors and former tech executives Vivek Wadhwa and Alex Salkever. We've become a tribe of tech addicts--and it's not entirely our fault.Taking advantage of vulnerabilities in human brain function, tech companies entice us to overdose on technology interaction. This damages our lives, work, families, and friendships. Swipe-driven dating apps train us to evaluate people like products, diminishing our relationships. At work, we e-mail on average 77 times a day, ruining our concentration. At home, light from our screens is contributing to epidemic sleep deprivation.But we can reclaim our lives without dismissing technology. The authors explain how to avoid getting hooked on tech and how to define and control the roles that tech is playing and could play in our lives. And they provide a guide to technological and personal tools for regaining control. This readable book turns personal observation into a handy action guide to adapting to our new reality of omnipresent technology.
माझा साक्षात्कारी हृदयरोग
Abhay Bang - 2010
Abhay Bang who suffered from Heart disease at the age of 44. You might wonder, how a doctor who never had addiction of cigarette & alcohol throughout his life suffered from heart attack?
Master Mind: The Rise and Fall of Fritz Haber, the Nobel Laureate Who Launched the Age of Chemical Warfare
Daniel Charles - 2005
The Haber-Bosch process, which he invented at the turn of the twentieth century, revolutionized agriculture by converting nitrogen to fertilizer in quantities massive enough to feed the world. The invention has become an essential pillar for life on earth; some two billion people on our planet could not survive without it. Yet this same process supplied the German military with explosives during World War I, and Haber orchestrated Germany's use of an entirely new weapon -- poison gas. Eventually, Haber's efforts led to Zyklon B, the gas later used to kill millions -- including Haber's own relatives -- in Nazi concentration camps.Haber is the patron saint of guns and butter, a scientist whose discoveries transformed the way we produce food and fight wars. His legacy is filled with contradictions, as was his personality. For some, he was a benefactor of humanity and devoted friend. For others, he was a war criminal, possessed by raw ambition. An intellectual gunslinger, enamored of technical progress and driven by patriotic devotion to Germany, he was instrumental in the scientific work that inadvertently supported the Nazi cause; a Jew and a German patriot, he was at once an enabler of the Nazi regime and its victim.Master Mind is a thought-provoking biography of this controversial scientist, a modern Faust who personifies the paradox of science, its ability to create and to destroy. It offers a complete chronicle of his tumultuous and ultimately tragic life, from his childhood and rise to prominence in the heady days of the German Empire to his disgrace and exile at the hands of the Nazis; from early decades as the hero who eliminated the threat of starvation to his lingering legacy as a villain whose work led to the demise of millions.
Android Phones for Dummies
Dan Gookin - 2012
Veteran world-renowned author Dan Gookin walks you through everything from getting started with setup and configuration to making the most of your phone's potential with texting, e-mailing, accessing the Internet and social networking sites, using the camera, synching with a PC, downloading apps, and more.Covers all the details of the operating system that applies to every Android phone, including Motorola Droids, HTC devices, Samsung Galaxy S phones, to name a few Walks you through basic phone operations while also encouraging you to explore your phone's full potential Serves as an ideal guide to an inexperienced Android newbie who is enthusiastic about getting a handle on everything an Android phone can do Android Phones For Dummies helps you get smarter with your Android smartphone.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
Numbers Don't Lie: 71 Things You Need to Know About the World
Vaclav Smil - 2020
There's a wonderful mix of science, history and wit, all in bite-sized chapters on a broad range of topics.Urgent and essential, Numbers Don't Lie inspires readers to interrogate what they take to be true in these significant times. Smil is on a mission to make facts matter, because after all, numbers may not lie, but which truth do they convey?'The best book to read to better understand our world. Once in a while a book comes along that helps us see our planet more clearly. By showing us numbers about science, health, green technology and more, Smil's book does just that. It should be on every bookshelf!' Linda Yueh, author of The Great Economists'He is rigorously numeric, using data to illuminate every topic he writes about. The word "polymath" was invented to describe people like him' Bill Gates 'Important' Mark Zuckerberg, on Energy 'One of the world's foremost thinkers on development history and a master of statistical analysis . . . The nerd's nerd' Guardian 'There is perhaps no other academic who paints pictures with numbers like Smil' Guardian 'In a world of specialized intellectuals, Smil is an ambitious and astonishing polymath who swings for fences . . . They're among the most data-heavy books you'll find, with a remarkable way of framing basic facts' Wired 'He's a slayer of bullshit' David Keith, Gordon McKay Professor of Applied Physics & Professor of Public Policy, Harvard UniversityVaclav Smil is Distinguished Professor Emeritus at the University of Manitoba. He is the author of over forty books on topics including energy, environmental and population change, food production and nutrition, technical innovation, risk assessment and public policy. No other living scientist has had more books (on a wide variety of topics) reviewed in Nature. A Fellow of the Royal Society of Canada, in 2010 he was named by Foreign Policy as one of the Top 100 Global Thinkers. This is his first book for a more general readership.
