Teckedin - Technology Books
  • 13 Mar 2024
  • 36 Minutes to read
  • Dark
    Light

Teckedin - Technology Books

  • Dark
    Light

Article Summary


Thank you to our sponsor. All columns are sortable

Title/Link

Description

Category

300+ Free Python Books for All Developers - DataDrivenInvestor

Download links to over 300 books - written by Priyesh Sinha

Apps/DevOps

97 Things Every Information Security Professional Should Know by Christina Morillo

In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through everyday security problems.

Security

Advancing into Analytics: From Excel to Python and R: 1st Edition by George Mount 

With this hands-on guide, intermediate Excel users will gain a solid understanding of analytics and the data stack. By the time you complete this book, you'll be able to conduct exploratory data analysis and hypothesis testing using a programming language.

Data & Analytics

AI and Machine Learning for Coders: A Programmer's Guide to Artificial Intelligence 1st Edition by Laurence Moroney 

If you're looking to make a career move from programmer to AI specialist, this is the ideal place to start. Based on Laurence Moroney's extremely successful AI courses, this introductory book provides a hands-on, code-first approach to help you build confidence while you learn key topics.

Artificial Intelligence

AI & Data Literacy: Empowering Citizens of Data Science by Bill Schmarzo

We'll explore AI's inner workings, user intent, and the critical role of the AI Utility Function. Additionally, we'll briefly touch on statistics and probabilities to build decision models leveraging AI and data for making informed, more accurate, and less risky decisions.

Data & Analytics

AI for the Rest of Us by Phaedra Boinodiris and Beth Rudden

The reader will explore a conceptual model for data and understand what humans are good at and what machines are good at. The book dives into why accountability, fairness, transparency, explainability, kindness, robustness, and data privacy are essential concepts in AI that are not being taught nor insisted upon.

Artificial Intelligence

An Artificial Revolution: On Power, Politics and AI by Ivana Bartolettii

World-leading privacy expert Ivana Bartoletti exposes the reality behind the AI revolution, from the low-paid workers who train algorithms to recognise cancerous polyps, to the rise of data violence and the symbiotic relationship between AI and right-wing populism.

Artificial Intelligence

Applied Ethics in a Digital World by Ingrid Vasiliu-Feltesand Jane Thomason 

Covering topics such as artificial intelligence (AI) ethics, digital equity, and translational ethics, this book is a dynamic resource for policymakers, civil society, CEOs, ethicists, technologists, security advisors, sociologists, cyber behavior specialists, criminologists, data scientists, global governments, students, researchers, professors, academicians, and professionals.

Artificial Intelligence

Analytics Best Practices: A Business-driven Playbook for Creating Value through Data Analytics by Prashanth Southekal , PHD

This book provides ten key analytics best practices that will improve the odds of delivering enterprise data analytics solutions successfully. It is intended for anyone who has a stake and interest in deriving insights from data analytics

Data Analytics

Artificial Intelligence By Example: Acquire advanced AI, machine learning, and deep learning design skills by Denis Rothman

This book will make you an adaptive thinker and help you apply concepts to real-world scenarios. Using some of the most interesting AI examples, right from computer programs such as a simple chess engine to cognitive chatbots, you will learn how to tackle the machine you are competing with.

Artificial Intelligence

Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence by Kate Crawford

Drawing on more than a decade of research, award‑winning scholar Kate Crawford reveals how AI is a technology of extraction: from the minerals drawn from the earth, to the labor pulled from low-wage information workers, to the data taken from every action and expression.

Artificial Intelligence

Automating Humanity by Joe Toscano

Automating Humanity is the shocking and eye-opening new manifesto from international award-winning designer Joe Toscano that unravels and lays bare the power agendas of the world's greatest tech titans in plain language, and delivers a fair warning to policymakers, civilians, and industry professionals alike: we need a strategy for the future, and we need it now.

Privacy & Security

Big Data MBA: Driving Business Strategies with Data Science by Bill Schmarzo

Big Data MBA brings insight and expertise to leveraging big data in business so you can harness the power of analytics and gain a true business advantage

Data & Analytics

Breached!: Why Data Security Law Fails and How to Improve it by Daniel J. Solove and Woodrow Hartzog

Despite the passage of many data security laws, data breaches
are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world's leading experts on privacy and data security, argue that the law fails because, ironically, it focuses too much on the breach itself.

Data Privacy

Building Industrial Digital Twins: Design, develop, and deploy digital twin solutions for real-world industries using Azure Digital Twins by Shyam Varan Nath, Pieter van Schalkwyk

"Shyam and Pieter are both recognized professionals in the industrial internet, IoT, and Digital Twins community. They converted the OT/IT task group to the Digital Twins Interoperability task group at the Industry IoT Consortium (formerly known as the Industrial Internet Consortium).

