A Short History of Nearly Everything is Bill Bryson's quest to understand everything that has happened from the Big Bang to the rise of civilization. He takes subjects that normally bore the pants off most of us, like geology, chemistry, and particle physics, and aims to render them comprehensible to people who have never thought they could be interested in science. In the company of some extraordinary scientists, Bill Bryson reveals the world in a way most of us have never seen it before.
"Not what I expected but brilliant!"
Cognitive behavioral therapy (CBT) is a well-tested collection of practical techniques for managing moods and modifying undesirable behaviors through self-awareness, critical analysis, and goal-oriented change. CBT illuminates the links between thoughts, emotions, behaviors, and physical health and uses those connections to develop concrete plans for self-improvement. In 24 engaging half-hour lectures, you'll build a robust and effective self-improvement toolkit with the expert guidance of Professor Satterfield of the University of California, San Francisco.
Much of what will happen in the next 30 years is inevitable, driven by technological trends that are already in motion. In this fascinating, provocative new book, Kevin Kelly provides an optimistic road map for the future, showing how the coming changes in our lives - from virtual reality in the home to an on-demand economy to artificial intelligence embedded in everything we manufacture - can be understood as the result of a few long-term accelerating forces.
This book predicts the decline of today's professions and describes the people and systems that will replace them. In an Internet society, according to Richard Susskind and Daniel Susskind, we will neither need nor want doctors, teachers, accountants, architects, the clergy, consultants, lawyers, and many others to work as they did in the 20th century.
Artificial intelligence (AI) is overtaking our human ability to absorb and process information. Robots are becoming increasingly dexterous, flexible, and safe to be around (except the military ones). AI is our most powerful technology, and you need to understand it. This new book from best-selling author Calum Chace argues that within a few decades, most humans will not be able to work for money. Self-driving cars will probably be the canary in the coal mine, providing a wake-up call for everyone who isn't yet paying attention.
"Great contribution to the discussion of our possible AI future"
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
"Interesting but long winded in some areas."
Picking up right where he left off, Paul Carter pulls out more tall tales of a mad, bad and dangerous life in the international oil trade. Starting with action and mayhem galore This Is Not A Drill sets an unrelenting pace that just doesn't let up, as Paul almost drowns when the Russian rig he's working on begins to capsize; is reunited with his Dad - another adrenaline junkie; gets married; hangs out with his rig pig buddies in exotic locations; and spends a couple of interesting weeks in Afghanistan.
Leading innovation expert Alec Ross explains what's next for the world, mapping out the advances and stumbling blocks that will emerge in the next 10 years - for businesses, governments, and the global community - and how we can navigate them.
The Dark Net is not a separate realm but one that stretches from popular social media sites to the most secretive corners of the deep web. It is a world that is rarely out of the news but one that is little understood - and almost never explored. In The Dark Net, Jamie Bartlett presents a revelatory portrait of the internet's strangest subcultures: of trolls, drug dealers, hackers and political extremists.
"Fascinating mirror of our 21st century"
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
In this audiobook, machine learning expert Ethem Alpaydin offers a concise overview of the subject for the general listener, describing its evolution, explaining important learning algorithms, and presenting example applications. Alpaydin offers an account of how digital technology advanced from number-crunching mainframes to mobile devices, putting today's machine learning boom in context.
For over two decades ITIL® has informed the way in which IT delivers services to customers while remaining methodically in-synch with the needs of business. A cottage industry has emerged offering formal ITIL® trainings and certifications. Service Management (ITSM) bridges the world of business with the world of technology. In ITSM For Beginners, ClydeBank Media traces the modern evolutions in information technology that precipitated the need and inspiration for ITSM.
A mesmerizing, behind-the-scenes business thriller that chronicles how Sega, a small, scrappy gaming company led by an unlikely visionary and a team of rebels, took on the juggernaut Nintendo and revolutionized the video-game industry. In 1990, Nintendo had a virtual monopoly on the video-game industry. Sega, on the other hand, was just a faltering arcade company with big aspirations and even bigger personalities. But all that would change with the arrival of Tom Kalinske, a former Mattel executive who knew nothing about video games and everything about fighting uphill battles.
"Wow!... just... wow!"
Following his blockbuster biography of Steve Jobs, The Innovators is Walter Isaacson’s revealing story of the people who created the computer and the Internet. It is destined to be the standard history of the digital revolution and an indispensable guide to how innovation really happens. What were the talents that allowed certain inventors and entrepreneurs to turn their visionary ideas into disruptive realities? What led to their creative leaps? Why did some succeed and others fail?
Ten years from today, the center of our digital lives will no longer be the smart phone, but device that looks like ordinary eyeglasses: except those glasses will have settings for virtual and augmented reality. What you really see and what is computer generated will be mixed so tightly together, that we won't really be able to tell what is real and what is illusion.
Science is humanity's greatest achievement. It ranges from the study of the universe itself to the smallest particles of matter contained within it - and everything in between. If you want to better understand our physical world, as most of us do, gaining a basic understanding of science itself is profoundly important - yet many are intimidated by the breathtaking scope of such an endeavor. Now an award-winning science teacher has taken out the intimidation, harnessing that breathtaking scope into a series of 60 exciting, comprehensive, and accessible lectures.
"All you need to know about nature."
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the Science & Technology behind them to unraveled the mystery in social engineering. Kevin Mitnick - one of the most famous social engineers in the world - popularized the term social engineering. He explained that it is much easier to trick someone into revealing a password than to exert the effort of hacking.
James Gleick explains the theories behind the fascinating new science called chaos. Alongside relativity and quantum mechanics, it is being hailed as the 20th century's third revolution.
"I don't know if I'll ever understand it all..."
