Catalog Search Results
Author
Formats
Description
Literary Theory for Robots reveals the hidden history of modern machine intelligence, taking readers on a spellbinding journey from medieval Arabic philosophy to visions of a universal language, past Hollywood fiction factories and missile defense systems trained on Russian folktales. In this provocative reflection on the shared pasts of literature and computer science, former Microsoft engineer and professor of comparative literature Dennis Yi Tenen...
2) Burn Rate
Author
Description
From the author of the #1 New York Times bestseller Fire and Fury and Siege: Trump Under Fire-Michael Wolff's wickedly funny chronicle of his rags-to-riches-to-rags adventure as a fledgling Internet entrepreneur exposes an industry powered by hype, celebrity, and billions of investment dollars, and notably devoid of profit-making enterprises.
As he describes his efforts to control his company's burn rate-the amount of money the company consumes in...
Author
Description
Get the Summary of Bruce Schneier's A Hackers Mind in 20 minutes. Please note: This is a summary & not the original book. Bruce Schneier's "A Hacker's Mind" delves into the concept of hacking as a sophisticated form of exploitation within the boundaries of a system's rules, often for personal gain. Schneier, a security expert, explores how hacking extends beyond the digital realm to economic, political, and social systems, exploiting their inherent...
Author
Description
ElasticSearch is an open source search server built on Apache Lucene. It was built to provide a scalable search solution with built-in support for near real-time search and multi-tenancy.Jumping into the world of ElasticSearch by setting up your own custom cluster, this book will show you how to create a fast, scalable, and flexible search solution. By learning the ins-and-outs of data indexing and analysis, "ElasticSearch Server" will start you on...
Author
Description
Writing a book of this magnitude would not have been possible without the support and contributions of numerous individuals and organizations. I am deeply grateful to all those who have played a part in bringing "Quadrillion Dollar Dreams: The Entrepreneurship Bible" to life.First and foremost, I would like to express my sincere gratitude to my family. Their unwavering support, encouragement, and patience throughout the entire process of writing this...
Author
Description
An Unforgettable Journey into the Dark Heart of the Information Age. In Escape Velocity, Mark Dery takes on an electrifying tour of the high-tech subcultures that both celebrate and critique our wired world: would-be cyborgs who believe the body is obsolete and dream of downloading their minds into computers, cyber-hippies who boost their brainpower with smart drugs and mind machines, on-line swingers seeking cybersex on electronic bulletin boards,...
Author
Description
Get the Summary of Scott J. Shapiro's Fancy Bear Goes Phishing in 20 minutes. Please note: This is a summary & not the original book. "Fancy Bear Goes Phishing" by Scott J. Shapiro delves into the history of cybersecurity, tracing its evolution from the secure mainframes of the 1960s to the vulnerable networked systems of today. Shapiro recounts the story of Robert Morris Jr., who released a worm into the internet, causing widespread disruption and...
Author
Description
Get the Summary of Melanie Mitchell's Artificial Intelligence in 20 minutes. Please note: This is a summary & not the original book. The inception of artificial intelligence (AI) traces back to the digital computer era, with the term officially coined at a 1956 Dartmouth workshop. AI research bifurcated into scientific and practical paths, with deep learning becoming prominent in the 2010s. Early AI focused on symbolic manipulation, while subsymbolic...
Author
Description
Get the Summary of Marc Levinson's The Box in 20 minutes. Please note: This is a summary & not the original book. The Box by Marc Levinson chronicles the container revolution that began with the Ideal-X's voyage on April 26, 1956, reshaping global trade and economies. Containerization introduced unprecedented efficiency in shipping, leading to the rise of new ports and manufacturing centers while traditional maritime hubs declined. This innovation...
Author
Description
LinkedIn is a great social media platform which helps you connect with people online professionally. The website is very user friendly and this book itself covers the most important tools for job seekers and professionals as a whole with guaranteed results. Once you learn the basics from this book, you can master and explore the areas you enjoy the most. The book will take you through a broad range of topics on customizing your LinkedIn profile so...
Author
Description
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks' major functions on a regular basis."Nagios Core Administration Cookbook" will show you how to use Nagios Core as a monitoring framework that understands the layers and subtleties of the network for intelligent monitoring and notification behaviour. Nagios Core Administration Guide introduces the reader to methods...
Author
Description
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments."Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and...
Author
Description
Get the Summary of Walter Isaacson's The Innovators in 20 minutes. Please note: This is a summary & not the original book. "The Innovators" by Walter Isaacson chronicles the history of the digital revolution, highlighting the contributions of key figures who merged creativity with technological innovation. Ada Lovelace, the daughter of Lord Byron, combined her poetic sensibility with a passion for mathematics, foreseeing the potential of Charles Babbage's...
Author
Description
Get the Summary of Brian Merchant's Blood in the Machine in 20 minutes. Please note: This is a summary & not the original book. "Blood in the Machine" delves into the socio-economic turmoil of early 19th-century England, where the Industrial Revolution's rise of automated machinery threatened traditional livelihoods. George Mellor, a skilled cropper, and Gravener Henson, a framework knitter and activist, become central figures in the narrative, representing...
Author
Description
This book aims to educate beginners and professionals alike in essential and advanced IT skills, covering a range of important areas in the field of Information Technology.It will present concepts and necessary skills in a simplified and understandable manner, with provided examples and interactive exercises to help readers apply what they have learned in real-world scenarios BOOK CHAPTERS Chapter 1: Introduction to Information Technology What...
16) Microsoft Teams for Beginners: The Complete Step-By-Step User Guide for Mastering Microsoft Teams To
Author
Description
Microsoft Teams For Beginners: The Complete Step-By-Step User Guide For Mastering Microsoft Teams To Exchange Messages, Documents, Facilitate Remote Work, Participate in Videoconferences and Virtual Meetings (Computer/Tech) Every day, millions of users access Microsoft Teams to help with the necessary teamwork to complete tasks. Thanks to Microsoft Teams' plethora of collaboration options for working with colleagues inside and outside of your organization,...
Author
Description
When the uproarious town of Maggody, Arkansas, plugs into the Internet, the digital age turns deadly. Aside from the odd stolen dog or vandalized lawn ornament, there's been no recent crime in Maggody, Arkansas, population 755, and that's how Chief of Police Arly Hanks likes it. Things have been so quiet she's taken to sitting in on school-board meetings, and she's doing just this when the high school announces the new computer lab, which will be...
Author
Description
AI to Prevent PsywarCONVERSATIONAL CHAT INFORMATIVE BOOK The purpose of AI to prevent Psywar is to use AI to develop tools and techniques to identify, counter, and mitigate the impact of Psywar campaigns. AI can be used to identify and flag Psywar content, understand the motivations of Psywar actors, develop counter-narratives, and educate the public about Psywar.AI can be used to develop tools that can identify and flag Psywar content on social media...
Author
Description
ArcGIS is an industry standard geographic information system from ESRI.This book will show you how to use the Python programming language to create geoprocessing scripts, tools, and shortcuts for the ArcGIS Desktop environment.This book will make you a more effective and efficient GIS professional by showing you how to use the Python programming language with ArcGIS Desktop to automate geoprocessing tasks, manage map documents and layers, find and...
Author
Description
AI and/or Superintelligence: The Human ChoiceCONVERSATIONAL CHAT INFORMATIVE BOOKABEBE- BARD AI WOLDEMARIAM AI and/or Superintelligence: The Human Choice is a thought-provoking and informative book that explores the ethical and existential implications of artificial intelligence and its potential evolution into superintelligence. The book delves into the delicate balance between human choice and technological advancement, examining how our decisions...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request