Digital Twins

CISSP (ISC)² Certification Practice Exams and Tests: Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version by Ted Jordan 

The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security.

Security

Confessions of a Successful CIO: How the Best CIOs Tackle Their Toughest Business Challenges by Dan Roberts, Brian Watson

These acclaimed leaders―each profiled in their own chapter―explain the toughest business decision they had to make, and how the outcome influenced and impacted their leadership style. These in-depth anecdotes take the reader inside some of the most challenging business climates imaginable and chronicle how these elite CIOs made the decisions that mattered.

Leadership

Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career by Dr Jessica Barker 

Exploring everything from the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm.

Security

Connected Planning: A Playbook for Agile Decision Making by Ron Dimon

The book is intended for business owners, managers and executives who want to improve their ability to execute their strategy sustainably.

Management Strategy

Containing Big Tech by Tom Kemp

This richly detailed book exposes the consequences of Big Tech’s digital surveillance, exploitative use of AI, and monopolistic and anticompetitive practices.

Tech4Good

Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program by John Jackson

Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program

Security

Create Once, Distribute Forever: How Great Creators Spread Their Ideas and How You Can Too by Ross Simmonds

You'll learn the ins and outs of distribution, how to overcome roadblocks in the process, why remixing and republishing content is important, and how to uncover the most profitable distribution channels for your business.

Digital Marketing

Crisis of Control: How Artificial SuperIntelligences May Destroy or Save the Human Race by Peter J. Scott

Peter Scott lays out the stark choices and consequences facing us in clear, provocative, and sometimes humorous language. This book is for those with the courage to face unpleasant facts head-on: the stakes could not be higher.

Artificial Intelligence

Cult of the Dead Cown by Joseph Menn

He hopes that by describing the maturity journey of the cDc, from internet pranksters to seasoned and respected “graybeards,” that millennials – born between 1981 and 1996 – who are now in charge of “Big Tech” might use that journey as a blueprint to guide them in the future.

Security

Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe by Shira Rubinoff

Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current cybersecurity issues in the military, business, and government.

Cybersecurity

Cybersecurity and Third-Party Risk: Third Party Threat Hunting by Gregory Rasner

You’ll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation.

Privacy & Security

Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Kindle Edition by Dr. Gerald Auger, Jaclyn Scott, Jonathan Helmus, Kim Nguyen

The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you’ll focus on how to choose the right career field best suited to you from options such as security operations, penetration testing, and risk analysis.

Security Careers

Cybersecurity Leadership: Powering the Modern Organization by Dr. Mansur Hasib

Managing cybersecurity requires a multi-disciplinary holistic business approach. Many of the current cybersecurity approaches in organizations and most books are based on an outdated 1991 model of cybersecurity - focused solely on technology solutions.

Privacy & Security

Cybersecurity Sales by Neil Saltman, Anthony Johnson

Cybersecurity should be a collaborative effort between vendors and security teams because what’s at stake truly matters

Cybersecurity

Damage Control: Cyber Insurance and Compliance by Joseph E. Brunsman MSL, Daniel W. Hudson CPCU, Kenneth J. Reiners CISSP

Damage Control is an approachable, non-technical, collection of knowledge and experience from a Master’s in Cybersecurity Law (MSL), a Chartered Property Casualty Underwriter (CPCU), and a Certified Information Systems Security Professional (CISSP)

Privacy & Security

Data For All by John K. Thompson

For years, companies have had free rein to use every click, purchase, and “like” you make, to earn money. Now, across the globe, new laws have been written, passed, and are coming into force, giving individuals the right to access, delete, and monetise their own data. This book provides a vision of how you can use these laws, regulations, and services to directly benefit from your data in new and lucrative ways.

Data Privacy

Data for Business Performance: The Goal-Question-Metric (GQM) Model to Transform Business Data into an Enterprise Asset by Prashanth Southekal, PHD

Today, digitization is dramatically changing the business landscape, and many progressive organizations have started to treat data as a valuable business asset. While many enterprises are investing in improved data management, only a few have leveraged data to truly impact business performance

Data Analytics

Data Privacy - a runbook for engineeers by Nishant Bhajaria 

Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits.

Data Privacy

Data Reimagined: Building Trust One Byte at a Time by Jodi Daniels, Justin Daniels 

Data Reimagined will help you fast-track your approach, create trust in your data collection, and safeguard this trust with proper data use and sharing practices.

