Book picks similar to
Computational Modeling of Cognition and Behavior by Simon Farrell
nerd-alert
paused
priority_low
computer-science
How to Fly a Horse: The Secret History of Creation, Invention, and Discovery
Kevin Ashton - 2014
Now, in a tour-de-force narrative twenty years in the making, Ashton leads us on a journey through humanity’s greatest creations to uncover the surprising truth behind who creates and how they do it. From the crystallographer’s laboratory where the secrets of DNA were first revealed by a long forgotten woman, to the electromagnetic chamber where the stealth bomber was born on a twenty-five-cent bet, to the Ohio bicycle shop where the Wright brothers set out to “fly a horse,” Ashton showcases the seemingly unremarkable individuals, gradual steps, multiple failures, and countless ordinary and usually uncredited acts that lead to our most astounding breakthroughs.Creators, he shows, apply in particular ways the everyday, ordinary thinking of which we are all capable, taking thousands of small steps and working in an endless loop of problem and solution. He examines why innovators meet resistance and how they overcome it, why most organizations stifle creative people, and how the most creative organizations work. Drawing on examples from art, science, business, and invention, from Mozart to the Muppets, Archimedes to Apple, Kandinsky to a can of Coke, How to Fly a Horse is a passionate and immensely rewarding exploration of how “new” comes to be.
The Hundred-Page Machine Learning Book
Andriy Burkov - 2019
During that week, you will learn almost everything modern machine learning has to offer. The author and other practitioners have spent years learning these concepts.Companion wiki — the book has a continuously updated wiki that extends some book chapters with additional information: Q&A, code snippets, further reading, tools, and other relevant resources.Flexible price and formats — choose from a variety of formats and price options: Kindle, hardcover, paperback, EPUB, PDF. If you buy an EPUB or a PDF, you decide the price you pay!Read first, buy later — download book chapters for free, read them and share with your friends and colleagues. Only if you liked the book or found it useful in your work, study or business, then buy it.
Sex, Drugs and Chocolate
Paul R. Martin - 2009
The author looks at changing attitudes to pleasure over the centuries, including religious and philosophical lawgiving on the subject, before moving on to the science of all this human frenzy.
Feynman Lectures On Computation
Richard P. Feynman - 1996
Feynman gave his famous course on computation at the California Institute of Technology, he asked Tony Hey to adapt his lecture notes into a book. Although led by Feynman, the course also featured, as occasional guest speakers, some of the most brilliant men in science at that time, including Marvin Minsky, Charles Bennett, and John Hopfield. Although the lectures are now thirteen years old, most of the material is timeless and presents a “Feynmanesque” overview of many standard and some not-so-standard topics in computer science such as reversible logic gates and quantum computers.
Simple Self-Healing: The Magic of Autosuggestion
Émile Coué - 2017
French psychologist Émile Coué was one of the more underappreciated geniuses of 20th century medicine. Almost a hundred years ago, Coué’s popular self-healing method – which he called autosuggestion – helped cure thousands of people annually. Today, however, few people have ever even heard of him. This book introduces you to Coué’s overlooked formula, and will surprise you in the process. If you grasp the simplicity of autosuggestion, you’ll be able to use this wonderful tool as you wish – and it should help make your life “better and better.” Get your copy now.
Pioneer life; or, Thirty Years a Hunter, Being Scenes and Adventures in the Life of Philip Tome (1854)
Philip Tome - 2006
Tome was born in 1782 near present-day Harrisburg and lived on the upper Susquehanna for much of his life. He tells colorful (and mostly true) tales about his hunting exploits in the Pennsylvania wilderness, as he tracked elk, wolves, bears, panthers, foxes, and other large animals through the state’s north-central mountains, earning wide renown among his contemporaries. His stories contain suspenseful chase scenes, accidents, and narrow escapes, inviting the reader to view a still-wild Pennsylvania through the eyes of one who “was never conquered by man or animal.” Pioneer Life, originally published in 1854, has since been reprinted several times. This classic hunting memoir includes the following chapters: I. Birth and Early Life II. Hunting the Elk III. Capturing a Live Elk IV. Face of the Country V. Face of the Country — Continued VI. Danger From Rattlesnakes VII. Wolf and Bear Hunting VIII. Another Elk Hunt IX. Elk-Hunting on the Susquehannah X. Elk-Hunting — Continued XI. Nature, Habits, and Manner of Hunting the Elk XII. Elk and Bear Hunting in Winter XIII. Hunting on the Clarion River XIV. Hunting and Trapping XV. The Bear, Its Nature and Habits XVI. Hunting Deer at Different Seasons XVII. Nature and Habits of the Panther, Wolf and Fox XVIII. Rattlesnakes and Their Habits XIX. Distinguished Lumbermen, Etc. XX.. Reminiscences of Cornplanter XXI. Indian Eloquence This book originally published in 1854 has been reformatted for the Kindle and may contain an occasional defect from the original publication or from the reformatting
The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal
M. Mitchell Waldrop - 2001
C. R. Licklider, whose visionary dream of a human-computer symbiosis transformed the course of modern science and led to the development of the personal computer. Reprint.
