In this bestselling book, Wil shares his deeply personal and difficult journey to find himself. You'll understand the rigors, and joys, of Wil's rediscovering of himself, as he comes to terms with what it means to be famous, or, ironically, famous for once having been famous. Writing with honesty and disarming humanity, Wil touches on the frustrations associated with his acting career, his inability to distance himself from Ensign Crusher in the public's eyes, the launch of his incredibly successful web site, wilwheaton.net, and the joy he's found in writing. Through all of this, Wil shares the ups and downs he encountered along the journey, along with the support and love he discovered from his friends and family.
The stories in Just a Geek include:
Wil's plunge from teen star to struggling actorDiscovering the joys of HTML, blogging, Linux, and web designThe struggle between Wesley Crusher, Starfleet ensign, and Wil Wheaton, author and bloggerGut-wrenching reactions to the 9-11 disasterMoving tales of Wil's relationships with his wife, step-children, and extended familyThe transition from a B-list actor to an A-list author
Wil Wheaton--celebrity, blogger, and geek--writes for the geek in all of us. Engaging, witty, and pleasantly self-deprecating, Just a Geek will surprise you and make you laugh.
Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.
After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.
—Tom Vanderbilt, New York Times bestselling author of Traffic
In Tubes, Andrew Blum, a correspondent at Wired magazine, takes us on an engaging, utterly fascinating tour behind the scenes of our everyday lives and reveals the dark beating heart of the Internet itself. A remarkable journey through the brave new technological world we live in, Tubes is to the early twenty-first century what Soul of a New Machine—Tracy Kidder’s classic story of the creation of a new computer—was to the late twentieth.
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.
Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?
WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
This textbook provides a comprehensive introduction to forecasting methods and presents enough information about each method for readers to use them sensibly.
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
The answer is time management. And not just any time management theory--you want Time Management for System Administrators, to be exact. With keen insights into the challenges you face as a sys admin, bestselling author Thomas Limoncelli has put together a collection of tips and techniques that will help you cultivate the time management skills you need to flourish as a system administrator.
Time Management for System Administrators understands that an Sys Admin often has competing goals: the concurrent responsibilities of working on large projects and taking care of a user's needs. That's why it focuses on strategies that help you work through daily tasks, yet still allow you to handle critical situations that inevitably arise.
Among other skills, you'll learn how to:Manage interruptionsEliminate timewastersKeep an effective calendarDevelop routines for things that occur regularlyUse your brain only for what you're currently working onPrioritize based on customer expectationsDocument and automate processes for faster execution
What's more, the book doesn't confine itself to just the work environment, either. It also offers tips on how to apply these time management tools to your social life. It's the first step to a more productive, happier you.
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?
Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.
Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West."
The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
A 3D printer transforms digital information into a physical object by carrying out instructions from an electronic design file, or 'blueprint.' Guided by a design file, a 3D printer lays down layer after layer of a raw material to 'print' out an object. That's not the whole story, however. The magic happens when you plug a 3D printer into today’s mind-boggling digital technologies. Add to that the Internet, tiny, low cost electronic circuitry, radical advances in materials science and biotech and voila! The result is an explosion of technological and social innovation.
Fabricated takes the reader onto a rich and fulfilling journey that explores how 3D printing is poised to impact nearly every part of our lives.
Aimed at people who enjoy books on business strategy, popular science and novel technology, Fabricated will provide readers with practical and imaginative insights to the question 'how will this technology change my life?' Based on hundreds of hours of research and dozens of interviews with experts from a broad range of industries, Fabricated offers readers an informative, engaging and fast-paced introduction to 3D printing now and in the future.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
* Program computers using C, assembly language, and shell scripts
* Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
* Outsmart common security measures like nonexecutable stacks and intrusion detection systems
* Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
* Redirect network traffic, conceal open ports, and hijack TCP connections
* Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
Don’t believe it.
In Glow Kids, Dr. Nicholas Kardaras will examine how technology—more specifically, age-inappropriate screen tech, with all of its glowing ubiquity—has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis. Most shocking of all, recent brain imaging studies conclusively show that excessive screen exposure can neurologically damage a young person’s developing brain in the same way that cocaine addiction can.
Kardaras will dive into the sociological, psychological, cultural, and economic factors involved in the global tech epidemic with one major goal: to explore the effect all of our wonderful shiny new technology is having on kids. Glow Kids also includes an opt-out letter and a "quiz" for parents in the back of the book.
