User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play


Cliff Kuang - 2019
    Spanning over a century of sweeping changes, from women's rights to the Great Depression to World War II to the rise of the digital era, this book unpacks the ways in which the world has been--and continues to be--remade according to the principles of the once-obscure discipline of user-experience design.In this essential text, Kuang and Fabricant map the hidden rules of the designed world and shed light on how those rules have caused our world to change--an underappreciated but essential history that's pieced together for the first time. Combining the expertise and insight of a leading journalist and a pioneering designer, User Friendly provides a definitive, thoughtful, and practical perspective on a topic that has rapidly gone from arcane to urgent to inescapable. In User Friendly, Kuang and Fabricant tell the whole story for the first time--and you'll never interact with technology the same way again.

Trust Me, I'm Lying: Confessions of a Media Manipulator


Ryan Holiday - 2012
    A malicious online rumor costs a company millions. A political sideshow derails the national news cycle and destroys a candidate. Some product or celebrity zooms from total obscurity to viral sensation. What you don't know is that someone is responsible for all this. Usually, someone like me.I'm a media manipulator. In a world where blogs control and distort the news, my job is to control blogs--as much as any one person can. In today's culture... 1) Blogs like "Gawker," "Buzzfeed" and the "Huffington Post" drive the media agenda. 2) Bloggers are slaves to money, technology, and deadlines. 3) Manipulators wield these levers to shape everything you read, see and watch--online and off.Why am I giving away these secrets? Because I'm tired of a world where blogs take indirect bribes, marketers help write the news, reckless journalists spread lies, and no one is accountable for any of it. I'm pulling back the curtain because I don't want anyone else to get blindsided. I'm going to explain exactly how the media "really" works. What you choose to do with this information is up to you.

Power to the Public: The Promise of Public Interest Technology


Tara Dawson McGuinness - 2021
    In Power to the Public, Tara Dawson McGuinness and Hana Schank describe a revolutionary new approach--public interest technology--that has the potential to transform the way governments and nonprofits around the world solve problems. Through inspiring stories about successful projects ranging from a texting service for teenagers in crisis to a streamlined foster care system, the authors show how public interest technology can make the delivery of services to the public more effective and efficient.At its heart, public interest technology means putting users at the center of the policymaking process, using data and metrics in a smart way, and running small experiments and pilot programs before scaling up. And while this approach may well involve the innovative use of digital technology, technology alone is no panacea--and some of the best solutions may even be decidedly low-tech.Clear-eyed yet profoundly optimistic, Power to the Public presents a powerful blueprint for how government and nonprofits can help solve society's most serious problems.

Click: What Millions of People are Doing Online and Why It Matters


Bill Tancer - 2008
    As online directories replace the yellow pages, search engines replace traditional research, and news sites replace newsprint, we are in an age in which we've come to rely tremendously on the Internet--leaving behind a trail of information about ourselves as a culture and the direction in which we are headed. With surprising and practical insight, Tancer demonstrates how the Internet is changing the way we absorb information and how understanding that change can be used to our advantage in business and in life.Click analyzes the new generation of consumerism in a way no other book has before, showing how we use the Internet, and how those trends provide a wealth of market research nearly as vast as the Internet itself. Understanding how we change is integral to our success. After all, we are what we click.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone


Satya Nadella - 2017
    It’s about how people, organizations and societies can and must hit refresh—transform—in their persistent quest for new energy, new ideas, relevance and renewal. At the core, it’s about us humans and our unique qualities, like empathy, which will become ever more valuable in a world where the torrent of technology will disrupt like never before. As much a humanist as a technologist, Nadella defines his mission and that of the company he leads as empowering every person and every organization on the planet to achieve more.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race


Nicole Perlroth - 2021
    One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

Network Security: Private Communication in a Public World


Charlie Kaufman - 1995
    In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.