The Little Schemer
Daniel P. Friedman - 1974
The authors' enthusiasm for their subject is compelling as they present abstract concepts in a humorous and easy-to-grasp fashion. Together, these books will open new doors of thought to anyone who wants to find out what computing is really about. The Little Schemer introduces computing as an extension of arithmetic and algebra; things that everyone studies in grade school and high school. It introduces programs as recursive functions and briefly discusses the limits of what computers can do. The authors use the programming language Scheme, and interesting foods to illustrate these abstract ideas. The Seasoned Schemer informs the reader about additional dimensions of computing: functions as values, change of state, and exceptional cases. The Little LISPer has been a popular introduction to LISP for many years. It had appeared in French and Japanese. The Little Schemer and The Seasoned Schemer are worthy successors and will prove equally popular as textbooks for Scheme courses as well as companion texts for any complete introductory course in Computer Science.
Accidental Empires
Robert X. Cringely - 1992
Accidental Empires is the trenchant, vastly readable history of that industry, focusing as much on the astoundingly odd personalities at its core—Steve Jobs, Bill Gates, Mitch Kapor, etc. and the hacker culture they spawned as it does on the remarkable technology they created. Cringely reveals the manias and foibles of these men (they are always men) with deadpan hilarity and cogently demonstrates how their neuroses have shaped the computer business. But Cringely gives us much more than high-tech voyeurism and insider gossip. From the birth of the transistor to the mid-life crisis of the computer industry, he spins a sweeping, uniquely American saga of creativity and ego that is at once uproarious, shocking and inspiring.
Lesser Beasts: A Snout-to-Tail History of the Humble Pig
Mark Essig - 2015
Incredibly efficient at converting almost any organic matter into nourishing, delectable protein, swine are nothing short of a gastronomic godsend—yet their flesh is banned in many cultures, and the animals themselves are maligned as filthy, lazy brutes.As historian Mark Essig reveals in Lesser Beasts, swine have such a bad reputation for precisely the same reasons they are so valuable as a source of food: they are intelligent, self-sufficient, and omnivorous. What’s more, he argues, we ignore our historic partnership with these astonishing animals at our peril. Tracing the interplay of pig biology and human culture from Neolithic villages 10,000 years ago to modern industrial farms, Essig blends culinary and natural history to demonstrate the vast importance of the pig and the tragedy of its modern treatment at the hands of humans. Pork, Essig explains, has long been a staple of the human diet, prized in societies from Ancient Rome to dynastic China to the contemporary American South. Yet pigs’ ability to track down and eat a wide range of substances (some of them distinctly unpalatable to humans) and convert them into edible meat has also led people throughout history to demonize the entire species as craven and unclean. Today’s unconscionable system of factory farming, Essig explains, is only the latest instance of humans taking pigs for granted, and the most recent evidence of how both pigs and people suffer when our symbiotic relationship falls out of balance.An expansive, illuminating history of one of our most vital yet unsung food animals, Lesser Beasts turns a spotlight on the humble creature that, perhaps more than any other, has been a mainstay of civilization since its very beginnings—whether we like it or not.
Dark Pools: The Rise of Artificially Intelligent Trading Machines and the Looming Threat to Wall Street
Scott Patterson - 2012
In the beginning was Josh Levine, an idealistic programming genius who dreamed of wresting control of the market from the big exchanges that, again and again, gave the giant institutions an advantage over the little guy. Levine created a computerized trading hub named Island where small traders swapped stocks, and over time his invention morphed into a global electronic stock market that sent trillions in capital through a vast jungle of fiber-optic cables. By then, the market that Levine had sought to fix had turned upside down, birthing secretive exchanges called dark pools and a new species of trading machines that could think, and that seemed, ominously, to be slipping the control of their human masters. Dark Pools is the fascinating story of how global markets have been hijacked by trading robots--many so self-directed that humans can't predict what they'll do next.
Black Code: Inside the Battle for Cyberspace
Robert J. Deibert - 2013
We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain.In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat. Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.
How to Diagnose and Fix Everything Electronic
Michael Jay Geier - 2010
How to Diagnose and Fix Everything Electronic shows you how to repair and extend the life of all kinds of solid-state devices, from modern digital gadgetry to cherished analog products of yesteryear.You'll start by selecting the tools and test equipment you'll need and setting up your workbench. Then, you'll get familiar with components and how they form circuits, stages, and sections of a device. Next, you'll learn how to take a product apart, figure out what's wrong with it, replace components, and reassemble it. Real-world case studies help clarify the topics covered. Tips and tricks for specific devices, such as optical disc players, computers, and video recorders, are also included in this practical resource.
507 Mechanical Movements: Mechanisms and Devices
Henry T. Brown - 1984
Spanning the first century of the Industrial Revolution, this 1868 compilation features simplified, concise illustrations of the mechanisms used in hydraulics, steam engines, pneumatics, presses, horologes, and scores of other machines.The movements of each of the 507 mechanisms are depicted in drawings on the left-hand page, and the facing page presents a brief description of the item's use and operation. Ranging from simple to intricately complex, the mechanisms offer a fascinating view of the variety of small components that constitute complex machinery. A detailed index provides easy reference to specific mechanisms.Inventors, tinkerers, and anyone with an interest in the history of invention and technology will find this volume a treasury of information and inspiration.