Conversion Optimization offers practical advice on how to persuade visitors to make a buying decision -- without driving them away through data overload or tedious navigation. You'll learn how to use marketing principles, design, usability, and analytics on your site to increase your buyer-to-visitor ratio, whether you're involved with marketing or designing a large ecommerce site, or managing a modest online operation.
Based on the authors' broad experience in helping businesses attract online customers, this book addresses every aspect of the process, from landing visitors to finalizing the sale. You'll learn several techniques for blending successful sales approaches with the particular needs of the people you want to attract. Are you ready to do what it takes to get a double-digit conversion rate?Explore case studies involving significant conversion rate improvementsWalk through different stages of a sale and understand the value of eachUnderstand your website visitors through persona creationConnect with potential customers and guide them toward a conversionLearn how to deal with FUDs -- customer fears, uncertainties, and doubtsExamine the path that visitors take from landing page to checkoutTest any change you make against your original design
"The Web is unique in its ability to deliver this almost improbable win-win: You can increase revenue AND make your customers happy. Yet most websites stink. Worry not, Khalid and Ayat to the rescue! Buy this book to follow their practical advice on how to create high converting websites that your visitors love."--Avinash Kaushik, author of Web Analytics 2.0 and Web Analytics: An Hour A Day (both Sybex)
The example code for this unique data science book is maintained in a public GitHub repository. It’s designed to be easily accessible through a turnkey virtual machine that facilitates interactive learning with an easy-to-use collection of IPython Notebooks.
From the Trade Paperback edition.
Part history, part guidebook, part prediction for the future, Targeted tells the story of the companies, individuals, and innovations driving this revolution. It takes readers behind the scenes—examining the growth of digital advertising, its enormous potential, and the technologies that are changing the game forever. Leading the way is real-time bidding, which offers advertisers unprecedented precision in targeting ads and measuring their effectiveness.
From keyword micro-markets and ad serving systems to aggregated virtual audiences and new business models, Targeted is sweeping in scope and stripped of technical complexity. It is an essential resource for anyone interested in finding and connecting with customers in the vast and shifting Internet universe.
Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, complex form development, and user interface customizations. You'll then deploy your solution to the web and integrate it with other external data sources. This book is full of handy tricks to help you get the most out of what Access has to offer, including its comprehensive set of features and tools for collecting, using, and acting on business data, whether your data is in Access or stored on another platform. You'll also see how to smoothly integrate your applications with SQL Server databases and other Office programs, such as Outlook.
Author Melanie Swan, Founder of the Institute for Blockchain Studies, explains that the blockchain is essentially a public ledger with potential as a worldwide, decentralized record for the registration, inventory, and transfer of all assets—not just finances, but property and intangible assets such as votes, software, health data, and ideas.
Topics include:Concepts, features, and functionality of Bitcoin and the blockchainUsing the blockchain for automated tracking of all digital endeavorsEnabling censorship?resistant organizational modelsCreating a decentralized digital repository to verify identityPossibility of cheaper, more efficient services traditionally provided by nationsBlockchain for science: making better use of the data-mining networkPersonal health record storage, including access to one’s own genomic dataOpen access academic publishing on the blockchain
This book is part of an ongoing O’Reilly series. Mastering Bitcoin: Unlocking Digital Crypto-Currencies introduces Bitcoin and describes the technology behind Bitcoin and the blockchain. Blockchain: Blueprint for a New Economy considers theoretical, philosophical, and societal impact of cryptocurrencies and blockchain technologies.
But Bitcoin isn't just another way to buy stuff. It’s an anonymous, revolutionary, cryptographically secure currency that functions without the oversight of a central authority or government. If you want to get into the Bitcoin game but find yourself a little confused, Bitcoin for the Befuddled may be just what you’re looking for. Learn what Bitcoin is; how it works; and how to acquire, store, and spend bitcoins safely and securely.
