Computer Science:
2019:
*nix: "Geek and Hacker Stories: Code, Culture and Storytelling from the Technosphere" by Brian Alleyne
Shinfuseki: "Go with the Flow - How the Great Master of Go Trained His Mind" by Hunhyun Cho, Jungmin You (Trans.)
Wave-Function Collapse: "What We Cannot Know: Explorations at the Edge of Knowledge" by Marcus du Sautoy2018:
Sock Theory vs. String Theory: "When Einstein Walked with Gödel - Excursions to the Edge of Thought" by Jim Holt
Pro- or Anti-Wittgensteinian SF: “Rogue Protocol” by Martha Wells
Star-gazing SecUnits: “Artificial Condition - The MurderBot Diaries 2” by Martha Wells
Non-Distinctive Narrative Voice: "All Systems Red" by Martha Wells
Transferable Skills: "Wired For Coding: How to Stand Out From The Crowd and Land Your First Job as a Developer" by William BusheeStar-gazing SecUnits: “Artificial Condition - The MurderBot Diaries 2” by Martha Wells
Non-Distinctive Narrative Voice: "All Systems Red" by Martha Wells
2017:
Deep Learning Architectures: “Life 3.0 - Being Human in the Age of Artificial Intelligence” by Max Tegmark
Cantorian Sets: "Beyond Infinity - An expedition to the outer limits of the mathematical universe" by Eugenia Cheng
C = B * log2(1+S/N): "An Equation for Every Occasion Fifty-Two Formulas and Why They Matter" by John M. Henshaw
733bi/fo@@h732=|$dGGGHHH&+~52: "Think Like a Hacker - A Sysadmin's Guide to Cybersecurity" by Michael J. Melone
ThisIsMyPasswordForNatWest: "KALI LINUX - How to crack passwords using Hashcat - The Visual Guide" by Taylor Cook
The Emperor Had the Boy Locked Up: "Mastering Kali Linux for Web Penetration Testing” by Michael McPhee
Beyond the Usual Alpha-Beta Search: "Deep Thinking - Where Machine Intelligence Ends and Human Creativity Begins” by Garry Kasparov, Mig Greengard
WannaCry Ransomware
This is How the World Will End: "The Art of Invisibility" by Kevin Mitnick, Robert Vamosi
2016:
Data Centres Infrastructure as Praxis and Abstraction: “Building a Modern Data Center - Principles and Strategies of Design” by Scott D. Lowe, David M. Davis, James Green
People are not Google’s 'Customers' or Even Google’s 'Users, but Its Feudal Livestock: “The Epic Struggle of the Internet of Things” by Bruce Sterling
2015:
No Shortcuts for Security: "Cyberwar, Cyberterror, Cybercrime and Cyberactivism" (2nd Edition) by Julie Mehan
"The Project Management Advisor - 18 Major Project Screw-Ups, and How to Cut Them off at the Pass" by Lonnie Pacelli
Managing the Transition of Critical Business Applications to the Cloud: "Cloud Governance and Management Made Simple" by Lita Fulton
ATE1S7=255S11=35V1X4S0=0 or in the days when modems ruled the earth: “Commodork: Sordid Tales from a BBS Junkie” by Rob O'Hara
Humpty Dumpty: "The Code Book - The Science of Secrecy from Ancient Egypt to Quantum Cryptography" by Simon Singh
Day-job: "IT's Hidden Face - Everything you always wanted to know about Information Technology. A look behind the scenes" by Claude Roeltgen
Geeking out or Vegging out. That Is The Question: "Some Remarks" by Neal Stephenson
2013:
2012:
2011:
2010:
2007:
2000:
2001:
2013:
2012:
2011:
2010:
2007:
2000:
Universal Machine: "The Feeling of What Happens: Body and Emotion in the Making of Consciousness" by António R. Damásio
2001:
Sem comentários:
Enviar um comentário