The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine


Charles Petzold - 2008
    Turing Mathematician Alan Turing invented an imaginary computer known as the Turing Machine; in an age before computers, he explored the concept of what it meant to be "computable," creating the field of computability theory in the process, a foundation of present-day computer programming.The book expands Turing's original 36-page paper with additional background chapters and extensive annotations; the author elaborates on and clarifies many of Turing's statements, making the original difficult-to-read document accessible to present day programmers, computer science majors, math geeks, and others.Interwoven into the narrative are the highlights of Turing's own life: his years at Cambridge and Princeton, his secret work in cryptanalysis during World War II, his involvement in seminal computer projects, his speculations about artificial intelligence, his arrest and prosecution for the crime of "gross indecency," and his early death by apparent suicide at the age of 41.

The Difference Engine : Charles Babbage And The Quest To Build The First Computer


Doron Swade - 2000
    Doron Swade, technology historian and assistant director of London's Science Museum, investigates the troubles that plagued 19th-century knowledge engineers in The Difference Engine: Charles Babbage and the Quest to Build the First Computer.The author is in a unique position to appreciate the technical difficulties of the time, as he led a team that built a working model of a Difference Engine, using contemporary materials, in time for Babbage's 1991 bicentenary. The meat of the book is comprised of the story of the first computing machine design as gathered from the technical notes and drawings curated by Swade. Though Babbage certainly had problems translating his ideas into brass, the reader also comes to understand his fruitless, drawn-out arguments with his funders. Swade had it comparatively easy, though his depictions of the frustrating search for money and then working out how best to build the enormous machine in the late 1980s are delightful.It is difficult--maybe impossible--to draw a clear, unbroken line of influence from Babbage to any modern computer researchers, but his importance both as the first pioneer and as a symbol of the joys and sorrows of computing is unquestioned. Swade clearly respects his subject deeply, all the more so for having tried to bring the great old man's ideas to life. The Difference Engine is lovingly comprehensive and will thrill readers looking for a more technical examination of Babbage's career. --Rob Lightner

Computer Age Statistical Inference: Algorithms, Evidence, and Data Science


Bradley Efron - 2016
    'Big data', 'data science', and 'machine learning' have become familiar terms in the news, as statistical methods are brought to bear upon the enormous data sets of modern science and commerce. How did we get here? And where are we going? This book takes us on an exhilarating journey through the revolution in data analysis following the introduction of electronic computation in the 1950s. Beginning with classical inferential theories - Bayesian, frequentist, Fisherian - individual chapters take up a series of influential topics: survival analysis, logistic regression, empirical Bayes, the jackknife and bootstrap, random forests, neural networks, Markov chain Monte Carlo, inference after model selection, and dozens more. The distinctly modern approach integrates methodology and algorithms with statistical inference. The book ends with speculation on the future direction of statistics and data science.

Programming Rust: Fast, Safe Systems Development


Jim Blandy - 2015
    Rust's modern, flexible types ensure your program is free of null pointer dereferences, double frees, dangling pointers, and similar bugs, all at compile time, without runtime overhead. In multi-threaded code, Rust catches data races at compile time, making concurrency much easier to use.Written by two experienced systems programmers, this book explains how Rust manages to bridge the gap between performance and safety, and how you can take advantage of it. Topics include:How Rust represents values in memory (with diagrams)Complete explanations of ownership, moves, borrows, and lifetimesCargo, rustdoc, unit tests, and how to publish your code on crates.io, Rust's public package repositoryHigh-level features like generic code, closures, collections, and iterators that make Rust productive and flexibleConcurrency in Rust: threads, mutexes, channels, and atomics, all much safer to use than in C or C++Unsafe code, and how to preserve the integrity of ordinary code that uses itExtended examples illustrating how pieces of the language fit together

Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier


Suelette Dreyfus - 1997
    Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

Solutions and Problems


Virgil Moring Faires
    

Tools for Thought: The History and Future of Mind-Expanding Technology


Howard Rheingold - 1985
    C. R. Licklider, Doug Engelbart, Bob Taylor, and Alan Kay.The digital revolution did not begin with the teenage millionaires of Silicon Valley, claims Howard Rheingold, but with such early intellectual giants as Charles Babbage, George Boole, and John von Neumann. In a highly engaging style, Rheingold tells the story of what he calls the patriarchs, pioneers, and infonauts of the computer, focusing in particular on such pioneers as J. C. R. Licklider, Doug Engelbart, Bob Taylor, and Alan Kay. Taking the reader step by step from nineteenth-century mathematics to contemporary computing, he introduces a fascinating collection of eccentrics, mavericks, geniuses, and visionaries.The book was originally published in 1985, and Rheingold's attempt to envision computing in the 1990s turns out to have been remarkably prescient. This edition contains an afterword, in which Rheingold interviews some of the pioneers discussed in the book. As an exercise in what he calls retrospective futurism, Rheingold also looks back at how he looked forward.

A Brief History of the Future: The Origins of the Internet


John Naughton - 1999
    The only book that tells the whole story of the internet from its origins in the 1940s to the advent of the worldwide web at the dawn of the 21st century

Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture


David Kushner - 2003
    Together, they ruled big business. They transformed popular culture. And they provoked a national controversy. More than anything, they lived a unique and rollicking American Dream, escaping the broken homes of their youth to produce the most notoriously successful game franchises in history—Doom and Quake— until the games they made tore them apart. This is a story of friendship and betrayal, commerce and artistry—a powerful and compassionate account of what it's like to be young, driven, and wildly creative.