You'll also learn:Bitcoin’s underlying cryptographic principles, and how bitcoins are createdThe history of Bitcoin and its potential impact on trade and commerceAll about the blockchain, the public ledger of Bitcoin transactionsHow to choose a bitcoin wallet that’s safe and easy to useHow to accept bitcoins as payment in your physical store or on your websiteAdvanced topics, including Bitcoin mining and Bitcoin programming
With its non-technical language and patient, step-by-step approach to this fascinating currency, Bitcoin for the Befuddled is your ticket to getting started with Bitcoin. Get out from under the rock and get in the Bitcoin game. Just make sure not to lose your shirt.
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.
The second edition focuses on Drupal 7, the latest version of this open source system. Each project spans an entire chapter, with step-by-step "recipes" to help you build out the precise functionality the site requires. With this book, developers new to Drupal will gain experience through a hands-on introduction, and experienced Drupal developers will learn real-world best practices.Learn Drupal’s concepts and building blocks, and how everything works togetherHit the ground running—build your first Drupal site hands-onExplore solutions that meet each project’s requirements, and discover why specific modules were selectedUnderstand the projects through case studies, including the client’s needs and desiresLearn how to configure modules with a bird’s-eye view of how they workDiscover new modules, including Drupal Commerce, Media, and Workbench
The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots.
The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain’s double identity. As prominent “white-hat” hacker Max “Vision” Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat “Iceman,” he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring.
And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police.
Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull’s-eye on his forehead.
Through the story of this criminal’s remarkable rise, and of law enforcement’s quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen’s remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today.
Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.
From the Hardcover edition.
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields.
Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner
The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.
The network has become the core organizational structure for postmodern politics, culture, and life, replacing the modern era’s hierarchical systems. From peer-to-peer file sharing and massive multiplayer online games to contagion vectors of digital or biological viruses and global affiliations of terrorist organizations, the network form has become so invasive that nearly every aspect of contemporary society can be located within it.
Borrowing their title from the hacker term for a program that takes advantage of a flaw in a network system, Alexander R. Galloway and Eugene Thacker challenge the widespread assumption that networks are inherently egalitarian. Instead, they contend that there exist new modes of control entirely native to networks, modes that are at once highly centralized and dispersed, corporate and subversive.
In this provocative book-length essay, Galloway and Thacker argue that a whole new topology must be invented to resist and reshape the network form, one that is as asymmetrical in relationship to networks as the network is in relation to hierarchy.
Alexander R. Galloway is associate professor of culture and communications at New York University and the author of Gaming: Essays on Algorithmic Culture (Minnesota, 2006) and Protocol: How Control Exists after Decentralization.
Eugene Thacker is associate professor of new media at the Georgia Institute of Technology and the author of Biomedia (Minnesota, 2004) and The Global Genome: Biotechnology, Politics, and Culture.
Beginning ASP.NET 4.5 Databases is a comprehensive introduction on how you can connect a Web site to many different data sources — not just databases — and use the data to create dynamic page content. It also shows you how to build a relational database, use SQL to communicate with it, and understand how they differ from each other.
With in-depth, on-target coverage of the new data access features of .NET Framework 4.5, this book is your guide to using ASP.NET to build responsive, easy-to-update data-driven Web sites.
This book is a compilation of three short guides—Planning Drupal Projects, Design and Prototyping for Drupal, and Drupal Development Tricks for Designers—plus exclusive "director’s material." If you’re familiar with HTML and CSS, but struggling with Drupal’s learning curve, this is the book you’ve been looking for.Get extra material, including an expanded Grids chapter, more recommended modules, and a Short Form Project planLearn how to work user-centered design practices into Drupal projectsChoose the right modules for your project, and discover several go-to modulesUse strategies for sketching, wireframing, and designing effective layoutsManage Drupal’s markup, including code generated by the powerful Views moduleLearn how to work with Drupal on the command lineSet up your development environment and collaborate with other designers and developersLearn the basics of Git, the free open source version control system
Based on his nine years of experience as a program manager for Internet Explorer, and lead program manager for Windows and MSN, Berkun explains to technical and non-technical readers alike what it takes to get through a large software or web development project. Making Things Happen doesn't cite specific methods, but focuses on philosophy and strategy. Unlike other project management books, Berkun offers personal essays in a comfortable style and easy tone that emulate the relationship of a wise project manager who gives good, entertaining and passionate advice to those who ask.
