Catalog Search Results
Author
Formats
Description
Literary Theory for Robots reveals the hidden history of modern machine intelligence, taking readers on a spellbinding journey from medieval Arabic philosophy to visions of a universal language, past Hollywood fiction factories and missile defense systems trained on Russian folktales. In this provocative reflection on the shared pasts of literature and computer science, former Microsoft engineer and professor of comparative literature Dennis Yi Tenen...
Author
Description
Arguably the most literary of science fiction shows, Dr Who has adapted its time lords and cast of companions and alien threats to audiences across the globe for more than 50 years.
In Time Lords Remixed unapologetic Whovian and digital artist David P. Reiter reimagines the voices of time lords, especially Peter Capaldi and Jodie Whittaker, through a poetic and image remix that spans 50 episodes and includes associative internet links that build...
Author
Description
Get the Summary of Robert C. Martin's Clean Architecture in 20 minutes. Please note: This is a summary & not the original book. "Clean Architecture" by Robert C. Martin is a comprehensive guide to software design and architecture that emphasizes the importance of crafting adaptable and maintainable systems. Martin argues that while creating functional software may be straightforward, developing fundamentally sound software requires a deeper understanding...
Author
Description
Writing a book of this magnitude would not have been possible without the support and contributions of numerous individuals and organizations. I am deeply grateful to all those who have played a part in bringing "Quadrillion Dollar Dreams: The Entrepreneurship Bible" to life.First and foremost, I would like to express my sincere gratitude to my family. Their unwavering support, encouragement, and patience throughout the entire process of writing this...
Author
Description
ElasticSearch is an open source search server built on Apache Lucene. It was built to provide a scalable search solution with built-in support for near real-time search and multi-tenancy.Jumping into the world of ElasticSearch by setting up your own custom cluster, this book will show you how to create a fast, scalable, and flexible search solution. By learning the ins-and-outs of data indexing and analysis, "ElasticSearch Server" will start you on...
Author
Description
Expand your Future with by Mastering Prompt Engineering for ChatGPT
Dive into the digital age where the lines between human creativity and artificial intelligence blur, bringing forth an unprecedented era of innovation. "Prompt Engineering for ChatGPT, The Ultimate Mastery Guide," is not just a book; it's your gateway to mastering a skill that's shaping the future. But why is this important to you?
• Are you struggling to stay ahead in the...
Author
Description
Get the Summary of Alok Kanojia's How to Raise a Healthy Gamer in 20 minutes. Please note: This is a summary & not the original book. "How to Raise a Healthy Gamer" delves into the psychological and neuroscientific aspects of video game engagement, particularly in children and adolescents. The book explores how games are designed to tap into the brain's reward system, satisfying psychological needs and potentially leading to excessive gaming. It discusses...
8) Burn Rate
Author
Description
From the author of the #1 New York Times bestseller Fire and Fury and Siege: Trump Under Fire-Michael Wolff's wickedly funny chronicle of his rags-to-riches-to-rags adventure as a fledgling Internet entrepreneur exposes an industry powered by hype, celebrity, and billions of investment dollars, and notably devoid of profit-making enterprises.
As he describes his efforts to control his company's burn rate-the amount of money the company consumes in...
Author
Description
Get the Summary of Bruce Schneier's A Hackers Mind in 20 minutes. Please note: This is a summary & not the original book. Bruce Schneier's "A Hacker's Mind" delves into the concept of hacking as a sophisticated form of exploitation within the boundaries of a system's rules, often for personal gain. Schneier, a security expert, explores how hacking extends beyond the digital realm to economic, political, and social systems, exploiting their inherent...
Author
Description
Get the Summary of Brian Christian & Tom Griffiths's Algorithms to Live By in 20 minutes. Please note: This is a summary & not the original book. "Algorithms to Live By" explores the intersection of computer science and human decision-making, illustrating how algorithms can inform and improve everyday choices. The book delves into optimal stopping problems, such as the "turkey drop" and the Secretary Problem, which involve determining the right time...
Author
Description
An Unforgettable Journey into the Dark Heart of the Information Age. In Escape Velocity, Mark Dery takes on an electrifying tour of the high-tech subcultures that both celebrate and critique our wired world: would-be cyborgs who believe the body is obsolete and dream of downloading their minds into computers, cyber-hippies who boost their brainpower with smart drugs and mind machines, on-line swingers seeking cybersex on electronic bulletin boards,...
Author
Description
Get the Summary of Walter Isaacson's The Innovators in 20 minutes. Please note: This is a summary & not the original book. "The Innovators" by Walter Isaacson chronicles the history of the digital revolution, highlighting the contributions of key figures who merged creativity with technological innovation. Ada Lovelace, the daughter of Lord Byron, combined her poetic sensibility with a passion for mathematics, foreseeing the potential of Charles Babbage's...
Author
Description
Get the Summary of Scott J. Shapiro's Fancy Bear Goes Phishing in 20 minutes. Please note: This is a summary & not the original book. "Fancy Bear Goes Phishing" by Scott J. Shapiro delves into the history of cybersecurity, tracing its evolution from the secure mainframes of the 1960s to the vulnerable networked systems of today. Shapiro recounts the story of Robert Morris Jr., who released a worm into the internet, causing widespread disruption and...
Author
Description
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments."Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and...
Author
Description
Get the Summary of Brian Merchant's Blood in the Machine in 20 minutes. Please note: This is a summary & not the original book. "Blood in the Machine" delves into the socio-economic turmoil of early 19th-century England, where the Industrial Revolution's rise of automated machinery threatened traditional livelihoods. George Mellor, a skilled cropper, and Gravener Henson, a framework knitter and activist, become central figures in the narrative, representing...
Author
Description
Recent regulations about cybersecurity put pressure on every Board Director and C-Suite executive to understand the risks and impact of a breach. When your company's CIO or CISO speaks, how much do you understand? If you don't speak the language of cybersecurity, you are not only at a disadvantage, but you could also be legally liable.
This book was written to be a translator, handbook, and dictionary for anyone who isn't an expert in the world...
Author
Description
Get the Summary of Marc Levinson's The Box in 20 minutes. Please note: This is a summary & not the original book. The Box by Marc Levinson chronicles the container revolution that began with the Ideal-X's voyage on April 26, 1956, reshaping global trade and economies. Containerization introduced unprecedented efficiency in shipping, leading to the rise of new ports and manufacturing centers while traditional maritime hubs declined. This innovation...
Author
Description
Get the Summary of Melanie Mitchell's Artificial Intelligence in 20 minutes. Please note: This is a summary & not the original book. The inception of artificial intelligence (AI) traces back to the digital computer era, with the term officially coined at a 1956 Dartmouth workshop. AI research bifurcated into scientific and practical paths, with deep learning becoming prominent in the 2010s. Early AI focused on symbolic manipulation, while subsymbolic...
Author
Description
LinkedIn is a great social media platform which helps you connect with people online professionally. The website is very user friendly and this book itself covers the most important tools for job seekers and professionals as a whole with guaranteed results. Once you learn the basics from this book, you can master and explore the areas you enjoy the most. The book will take you through a broad range of topics on customizing your LinkedIn profile so...
Author
Description
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks' major functions on a regular basis."Nagios Core Administration Cookbook" will show you how to use Nagios Core as a monitoring framework that understands the layers and subtleties of the network for intelligent monitoring and notification behaviour. Nagios Core Administration Guide introduces the reader to methods...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request