Her Port in the Storm


Grace Clemens - 2020
    Focused on her work as a schoolteacher assistant, it seems that nothing could disturb her peaceful existence. Little did she know that her world would be turned upside down the moment her mother starts receiving mysteriously threatening letters. Wasting no time, Loren turns to the charming sheriff, who will do whatever it takes to help her and the only person she has by her side. However, she has no time for romance, as she needs to find the evil mastermind behind her family's ruin. Will she manage to escape from a painful dilemma of choosing between love and devotion to the only person that was always there for her?Edison Haynes is a determined man who has devoted his life in serving justice after his brother's tragic passing. Upon completing his training under one of the best sheriffs in Tombstone, he moves to Bridgestone at the age of twenty-six to become the local sheriff. Soon, fate brings him in front of an unprotected woman who is desperately asking for help. When he realizes that his mission is not a child's play, it will require all of his skills to rescue the helpless lady. What he could never expect though, is that he would find himself hopelessly in love with her along the way. Will Edison manage to save the helpless woman that could be the missing piece to the puzzle of his lonely life?The clock is ticking for Edison and Loren, who have to quickly discover what lies behind the blackmailing letters that are haunting their dreams. Will they manage to solve the baffling mystery and find their other half against all odds?"Her Port in the Storm" is a historical romance novel of approximately 60,000 words. No cheating, no cliffhangers, and a guaranteed happily ever after.

DNS and BIND


Cricket Liu - 1996
    This book brings you up-to-date with the latest changes in this crucial service.The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.Topics include:What DNS does, how it works, and when you need to use it How to find your own place in the Internet's namespace Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) Mapping one name to several servers for load sharing Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers Troubleshooting: using nslookup and dig, reading debugging output, common problems DNS programming using the resolver library and Perl's Net::DNS module

His Heart's Whisperer


Aurora Hanson - 2020
    Luckily for her, her best friend steps in with the perfect solution that will guarantee her financial security. Before even Lizzie realizes it, she becomes a mail-order bride, traveling off to Texas to meet her husband-to-be. Just when she thinks she's finally found some hope, Lizzie discovers that her fiancé is expecting a well-accomplished lady, which she is certainly not. Torn between lies, she finds herself trapped in a painful dilemma...Will she go against her own values for a chance at love?Upon his father's death, Charles Johnson inherited a small ranch and made it the largest in all of Spring Branch. When his brother announces he is expecting his first child, it is a wake up call for Charles that it's high time he found a wife too. Charles is no ignorant to women trying to trap him because of his money and status and he has no choice but to employ a marriage agency. While he never expected to actually fall for his bride-to-be, the minute he meets Lizzie, he is captivated. When secrets come to light, will he manage to trust her and succumb to this unprecedented feeling?Moving to Spring Branch was supposed to solve all of Lizzie's problems instead of creating new ones. In the middle of a web of lies and confusion, she and Charles will have to learn to accept their untameable feelings. Together they must decide if love is worth the trouble... Can the two of them overcome their differences and let their romance flourish, no matter what the cost?"His Heart's Whisperer" is a historical western romance novel of approximately 80,000 words. No cheating, no cliffhangers, and a guaranteed happily ever after.

The Supermen: The Story of Seymour Cray and the Technical Wizards Behind the Supercomputer


Charles J. Murray - 1997
    This is the story of a technical genius who, against all odds, created a series of machines that revolutionized the computing industry. Chronicling each major breakthrough, Murray takes us behind the scenes to witness late-night brainstorming sessions, miraculous eleventh-hour fixes, and flashes of insight when bold new ideas were cooked up. Drawing from rare in-depth interviews with Seymour Cray, Murray gives us an unparalleled portrait of the man and his methods, reporting not only Cray's personal reflections, but the recollections of his closest colleagues and the truth behind the rumors.

Love in Times of Injustice: A Historical Western


Lorelei Brogan - 2020
    One eventful night, Anika and her sister Elena will meet Marty and Darcy, two brothers that will help them escape their misery for good. Although Elena will soon be encharmed by Marty, Anika has the feeling that Darcy keeps a tremendous secret... Will she follow her instinct and unravel this enigmatic mystery?Darcy Stuart is a courageous sheriff who has been on the trail of the most atrocious gang in Texas for over a year. When his investigation leads him to Anika and her family, lying seems to be the only way in. Aiming to get all the insights about the criminal business of her father, he will do whatever it takes to earn her trust. The future, however, holds many unforeseen surprises, as he will soon fall badly for Anika... How will his growing feelings affect his risky mission?While Anika and Stuart grow closer together, the dreadful truth remains still well hidden. Will secrets eventually come out and tear them apart forever? Is there any chance for them to find the path to happiness and leave their dishonest past behind?

Introduction to Computer Theory


Daniel I.A. Cohen - 1986
    Covers all the topics needed by computer scientists with a sometimes humorous approach that reviewers found refreshing. The goal of the book is to provide a firm understanding of the principles and the big picture of where computer theory fits into the field.