Android Hacker's Handbook
Joshua J. Drake - 2013
Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
Exam Ref 70-486: Developing ASP.NET MVC 4 Web Applications
William Penberthy - 2013
Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.Focus on the expertise measured by these objectives:Design the application architectureDesign the user experienceDevelop the user experienceTroubleshoot and debug web applicationsDesign and implement securityThis Microsoft Exam Ref:Organizes its coverage by exam objectives.Features strategic, what-if scenarios to challenge you.Includes a 15% exam discount from Microsoft. (Limited time offer)
The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling
Ralph Kimball - 1996
Here is a complete library of dimensional modeling techniques-- the most comprehensive collection ever written. Greatly expanded to cover both basic and advanced techniques for optimizing data warehouse design, this second edition to Ralph Kimball's classic guide is more than sixty percent updated.The authors begin with fundamental design recommendations and gradually progress step-by-step through increasingly complex scenarios. Clear-cut guidelines for designing dimensional models are illustrated using real-world data warehouse case studies drawn from a variety of business application areas and industries, including:* Retail sales and e-commerce* Inventory management* Procurement* Order management* Customer relationship management (CRM)* Human resources management* Accounting* Financial services* Telecommunications and utilities* Education* Transportation* Health care and insuranceBy the end of the book, you will have mastered the full range of powerful techniques for designing dimensional databases that are easy to understand and provide fast query response. You will also learn how to create an architected framework that integrates the distributed data warehouse using standardized dimensions and facts.This book is also available as part of the Kimball's Data Warehouse Toolkit Classics Box Set (ISBN: 9780470479575) with the following 3 books:The Data Warehouse Toolkit, 2nd Edition (9780471200246)The Data Warehouse Lifecycle Toolkit, 2nd Edition (9780470149775)The Data Warehouse ETL Toolkit (9780764567575)
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
The Humane Interface: New Directions for Designing Interactive Systems
Jef Raskin - 2000
The Humane Interface is a gourmet dish from a master chef. Five mice! --Jakob Nielsen, Nielsen Norman Group Author of Designing Web Usability: The Practice of Simplicity This unique guide to interactive system design reflects the experience and vision of Jef Raskin, the creator of the Apple Macintosh. Other books may show how to use todays widgets and interface ideas effectively. Raskin, however, demonstrates that many current interface paradigms are dead ends, and that to make computers significantly easier to use requires new approaches. He explains how to effect desperately needed changes, offering a wealth of innovative and specific interface ideas for software designers, developers, and product managers. The Apple Macintosh helped to introduce a previous revolution in computer interface design, drawing on the best available technology to establish many of the interface techniques and methods now universal in the computer industry. With this book, Raskin proves again both his farsightedness and his practicality. He also demonstrates how design ideas must be bui
Effective C++: 55 Specific Ways to Improve Your Programs and Designs
Scott Meyers - 1991
But the state-of-the-art has moved forward dramatically since Meyers last updated this book in 1997. (For instance, there s now STL. Design patterns. Even new functionality being added through TR1 and Boost.) So Meyers has done a top-to-bottom rewrite, identifying the 55 most valuable techniques you need now to be exceptionally effective with C++. Over half of this edition s content is new. Templates broadly impact C++ development, and you ll find them everywhere. There s extensive coverage of multithreaded systems. There s an entirely new chapter on resource management. You ll find substantial new coverage of exceptions. Much is gained, but nothing s lost: You ll find the same depth of practical insight that first made Effective C++ a classic all those years ago. Bill Camarda, from the July 2005 href="http://www.barnesandnoble.com/newslet... Only
Python Cookbook
David Beazley - 2002
Packed with practical recipes written and tested with Python 3.3, this unique cookbook is for experienced Python programmers who want to focus on modern tools and idioms.Inside, you’ll find complete recipes for more than a dozen topics, covering the core Python language as well as tasks common to a wide variety of application domains. Each recipe contains code samples you can use in your projects right away, along with a discussion about how and why the solution works.Topics include:Data Structures and AlgorithmsStrings and TextNumbers, Dates, and TimesIterators and GeneratorsFiles and I/OData Encoding and ProcessingFunctionsClasses and ObjectsMetaprogrammingModules and PackagesNetwork and Web ProgrammingConcurrencyUtility Scripting and System AdministrationTesting, Debugging, and ExceptionsC Extensions