Data Management

Deep Learning with Python, Second Edition by François Chollet

Learn directly from the creator of Keras and master practical Python deep learning techniques that are easy to apply in the real world.

DevOps

Democratizing Artificial Intelligence to Benefit Everyone: Shaping a Better Future in the Smart Technology Era by Jacques Ludik

Not only is the book aimed to help with the drive towards democratizing AI and its applications to maximize the beneficial outcomes for humanity, but Dr Ludik is specifically arguing for a more decentralized beneficial human-centric future where AI and its benefits can be democratized to as many people as possible.

Artificial Intelligence

Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level by Gary Hayslip, Christophe Foulon, Renee Small

Whether you are just starting and are looking for an entry-level position or want to translate many years of experience to the right level, this book will help.

Security Careers

DevOps Overture: What you Need to Know When Starting a DevOps Journey by Shawn D. Doyle

It begins with an overview of what software development methodologies came before DevOps and of the problems associated with those systems. It then explains what DevOps is and how it works to address these problems

DevOps

Digital Darwinism: Surviving the New Age of Business Disruption by Tom Goodwin

Learn how to become truly customer-centric, drive digital transformation through a culture of real innovation and challenge assumptions of how things have been done before. The survival of your business depends on it.

Digital Transformation

Driving Digital by Isaac Sacolick

In Driving Digital, author Isaac Sacolick shares the lessons he's learned over the years as he has successfully spearheaded multiple transformations and helped shape digital-business best practices.

Digital Transformation

Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem by Chris Hughes, Nikki Robinson

This book brings a fresh look at a core component of Cybersecurity, laying our Modern Vulnerability Management practices, processes and tools to enable organizations to mitigate risk and do so efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust.

Security

Ethics in Artificial Intelligence: Bias, Fairness and Beyond edited by Animesh Mukherjee, Juhi Kulshrestha, Abhijnan Chakraborty, Srijan Kumar

Presents collection of chapters in the newly developing area of ethics in artificial intelligence. Discusses both theoretical and practical aspects of integrating ethics into artificial intelligence. Serves as a reference for researchers and practitioners in academia and industry

Artificial Intelligence

Everybody Wants to Rule the World - Surviving And Thriving In A World Of Digital Giants by R. "Ray" Wang

Ultimately, you will understand how the business world is changing in the face of extreme competition and, most importantly, you will learn how to adapt now to stay relevant and in demand.

Digital Transformation

Expert Python Programming: Master Python by learning the best coding practices and advanced programming concepts by Michał Jaworski, Tarek Ziadé 

Attain a deep understanding of building, maintaining, packaging, and shipping robust Python applications

Apps/DevOps

Exploring Smart Cities Activity Book for Kids by Dr Jonathan Reichental, Brett Hoffstadt

Learning Adventures Through Coloring, Games, Puzzles, Projects, and More! (STEAM-Powered Kids)

Smart Cities

Extended Reality in Practice by Bernard Marr

You will discover how businesses and organisations are implementing the technology, with case examples, including some of the world’s biggest brands, to showcase how they are starting to use XR in practice.

VR

Fail Fast, Learn Faster by Randy Bean

Visionary and Author Releases New Book Explaining Why, Now More Than Ever, Industry Leaders Must Adapt to Compete in an Era of Disruption, Big Data, and AI

Leadership

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Roger A. Grimes

Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.

Security

Firewalls Don't Stop Dragons by Carey Parker

A Step-by-Step Guide to Computer Security and Privacy for Non-Techies

Privacy & Security

From Data To Profit: How Businesses Leverage Data to Grow Their Top and Bottom Lines 1st Edition by Vin Vashishta

The author explores fascinating work being undertaken by firms in the real world, as well as high-value use cases and innovative projects and products made possible by realigning organizational frameworks using the capabilities of new technologies.

Data & Analytics

Hacking: The Art of Exploitation by Jon Erickson

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

Security

Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems by Aurélien Géron

Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data. This practical book shows you how

Machine Learning

Harness Your Speaking Anxiety: And Connect Emotionally With Your Audience by Nathan Gold

When it’s your turn to speak, do you experience: ✓ Heart racing ✓ Tunnel vision ✓ Shoulder tension ✓ Butterflies in your gut ✓ Shortness of breath ✓ Cold clammy hands ✓ A blank mind ✓ Dry mouth ✓ Nauseousness Yes? Good! You read that right. Good! Anyone of these symptoms means you are human and someone who cares about their audience when you speak

Leadership

Human Hacking: Win Friends, Influence People, and Leave Them Better Off For Having Met You by Christopher Hadnagy

Christopher Hadnagy is the founder and CEO of Social-Engineer, LLC. In his sixteen years in the industry, he has written the world’s first social engineering–framework, created the first social engineering–based podcast and newsletter, and written four books on the topic.