The Culture Map: Breaking Through the Invisible Boundaries of Global Business


Erin Meyer - 2014
    Renowned expert Erin Meyer is your guide through this subtle, sometimes treacherous terrain where people from starkly different backgrounds are expected to work harmoniously together.When you have Americans who precede anything negative with three nice comments; French, Dutch, Israelis, and Germans who get straight to the point (“your presentation was simply awful”); Latin Americans and Asians who are steeped in hierarchy; Scandinavians who think the best boss is just one of the crowd—the result can be, well, sometimes interesting, even funny, but often disastrous.Even with English as a global language, it’s easy to fall into cultural traps that endanger careers and sink deals when, say, a Brazilian manager tries to fathom how his Chinese suppliers really get things done, or an American team leader tries to get a handle on the intra-team dynamics between his Russian and Indian team members.In The Culture Map, Erin Meyer provides a field-tested model for decoding how cultural differences impact international business. She combines a smart analytical framework with practical, actionable advice for succeeding in a global world.

Quantum Physics for Beginners: From Wave Theory to Quantum Computing. Understanding How Everything Works by a Simplified Explanation of Quantum Physics and Mechanics Principles


Carl J. Pratt - 2021
    

You Had Me at "Hello, World": Mentoring Sessions with Industry Leaders at Microsoft, Facebook, Google, Amazon, Zynga and more!


Dona Sarkar - 2015
    Instead they shared with me their "career acumen" secrets, things they wished they had learned at school, but instead have had to learn the hard way..through years of experience. In this book, you will hear these leaders' secrets around: -Finding and using your superpowers , the qualities that make you completely unique and memorable - A script for how to negotiate your salary (in a non-aggressive way) and influence your managers and peers from day one - How to do that infamous "networking" thing everyone talks about, especially if you're not a networking event kind of person - How to have professional presence that sets you apart from everyone else - How to hit the ground running in the first 100 days and be the "rockstar" employee everyone talks about and wishes they could hire more of I've had all kinds of adventures during my 10 years of engineering at Microsoft but my absolute favorite thing has been building relationships, speaking to, and mentoring people (both in and out of the tech industry) on how to achieve their career goals while still being themselves. When I interviewed 25 tech leaders for advice on the questions I get over and over, I wanted to share it with more than just my mentees. This book is full of practical, do-today things as well as "scripts" and email templates that we have all actually used. Read the book and let's talk. I love reaching and meeting new people and you can now consider me “in your network” and I hope I can do the same for you. My best always, Dona

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

Overdrive: Bill Gates and the Race to Control Cyberspace


James Wallace - 1997
    James Wallace brings readers up to date on the Gates saga to 1997 and reveals the inside story of the struggle to keep Microsoft on top in the World Wide Web game.

Research Methods in Language Learning


David Nunan - 1992
    This book is intended to help readers understand and critique research in language learning. It presents a balanced and objective view of a range of methods - including formal experiments, introspective methods, interaction and transcript analysis, ethnography, and case studies. The book is highly accessible and does not assume specialist or technical knowledge. This volume will be of interest to students of applied linguistics and educational researchers, in addition to classroom teachers and teachers-in-training. Throughout the book, theoretical issues are drawn from published studies and reports. The book emphasizes the professional and practical value of reading published research.

Using Information Technology


Brian K. Williams - 1990
    This text is user-focused and has been highly updated including topics, pictures and examples. The Williams text contains less theory and more application to engage students who might be more familiar with technology. Continually published and updated for over 15 years, Using Information Technology was the first text to foresee and define the impact of digital convergence--the fusion of computers and communications. It was also the first text to acknowledge the new priorities imposed by the Internet and World Wide Web and bring discussion of them from late in the course to the beginning. Today, it is directed toward the "Always On" generation that is at ease with digital technology--comfortable with iPhones, MySpace, Facebook, Twitter, Wikipedia, and the blogosphere--but not always savvy about its processes, possibilities, and liabilities. This 8th edition continues to address the two most significant challenges that instructors face in teaching this course: -Trying to make the course interesting and challenging, and -Trying to teach to students with a variety of computer backgrounds. In addition, this text correlates with Simnet Online for full integration of resources within the Computing Concepts course.