The U.S. scientific community has long led the world in research on such areas as public health, environmental science, and issues affecting quality of life. Our scientists have produced landmark studies on the dangers of DDT, tobacco smoke, acid rain, and global warming. But at the same time, a small yet potent subset of this community leads the world in vehement denial of these dangers.
Hacking University: Freshman Edition is a beginner's guide to the complex security concepts involved with hacking. Whether you are an aspiring "hacktivist" or a security-minded individual, this book can start you on your career of exploration.
In this issue: "How Bad Will Trump Be for Climate Policy?" by David Victor; "Trump's Impact on Clean-Energy Businesses" by Peter Fairley; "Amazon's Next Big Move: Take Over the Mall" by Nicholas Carr; "Mark Zuckerberg Is Funding a Facebook for Human Cells" by Antonio Regalado; "Web Pioneer Tries to Incubate a Second Digital Revolution" by Tom Simonite; "The Decline in Chinese Cyberattacks: The Story Behind the Numbers" by Mara Hvistendahl; "On Patrol with America's Top Bioterror Cop" by Antonio Regalado; "Companies Bet on Designer Bacteria as New Way to Treat Disease" by Antonio Regalado.
In this issue: "Kevin Hart's Funny Business": The most successful comedian in the world is also the most productive. "Super-agents Patrick Whitesell and Ari Emanuel Are Building the Future of Hollywood": WME-IMG co-CEOs Patrick Whitesell and Ari Emanuel are blending live events and digital to upend the entertainment business with violent speed. "Inside the IRC": How a visionary aid organization is using technology to help refugees. "The Future of Neighborhoods": Five projects that show how we'll live.
Nobody likes banks and, for a lot of people, it's for good reason. You go to the teller window five minutes before closing time and she won't acknowledge you because she just wants to close up and go home. Your Paypal account is tied to the banking system and they may yank your account access simply because you got an unusually large payment for something you sold on eBay.
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
Are you a rookie who wants learn the art of hacking but aren't sure where to start? If you are, then this is the right guide. Most books and articles on and off the web are only meant for people who have an ample amount of knowledge on hacking; they don't address the needs of beginners. Such things will only get you confused. So, listen to this guide before you start your journey to becoming the world's greatest hacker.
Master the Linux operating system and hone the power of its command line today! If you've ever dabbled with Linux or ever wanted how you can start leveraging the command line system even if you have no programming experience, then this book will provide the basis and tools you need to become successful with Linux.
In this book, Eric von Hippel, author of the influential Democratizing Innovation, integrates new theory and research findings into the framework of a "free innovation paradigm." Free innovation, as he defines it, involves innovations developed by consumers who are self-rewarded for their efforts, and who give their designs away "for free." It is an inherently simple grassroots innovation process, unencumbered by compensated transactions and intellectual property rights.
With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed email or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks.
The IT management profession is not for the faint of heart. Anyone who has worked in this sector is familiar with the unique (and borderline impossible) challenge of trying to keep up with technological innovations while operating on a too-small budget and facing constant criticism for problems outside of your control. Truth From the Trenches passes on the hard-won leadership lessons that six-time CIO Mark Settle gained over years of working in IT management.
This is a course, really, for people who are very familiar with social media. It's not for beginners. This is for power users, so let's learn how to rock social media.
One podcasting authority suggests, "Technology isn't important". Another sums up the entire podcast creation process in a four-minute video. A third insists you can podcast without money, gear or experience. None of them take the time to explain what the buttons, dials, and lights all mean - they leave you to figure out the techie stuff on your own.
Data governance programs focus on authority and accountability for the management of data as a valued organizational asset. Non-Invasive Data Governance focuses on formalizing existing accountability for the management of data and improving formal communications, protection, and quality efforts through effective stewarding of data resources.
In this issue: "Can CRISPR Save Ben Dupree?" by Antonio Regalado; "Your Driverless Ride Is Arriving" by Will Knight; "Elon Musk's House of Gigacards" by Peter Burrows; "The One and Only Texas Wind Boom" by Richard Martin; and "Learning to Prosper in a Factory Town" by Nanette Byrnes.
Want to learn the basics of Linux in two weeks? This is the perfect program for you!
In this issue: "Chipotle Eats Itself": Chipotle Mexican Grill was a sizzling business with a red-hot stock until an E. coli outbreak derailed its future. Can a mission-based company make gobs of money and still save the world?; "Mary Barra Is Remaking GM's Culture – And the Company Itself": To keep pace in the race to reinvent transportation, the General Motors CEO is shaking up America's biggest car company; and "Can GoPro Rise Again?": After a dismaying 2015, CEO Nick Woodman is refocusing, betting the company's future on software, new audiences, and a bit of Karma.
Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks and tools of the trade used to entice or frighten people into following their lead. You'll hear stories of cyber criminals who went legit, creating quite the stir in corporations like Google and Microsoft. You'll also be introduced to hackers who have threatened our national security and compromised global systems to reveal their secrets.
Computation theory is seen as a branch of both theoretical computer science and modern mathematics, however, it also contains some concepts from pure mathematics. Computation theory shows how one can effectively solve a problem using a computational model. A number of computational models are described. The algorithm is most common format of computational model.
The Raspberry Pi 3 is a powerful minicomputer that has gained popularity for its versatility with hobbyists, DIYers, students, and digital engineers. This book serves as a beginners guide to the Raspberry Pi 3. Including how to acquire the device, we also explain how to set it up and get going building your own projects. No prior experience with electronics is necessary!
Virtualization can take on many different forms: virtual memory, virtual servers, and virtualized storage. In each of these cases, we've been able to move beyond the underlying physical components that make up the system and through the use of clever virtualization techniques we've been able to get more out of the system. This is what we're going to explore in this book.