Social Engineering

Infonomics: How to Monetize, Manage, and Measure Information as an Asset for Competitive Advantage by Douglas B. Laney

One of CIO Magazine's top five "must read" books of the year, Infonomics provides the foundation and methods for quantifying information asset value and tactics for using information as your competitive edge to drive growth.

Data Management

Information Security Management Principles by by Andy Taylor, David Alexander, Amanda Finch, David Sutton

In today’s technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts.

Security

INVENTING WORLD 3.0: Evolutionary Ethics for Artificial Intelligence by Matthew James Bailey

In this future, artificial intelligence has become evolutionary, operating at lightning speed within every aspect of society. It understands and honours human values and ethics

Artificial Intelligence

IQ EQ DQ: New Intelligence in the AI Age by Yuhyun Park

This book is about Park's social impact journey to develop DQ (Digital Intelligence) as the global standard for digital literacy, digital skills, and digital readiness with the belief that 'technology is only meaningful when it enhances humanness.

Artificial Intelligence

Machine Readable Me - Zara Rahman

Machine Readable Me considers how and why data that is gathered about us is increasingly limiting what we can and can’t do in our lives and, crucially, what the alternatives are.

Data Privacy

Managing Your Business Risk in the Cybersecurity Minefield: Critical Strategies from 21 Cybersecurity Experts by Chris Wiser, Amir Sachs, Brian Artigas, Brian Galli & 18 more

Is co-written by a group of 21 high-level IT & Cybersecurity experts who have come together to teach business owners what you need to know about protecting your business from cybersecurity threats.  

Security

Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth by Theresa Payton

Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes.

Privacy & Security

Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks by Alexey Kleymenov, Amr Thabet

You'll learn how to examine malware code and determine the damage it can possibly cause to systems, along with ensuring that the right prevention or remediation steps are followed. As you cover all aspects of malware analysis for Windows, Linux, macOS, and mobile platforms in detail, you'll also get to grips with obfuscation, anti-debugging, and other advanced anti-reverse-engineering techniques

Security

MINDFUL AI: Reflections on Artificial Intelligence by Murat Durmus

Mindful AI refers to designing and building artificial intelligence (AI) systems with awareness and consideration of their ethical, moral, and societal implications. Mindful AI involves taking a holistic approach to AI that incorporates considerations of fairness, transparency, accountability, and respect for human rights.

Artificial Intelligence

Mobilizing the C-Suite: Waging War Against Cyberattacks by Frank Riccardi

Mobilizing the C-Suite: Waging War Against Cyberattacks is a call to arms for c-suite leaders to implement the tried-and-true cybersecurity countermeasures proven to thwart cyberattacks. In addition, this book is a handy, entertaining guide explaining fundamental cybersecurity principles to non-geek c-suite leaders.

Security

Move Over Brokers Here Comes the Blockchain by Keír Finlow-Bates

Join Keir on a fascinating journey as he explores everything from how the technology behind blockchain works, through to what it means to us as a society, and assesses whether it will change the way we view the world.

Blockchain

Natural Language Processing with Transformers by Lewis Tunstall, Leandro von Werra, Thomas Wolf

If you're a data scientist or machine learning engineer, this practical book shows you how to train and scale these large models using HuggingFace Transformers, a Python-based deep learning library.

NLP

Navigating the Cybersecurity Career Path by Helen E. Patton

In Navigating the Cybersecurity Career Path, decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security team

Tech Careers

Network Security: Private Communication in a Public World by Charlie Kaufman, Radia Perlman, Mike Speciner

In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards

Security

No Safe Harbor by Mark Sangster

The Inside Truth About Cybercrime, and How to Protect Your Business

Privacy & Security

Online Innovation by Gijs van Wulfen, Maria Vittoria Colucci, Andrew Constable, Florian Hameister, Rody Vonk

Finally, do not be misled by the title, its relevance goes far beyond digital transformation: it’s a fundamental toolkit to fully exploit all dimensions of innovation, and prosper in the ‘Phygital’ economy.

Innovation

Open Source Law, Policy and Practice by Amanda Brock

The work delivers an in-depth examination of the community, legal, and commercial structures relating to the usage and exploitation of Open Source. This enables readers to understand the legal environment within which Open Source operates and what is required for its appropriate governance and curation in enterprise and the public sector.