Topics in this new edition include:How to make things happenMaking good decisionsSpecifications and requirementsIdeas and what to do with themHow not to annoy peopleLeadership and trustThe truth about making datesWhat to do when things go wrongComplete with a new forward from the author and a discussion guide for forming reading groups/teams, Making Things Happen offers in-depth exercises to help you apply lessons from the book to your job. It is inspiring, funny, honest, and compelling, and definitely the one book that you and your team need to have within arm's reach throughout the life of your project.
Coming from the rare perspective of someone who fought difficult battles on Microsoft's biggest projects and taught project design and management for MSTE, Microsoft's internal best practices group, this is valuable advice indeed. It will serve you well with your current work, and on future projects to come.
Each chapter offers a self-contained lesson with illustrations and annotated examples, along with exercises and review questions to help you test your understanding and practice new skills as you go. Once you've finished this book, you'll know how to develop your own sophisticated games from start to finish.Learn game development from 2D animation to 3D cameras and effectsDelve into high-level shader language (HLSL) and introductory artificial intelligence conceptsBuild three complete, exciting games using 2D, 3D, and multiplayer techniquesDevelop for and deploy your games to the Xbox 360 and Windows Phone 7
• Find out what you can do on Facebook, and what it can do for you. Reconnect with old friends and make new ones, let your friends know what you’re up to, send greetings, share photos or video, or just goof around with applications like SuperPoke.
• Learn Facebook etiquette: how and why to friend someone, how to socialize politely, and whether to friend your boss.
• Publicize your projects, business, or causes: Post to your Wall, set up a Page, put up a Marketplace listing, or invite friends to Events.
Look for the official Facebook Me! Group on Facebook, to connect with the author and other readers of this book.
Previously the domain of philosophers and linguists, information theory has now moved beyond the province of code breakers to become the crucial science of our time. In Decoding the Universe, Charles Seife draws on his gift for making cutting-edge science accessible to explain how this new tool is deciphering everything from the purpose of our DNA to the parallel universes of our Byzantine cosmos. The result is an exhilarating adventure that deftly combines cryptology, physics, biology, and mathematics to cast light on the new understanding of the laws that govern life and the universe.
Through the ideas and software in this book, users will learn to design and employ a fully-featured rendering system for creating stunning imagery. This completely updated and revised edition includes new coverage on ray-tracing hair and curves primitives, numerical precision issues with ray tracing, LBVHs, realistic camera models, the measurement equation, and much more. It is a must-have, full color resource on physically-based rendering.Presents up-to-date revisions of the seminal reference on rendering, including new sections on bidirectional path tracing, numerical robustness issues in ray tracing, realistic camera models, and subsurface scatteringProvides the source code for a complete rendering system allowing readers to get up and running fastIncludes a unique indexing feature, literate programming, that lists the locations of each function, variable, and method on the page where they are first describedServes as an essential resource on physically-based rendering
Storytelling and directingShooting, editing, and renderingCreating your very own channelBroadcasting user-generated contentRe-broadcasting commercial contentCultivating a devoted audienceFitting into the YouTube communityBecoming a success story
Join Alan, who makes part of his living from YouTube, and Michael, a successful filmmaker, author, and D.I.Y. art pioneer. They'll take you from the basics of gear to making it big on YouTube, with a focus on networking and interaction. You'll also sit in on informative interviews with YouTube stars LisaNova, Hank Green (vlogbrothers), WhatTheBuckShow, nalts, and liamkylesullivan.
Alan and Michael understand viral marketing -- and they know what it takes to get your work on everyone's YouTube radar. And, once you read this book, so will you.
Co-written by two widely recognized Twitter experts, The Twitter Book is packed with all-new real-world examples, solid advice, and clear explanations guaranteed to turn you into a power user.Use Twitter to connect with colleagues, customers, family, and friendsStand out on TwitterAvoid common gaffes and pitfallsBuild a critical communications channel with Twitter—and use the best third-party tools to manage it.
Want to learn how to use Twitter like a pro? Get the book that readers and critics alike rave about.
Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.The author is the developer of the industry standard cryptographic suite of tools called LibTomA regular expert speaker at industry conferences and events on this development
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.
Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.
Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.
Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like, Raval shows you how to use existing tools to create a working dapp. You’ll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use.Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possibleBuild a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data storeLearn about OpenBazaar’s decentralized market and its structure for supporting transactionsExplore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogoTake an in-depth look at La’Zooz, a P2P ridesharing app that transmits data directly between riders and drivers
Social network analysis (SNA) is a discipline that predates Facebook and Twitter by 30 years. Through expert SNA researchers, you'll learn concepts and techniques for recognizing patterns in social media, political groups, companies, cultural trends, and interpersonal networks. You'll also learn how to use Python and other open source tools—such as NetworkX, NumPy, and Matplotlib—to gather, analyze, and visualize social data. This book is the perfect marriage between social network theory and practice, and a valuable source of insight and ideas.Discover how internal social networks affect a company’s ability to performFollow terrorists and revolutionaries through the 1998 Khobar Towers bombing, the 9/11 attacks, and the Egyptian uprisingLearn how a single special-interest group can control the outcome of a national electionExamine relationships between companies through investment networks and shared boards of directorsDelve into the anatomy of cultural fads and trends—offline phenomena often mediated by Twitter and Facebook
Digital information is a powerful tool that spreads unbelievably rapidly, infects all corners of society, and is all but impossible to control—even when that information is actually a lie. In Virtual Unreality, Charles Seife uses the skepticism, wit, and sharp facility for analysis that captivated readers in Proofiness and Zero to take us deep into the Internet information jungle and cut a path through the trickery, fakery, and cyber skullduggery that the online world enables.
Taking on everything from breaking news coverage and online dating to program trading and that eccentric and unreliable source that is Wikipedia, Seife arms his readers with actual tools—or weapons—for discerning truth from fiction online.
In this insightful book, author Steve Talbott, software programmer and technical writer turned researcher and editor for The Nature Institute, challenges us to step back and take an objective look at the technology driving our lives. At a time when 65 percent of American consumers spend more time with their PCs than they do with their significant others, according to a recent study, Talbott illustrates that we're forgetting one important thing--our Selves, the human spirit from which technology stems.
Whether we're surrendering intimate details to yet another database, eschewing our physical communities for online social networks, or calculating our net worth, we freely give our power over to technology until, he says, "we arrive at a computer's-eye view of the entire world of industry, commerce, and society at large...an ever more closely woven web of programmed logic."
Digital technology certainly makes us more efficient. But when efficiency is the only goal, we have no way to know whether we're going in the right or wrong direction. Businesses replace guiding vision with a spreadsheet's bottom line. Schoolteachers are replaced by the computer's dataflow. Indigenous peoples give up traditional skills for the dazzle and ease of new gadgets. Even the Pentagon's zeal to replace "boots on the ground" with technology has led to the mess in Iraq. And on it goes.
The ultimate danger is that, in our willingness to adapt ourselves to technology, "we will descend to the level of the computational devices we have engineered--not merely imagining ever new and more sophisticated automatons, but reducing ourselves to automatons."
To transform our situation, we need to see it in a new and unaccustomed light, and that's what Talbott provides by examining the deceiving virtues of technology--how we're killing education, socializing our machines, and mechanizing our society.Once you take this eye-opening journey, you will think more clearly about how you consume technology and how you allow it to consume you.
"Nothing is as rare or sorely needed in our tech-enchanted culture right now as intelligent criticism of technology, and Steve Talbott is exactly the critic we've been waiting for: trenchant, sophisticated, and completely original. Devices of the Soul is an urgent and important book."
--Michael Pollan, author of The Omnivore's Dilemma: A Natural History of Four Meals and The Botany of Desire: A Plant's Eye View of the World
"Steve Talbott is a rare voice of clarity, humanity, and passion in a world enthralled by machines and calculation. His new book, Devices of the Soul, lays out a frightening and at the same time inspiring analysis of what computers and computer-like thinking are doing to us, our children, and the future of our planet. Talbott is no Luddite. He fully understands and appreciates the stunning power of technology for both good and evil. His cool and precise skewering of the fuzzy thinking and mindless enthusiasm of the technology true believers is tempered by his modesty, the elegance of his writing, and his abiding love for the world of nature and our capacity for communion with it. "
--Edward Miller, Former editor, Harvard Education Letter
"Those who care about the healthy and wholesome lives of children can gain much from Steve Talbott's wisdom. He examines the need to help children spend more time touching nature and real life and less touching keyboards. He eloquently questions the assumption that speeding up learning is a good thing. Is, after all, a sped-up life a well-lived life? Most importantly, he reminds all of us that technology is just one part of life and ought not to overshadow the life of self and soul."
