Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
17 result(s) for "Computer programmers Fiction."
Sort by:
Our kind of cruelty
\"This is a love story. Mike's love story. Mike Hayes fought his way out of a brutal childhood and into a quiet, if lonely, life before he met Verity Metcalf. V taught him about love, and in return, Mike has dedicated his life to making her happy. He's found the perfect home, the perfect job; he's sculpted himself into the physical ideal V has always wanted. He knows they'll be blissfully happy together. It doesn't matter that she hasn't been returning his e-mails or phone calls. It doesn't matter that she says she's marrying Angus. It's all just part of the secret game they used to play. If Mike watches V closely, he'll see the signs. If he keeps track of her every move, he'll know just when to come to her rescue...\"--Amazon.com.
ROGUE ARTIFICIAL INTELLIGENCE, SCIENCE FICTION, AND THE LAW
Artificial intelligence (AI) has been labeled an existential threat. Proposals to combat this menace include industry pauses on the development of advanced AI, legislated moratoria, and creation of a new federal agency with the power to regulate and license advanced AI.
Mind games
\"A teen programmer at a school for geniuses must join forces with a boy she can't remember to stop a hacker from deleting their memories\"--Publisher marketing.
Cowboys and the Eternal September
The concept of a hacker originated in the 1970s, and began to gradually take shape in the 1980s. It began to be discussed actively in various contexts, particularly in relation with the rise of open-source operating systems such as GNU and Linux in the 1990s until the early 2000s. Subsequently, as the times changed, the qualities that were demanded of reputable programmers changed in a major way. Originally, the programmers' capabilities in terms of writing code were most important, while their sociability was less emphasized. However, as computers became more common among the general public, and their social impact increased, hackers were required to be more socially amenable in various ways. Therefore, a large number of open-source projects introduced codes of conduct.
The friendship code
Looking forward to joining the new coding club at school so that she can develop her app idea, Lucy is disappointed by the lukewarm reception she receives from the club's other members, who work with her to decipher mysterious coding notes.
Stealing the Network: How to Own an Identity
The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Stealing the Network
A fictional continent is emerging as a major new economic, political and military force on the world stage. However, their rapid growth has left little in the way of time and money to sure up their Internet backbone, and it is vulnerable to a potentially catastrophic attack. Who are the bad guys? What do they want?.
The Hawk Eye, Burlington, Iowa, Gamer's Corner column
Presenting the player with an old-school, top-down perspective that looks like an unofficial entry in \"The Legend of Zelda\" series, this is an action RPG that caters specifically to gamers who cut their teeth on sprite-based graphics in the 1980s and 90s. Agent 47, the guards he must evade or kill, and the target he is chasing are all represented on the game board by small rigid playing pieces sitting at points on a grid.
Chicago Tribune Michael Phillips column
The cast features Edward Norton as the fastidious scoutmaster on the hunt for his missing charge; Bruce Willis, the island's one and only police officer, in love with the missing girl's mother (Frances McDormand); Bill Murray, the lawyer husband married to McDormand's lawyer character.
The Boston Globe Business Intelligence Column
\"Me++,\" as [William J. Mitchell] titled his book, refers to the rings of boundaries and connections surrounding individuals in the new wireless age. In the book, subtitled \"The Cyborg Self and the Networked City,\" Mitchell contends that cellphones and other handheld devices have become extensions of the human body. He sees the combination of mobility and wireless linkages transforming everything from the workplace to clothing design to relations between people in far-flung locales. Mitchell, a 58-year-old native of Australia, wears many hats at MIT. In his media arts post, he has oversight for the MIT Media Lab, which pioneered the convergence of technology and culture under Nicholas Negroponte in the 1990s. (Negroponte continues as the lab's chairman, but spends much of his time working overseas.) As dean of the School of Architecture and Planning, Mitchell is overseeing construction of the Stata Center for Computer, Information, and Intelligence Sciences, designed by architect Frank O. Gehry. And in his role as professor, Mitchell is working with about 15 students, along with Gehry and General Motors Corp., on a concept car that will rethink the relationship of automobile and city. \"Consider, if you will, Me++,\" Mitchell writes. \"I consist of a biological core surrounded by extended, constructed systems of boundaries and networks. These boundaries and network structures are topological and functional duals of each other. The boundaries define a space of containers and places (the traditional domain of architecture), while the networks establish a space of links and flows. Walls, fences, and skins divide; paths, pipes, and wires connect.\"