Open Source

Our Next Reality: How the AI-powered Metaverse Will Reshape the World by Alvin Graylin, Dr. Louis Rosenberg

Powered by immersive eyewear and driven by interactive AI agents, this new age of computing has the potential to make our world a magical place where the boundaries between the real and the virtual, the human and the artificial, rapidly fade away. If managed well, this could unleash a new age of abundance. If managed poorly, this technological revolution could easily go astray, deeply compromising our privacy, autonomy, agency, and even our humanity.

AI/Metaverse

Oxford Handbook of Digital Ethics by Prof Carissa Véliz

Offers an authoritative guide to research in the area, surveying what's been done and opening up new avenues of inquiry

Digital Ethics

Partners Are the Customer Experience by Nancy Ridge, Norma Watenpaugh

The business world has become focused on customer experience, almost to the point of obsession. Now, for the first time, the key link has been made between partner experience (PX) and customer experience (CX)

Vendor Management

Practical Data Privacy: Enhancing Privacy and Security in Data by Katharine Jarmul 

This essential guide will give you a fundamental understanding of modern privacy building blocks, like differential privacy, federated learning, and encrypted computation. Based on hard-won lessons, this book provides solid advice and best practices for integrating breakthrough privacy-enhancing technologies into production systems.

Privacy & Security

Privacy and AI - Protecting Individuals' Rights in the Age of AI by Federico Marengo

In this book, which is based on my Ph.D. thesis defended earlier this year, I try to find an adequate balance between the understanding of the privacy provisions, the technical challenges of #AI systems and what privacy professionals can do to reduce the risks posed by AI systems when they process personal data.

Privacy & AI

Privacy Engineering by Nishant Bhajaria

Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits.

Privacy & Security

Privacy Engineering: A Dataflow and Ontological Approach by Ian Oliver

This book presents an approach based upon data flow modelling, coupled with standardised terminological frameworks, classifications and ontologies to properly annotate and describe the flow of information into, out of and across these systems.

Privacy & Security

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family by Theresa Payton and Ted Claypoole

We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet.

Data Privacy

Privacy is Power: Why and How You Should Take Back Control of Your Data by Carissa Véliz

Carissa is an Associate Professor for Ethics in AI at University of Oxford. The book  paints a comprehensive and compelling picture of where we are at with copious amounts of data being generated and collected and analyzed with AI systems and what we can do to circumvent some of it.

Privacy & Security

Privacy’s Blueprint: The Battle to Control the Design of New Technologies by Woodrow Hartzog

In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products.

Data Privacy

Probability and Statistics for Data Science: Math + R + Data by Norman Matloff 

* Leads the student to think critically about the "how" and "why" of statistics, and to "see the big picture." * Not "theorem/proof"-oriented, but concepts and models are stated in a mathematically precise manner. *Prerequisites are calculus, some matrix algebra, and some experience in programming.

Data & Analytics

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business by George Finney

In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director.

Security

Python for Data Analysis, 3E by Wes McKinney

Python for Data Analysis is a book that focuses on processing, cleaning and visualizing data with Python. It is also a practical introduction to scientific computing, tailored for data-intensive applications.

Data & Analytics

Python Machine Learning: Unlock deeper insights into Machine Leaning with this vital guide to cutting-edge predictive analytics by Sebastian Raschka

If you want to find out how to use Python to start answering critical questions of your data, pick up Python Machine Learning – whether you want to get started from scratch or want to extend your data science knowledge, this is an essential and unmissable resource.

Data & Analytics

Rebooting AI: Building Artificial Intelligence We Can Trust by Gary Marcus, Ernest Davis

Professors Gary Marcus and Ernest Davis have spent their careers at the forefront of AI research and have witnessed some of the greatest milestones in the field, but they argue that a computer beating a human in Jeopardy! does not signal that we are on the doorstep of fully autonomous cars or superintelligent machines.

Artificial Intelligence

Responsible AI in the Enterprise: Practical AI risk management for explainable, auditable, and safe models with hyperscalers and Azure OpenAI by Adnan Masood, Heather Dawe

Responsible AI in the Enterprise is a comprehensive guide to implementing ethical, transparent, and compliant AI systems in an organization. With a focus on understanding key concepts of machine learning models, this book equips you with techniques and algorithms to tackle complex issues such as bias, fairness, and model governance.

Artificial Intelligence

Small Teaching Online: Applying Learning Science in Online Classes by Flower Darby, James M. Lang

The concept of small teaching is simple: small and strategic changes have enormous power to improve student learning. Instructors face unique and specific challenges when teaching an online course. This book offers small teaching strategies that will positively impact the online classroom.