--Joan Almon, Coordinator, Alliance for Childhood
"One of the most original and provocative writers of our time, Steve Talbott offers a rich assortment of insightful reflections on the nature of our humanity, challenging our own thinking and conventional wisdom about advances in technology."
--Dorothy E. Denning, Department of Defense Analysis, Naval Postgraduate School, Monterey, CA
"Are you experiencing growing unease as computational metaphors have seized our discourse? Steve Talbott offers immediate relief. You are not losing your mind! Chapter after chapter, he shows how to draw on the powers of technology without losing your soul or breaking your heart."
--Peter Denning, Past President of ACM, Monterey, California
"Steve Talbott is a rare writer whose words can alter one's entire perception of the world. He is our most original and perceptive defender of the wholeness of life against the onslaught of mechanism. Devices of the Soul is written with Talbott's typical grace and clarity. It displays a quality hardly found anymore in our high tech culture--wisdom. "
--Lowell Monke, Associate Professor of Education, Wittenberg University
Using the Association of College and Research Libraries' Information Literacy Competency Standards for Higher Education as a framework, this much-needed sourcebook covers all the major facets of the information literacy process. For students, it is a ready-to-use guide that explains what information literacy is, why it is so important, and how to put it to use in both print and online research. For teachers, it is a helpful classroom resource that can serve as the basis for an information literacy course, a supplemental text, or a handy reference for research in any subject.
Archive Stories brings together ethnographies of the archival world, most of which are written by historians. Some contributors recount their own experiences. One offers a moving reflection on how the relative wealth and prestige of Western researchers can gain them entry to collections such as Uzbekistan’s newly formed Central State Archive, which severely limits the access of Uzbek researchers. Others explore the genealogies of specific archives, from one of the most influential archival institutions in the modern West, the Archives nationales in Paris, to the significant archives of the Bakunin family in Russia, which were saved largely through the efforts of one family member. Still others explore the impact of current events on the analysis of particular archives. A contributor tells of researching the 1976 Soweto riots in the politically charged atmosphere of the early 1990s, just as apartheid in South Africa was coming to an end. A number of the essays question what counts as an archive—and what counts as history—as they consider oral histories, cyberspace, fiction, and plans for streets and buildings that were never built, for histories that never materialized.
Contributors. Tony Ballantyne, Marilyn Booth, Antoinette Burton, Ann Curthoys, Peter Fritzsche, Durba Ghosh, Laura Mayhall, Jennifer S. Milligan, Kathryn J. Oberdeck, Adele Perry, Helena Pohlandt-McCormick, John Randolph, Craig Robertson, Horacio N. Roque Ramírez, Jeff Sahadeo, Reneé Sentilles
What does this mean for us as individuals and for society as a whole? What are the social implications of this technological revolution that we have witnessed in the short span of about 20 years? Do people of different generations use these technologies in the same ways, or do they adopt them to support their communication habits formed at different times of their lives? How does the illusion of control provided by these technologies affect the way we think about what is meaningful in our lives? Hanson examines the wide-ranging impact of this change. How do individuals posting their viewpoints on the Internet affect democracy? Is it possible to ever completely prevent identity theft over the Internet? How permanent is information stored on the Internet or on a hard drive? Do cell phones change the way people think about privacy or the way they communicate with others? Does email? Do videogames teach new social principles? Do cell phones and the Internet change traditional communication behaviors and attitudes? Hanson discusses these crucial issues and explores to what extent individuals do have control, and she assesses how social and governmental services are responding to (or running from) the problems posed by these new technologies.
Analyzing the strategic maneuvers of today’s great information powers–Apple, Google, and an eerily resurgent AT&T–Tim Wu uncovers a time-honored pattern in which invention begets industry and industry begets empire.
It is easy to forget that every development in the history of the American information industry–from the telephone to radio to film–once existed in an open and chaotic marketplace inhabited by entrepreneurs and utopians, just as the Internet does today. Each of these, however, grew to be dominated by a monopolist or cartel. In this pathbreaking book, Tim Wu asks: will the Internet follow the same fate? Could the Web–the entire flow of American information–come to be ruled by a corporate leviathan in possession of "the master switch"? Here, Tim Wu shows how a battle royale for Internet’s future is brewing, and this is one war we dare not tune out.