E-Learning

Smart Cities for Dummies by Dr. Jonathan Reichental

At its core, a smart city is a collection of technological responses to the growing demands, challenges, and complexities of improving the quality of life for billions of people now living in urban centers across the world.

Smart Cities

Social Engineering: The Science of Human Hacking by Christopher Hadnagy

Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past

Privacy & Security

Software Wasteland: How the Application-Centric Mindset is Hobbling our Enterprises by Dave McComb

This is the book your Systems Integrator and your Application Software vendor don't want you to read. Enterprise IT (Information Technology) is a $3.8 trillion per year industry worldwide. Most of it is waste.

Application Development

Solar Powered Auto-irrigation system using PLC Programming by Faazla Iqbal

Join us on a journey through the innovative world of solar-powered agriculture, where smart technology takes center stage. Learn how automatic irrigation systems, equipped with advanced sensors, detect soil conditions and deliver precise care to crops, even in unfavorable weather conditions. By integrating renewable energy sources such as solar power, these systems become a lifeline for regions plagued by unreliable electricity supplies.

Sustainability

Stone Age Code: From Monkey Business to AI by Shane Neeley

Stone Age Code illustrates the evolution of improbable data scientists. Shane Neeley, the author of this exceptional book, shows the easiest and funniest approach to learning to code.

AI & DevOps

The Active Defender: Immersion in the Offensive Security Mindset by Dr. Catherine J. Ullman

In the book, you’ll learn to understand and embrace the knowledge you can gain from the offensive security community. You’ll become familiar with the hacker mindset, which allows you to gain emergent insight into how attackers operate and better grasp the nature of the risks and threats in your environment.

Security

The Age of Living Machines: How Biology Will Build the Next Technology Revolution by Susan Hockfield

The Age of Living Machines describes some of the most exciting new developments and the scientists and engineers who helped create them. Virus-built batteries. Protein-based water filters. Cancer-detecting nanoparticles. Mind-reading bionic limbs. Computer-engineered crops.

Emerging Tech

The AI Dilemma: A Leadership Guide to Assess Enterprise AI Maturity & Explore AI's Impact in Your Industry by Dr. Cindy Gordon

Understand the Impact of AI in Industries and Assess Your Organizational AI Readiness

Artificial Intelligence

The AI Playbook: Mastering the Rare Art of Machine Learning Deployment (Management on the Cutting Edge) by Eric Siegel

The greatest tool is the hardest to use. Machine learning is the world's most important general-purpose technology—but it's notoriously difficult to launch. Outside Big Tech and a handful of other leading companies, machine learning initiatives routinely fail to deploy, never realizing value. What's missing?

Machine Learning

The Algorithm: How AI Decides Who Gets Hired, Monitored, Promoted, and Fired and Why We Need to Fight Back by Hilke Schellmann

Based on exclusive information from whistleblowers, internal documents, and real world test results, Emmy‑award winning Wall Street Journal contributor Hilke Schellmann delivers a shocking and illuminating expose on the next civil rights issue of our time: how AI has already taken over the workplace and shapes our future.

Artificial Intelligence

The Alignment Problem by Brian Christian

Today’s “machine-learning” systems, trained by data, are so effective that we’ve invited them to see and hear for us—and to make decisions on our behalf. But alarm bells are ringing. Recent years have seen an eruption of concern as the field of machine learning advances. When the systems we attempt to teach will not, in the end, do what we want or what we expect, ethical and potentially existential risks emerge. Researchers call this the alignment problem.

Machine Learning

The Art of Attack by Maxie Reynolds

The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage

Security

The CIO Paradox: Battling the Contradictions of IT Leadership by Martha Heller

The successful management of information has become so critical to a company's goals, that in many ways, now is the age of the CIO. Yet IT executives are besieged by a host of contradictions: bad technology can bring a company to its knees, but corporate boards rarely employ CIOs; CIOs must keep costs down at the very same time that they drive innovation

Leadership

The Coming Wave: Technology, Power, and the Twenty-first Century's Greatest Dilemma by Mustafa Suleyman, Michael Bhaskar

An urgent warning of the unprecedented risks that AI and other fast-developing technologies pose to global order, and how we might contain them while we have the chance—from a co-founder of the pioneering artificial intelligence company DeepMind.

Artificial Intelligence

The Data-Centric Revolution: Restoring Sanity to Enterprise Information Systems by Dave McComb

This book is the first part of a trilogy to follow "Software Wasteland". In "Software Wasteland", we detailed the current poor state of application software development.

Information Systems

The Data Path Less Traveled by Dr. Zacharias Voulgaris

In this book, we explore heuristics from a practical perspective. We
illustrate how heuristics can help you solve challenging problems through
simple examples and real-life situations. Apply Jaccard Similarity and a
variant, F1 score, Entropy, Ectropy, Area Under Curve, Particle Swarm
Optimization, and Genetic Algorithms (along with GA variants).

Data & Analytics

The Economics of Data, Analytics, and Digital Transformation: The theorems, laws, and empowerments to guide your organization's digital transformation by Bill Schmarzo

This book frames the big data problem from a business perspective. It focuses on how important economic concepts can help organizations exploit the new economic assets of data and analytics to fuel economic growth – assets that actually appreciate, not depreciate, in value the more that they are used.

Data Analytics

The Essential Cybersecurity Exercise Playbook by Lester Chng

If you take cyber readiness seriously,run your exercises and establish your program today.

Security

The Ethics of Privacy and Surveillance by Carissa Véliz

The second part of the book is about what privacy is (and what it isn't): its relationship with the public/private divide, its definition, and its epistemology (how much does someone need to know about me, and with what degree of confidence, for me to lose privacy to them?).

Privacy

The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age by Danielle Keats Citron

As a MacArthur fellow and distinguished professor of law at the University of Virginia, acclaimed civil rights advocate Danielle Citron has spent decades working with lawmakers and stakeholders across the globe to protect what she calls intimate privacy―encompassing our bodies, health, gender, and relationships.

Privacy

The Founder's Guide to Presenting by Claudio Sennhauser

Gain the mindset, knowledge, and techniques to persuade with ease and motivate others to take action. Learn the importance emotions play in any presentation and how to deliver your message to resonate and make it highly memorable. Master a delivery style that is entertaining and keeps your audience's attention focused on your message

Leadership

The Future Is Faster Than You Think by Peter Diamandis & Steven Kotler

In this gripping and insightful roadmap to our near future, Diamandis and Kotler investigate how wave after wave of exponentially accelerating technologies will impact both our daily lives and society as a whole.

Tech Trends

The Future of Workplace Fear: How Human Reflex Stands in the Way of Digital Transformation by Steve Prentice

Workplace fear comes in many forms, including the fear of change, the fear of looking stupid, and the fear of working relationships, and in all cases these fears have deep roots that extend far below having to learn a new technology

Automation & Productivity

The Future Starts Now: Expert Insights into the Future of Business, Technology and Society by Theo Priestley, Bronwyn Williams

In light of this uncertainty, The Future Starts Now looks toward the various innovations and technologies that may shape our future. Authors Theo Priestley and Bronwyn Williams have brought together the world's leading futurists to articulate and clarify the current trajectories in technology, economics, politics and business.

Emerging Tech

The Internet Con: How to Seize the Means of Computation by Cory Doctorow

We can - we must - dismantle the tech platforms. In The Internet Con, Cory Doctorow explains how to seize the means of computation, by forcing Silicon Valley to do the thing it fears most: interoperate. Interoperability will tear down the walls between technologies, allowing users leave platforms, remix their media, and reconfigure their devices without corporate permission.

Tech for Good

The Metaweb: The Next Level of the Internet by Bridgit DAO

Those who give it careful consideration will never see the Web the same way again.
This book proclaims into existence decentralized public space above the webpage that enables the shift from personal to collective computing.

Internet

The Pentester BluePrint: Starting a Career as an Ethical Hacker by Phillip L. Wylie, Kim Crawley

Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.

Security

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value by Michelle Finnerman Dennedy, Jonathan Fox, Thomas Finnerman

The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems.

Privacy & Security

The Rise of Skeleton Marketing: How AI is Revolutionizing the Marketing Industry by Jeff Locke

From the death of traditional marketing roles to the birth of AI-powered marketing and the future of marketing departments, this ebook offers insights and strategies for professionals looking to adapt to the changing landscape.

AI/Marketing Tech

The SINET Risk Executive Handbook

A CISO’s Guide to a Robust Employment Agreement, Employment Risks, and Technology Risk Governance

Security

The Singularity of Hope: Humanity's Role in an AI-Dominated Future by Sam Sammane

In The Singularity of Hope, author Sam Sammane strikes this crucial middle ground. Instead of getting caught up in fanatical claims or hyperfocusing on visions of AI-induced doom, Sam turns the focus back to us, the people behind the machines. He offers a hopeful vision of a future where AI empowers, invigorates and emboldens humanity.

AI/Humanity

The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Christian Espinosa

With his seven-step methodology and stories from the field, Christian helps you develop your team’s technical minds so they become better humans and strong leaders who excel in every role.

Security

The Sound of the Future: The Coming Age of Voice Technology by Tobias Dengel

Voice is the next technology - remarkably similar in potential impact to the internet and mobile computing - poised to change the way the world works. Tobias Dengel is in the vanguard of this breakthrough, understanding the deep, wide-ranging implications voice will have for every industry.

Voice Technology

The Ultimate Job Search Companion: Strategies for a Changing Market by Angie Callen

 As a multi-award-winning coach, Angie has been recognized globally for her commitment to her clients, an ethos she has weaved deeply into Career Bender’s culture and approach to career development coaching.

Tech Jobs

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard, Marcus Pinto

Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws..

Security

The Wolf in Cio's Clothing by Tina Nunno

Drawing on her experience with hundreds of CIOs, Nunno charts a viable way to master the Machiavellian principles of power, manipulation, love, and war. Through compelling case studies, her approach demonstrates how CIOs and IT leaders can adjust their leadership styles in extreme situations for their own success and that of their teams.

Leadership

The Worlds I See: Curiosity, Exploration, and Discovery at the Dawn of AI by Fei-Fei Li

The Worlds I See is a story of science in the first person, documenting one of the century’s defining moments from the inside. It provides a riveting story of a scientist at work and a thrillingly clear explanation of what artificial intelligence actually is―and how it came to be. Emotionally raw and intellectually uncompromising, this book is a testament not only to the passion required for even the most technical scholarship but also to the curiosity forever at its heart.

Artificial Intelligence

Titaniam - Back to Basics

The primary theme of this book is that adhering to basic security building blocks creates a strong foundation for cyber resilience.The idea is to share our learnings in small accessible and practical chunks.

Privacy & Security

Toward a Post-Digital Society: Where Digital Evolution Meets People’s Revolution by Antonio Grasso

Embark on a thought-provoking journey with "Toward a Post-Digital Society - Where Digital Evolution Meets People's Revolution," a book that delves deep into the interplay between cutting-edge tech advancements and the evolving dynamics of our societies, with a nuanced exploration of how these advancements reshape the fabric of our daily lives, economies, and ethical frameworks.

Emerging Tech

Truth from the Trenches: A Practical Guide to the Art of It Management by Mark Settle

Settle describes the key constituencies that an IT leader needs to influence, seduce, leverage, and manage to be successful.

IT Management

Truth from the Valley: A Practical Primer on IT Management for the Next Decade by Mark Settle

Truth from the Valley describes the organizational challenges confronting Silicon Valley IT teams and proposes ways of transforming such challenges into organizational opportunities

IT Management

Understand the Cyber Attacker Mindset: Build a Strategic Security Program to Counteract Threats by Sarah Armstrong-Smith

This book examines different types of cyber attackers, explores their motivations and examines the methods used. It also reviews key industry developments such as cybercrime as a service, brokers and syndicates, nation-sponsored actors, insider sabotage and the challenges faced by law enforcement in tracking and apprehending attackers.

Security

Unicorns, Hype, and Bubbles: A guide to spotting, avoiding, and exploiting investment bubbles in tech by Jeffrey Funk

But ignoring these technologies can be even worse, as this can mean failing to capitalise on the next great step in innovation. From cryptocurrencies, blockchain, the metaverse, Web3, and NFTs, to self-driving vehicles, delivery drones, solid state batteries, eVTOLs, and more, technology bubbles have been inflating and popping for many years. Each time a bubble pops, tens if not hundreds of billions of investment dollars disappear with them

Emerging Tech

Unmasking AI: My Mission to Protect What is Human in a World of Machines By Joy Buolamwini

"I take you behind the scenes to the moments of doubt, the defeats, and the ongoing work of challenging tech companies, governments, and AI researchers to create more ethical and accountable AI systems."

Artificial Intelligence

Unwritten Laws of Engineering by by James G. Skakoon and original by W. J. King

 It addresses three areas: what the beginner needs to learn at once; "laws" relating chiefly to engineering executives; and purely personal considerations for engineers.

Engineering

Vital Foresight - The Case for Active Transhumanism by David W. Wood

Oncoming waves of technological change are poised to deliver either global destruction or a paradise-like sustainable superabundance, with the outcome depending on the timely elevation of transhumanist vision, transhumanist politics, and transhumanist education.

Artifical Intelligence

Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy by Cathy O'Neil

Tracing the arc of a person’s life, O’Neil exposes the black box models that shape our future, both as individuals and as a society. These “weapons of math destruction” score teachers and students, sort résumés, grant (or deny) loans, evaluate workers, target voters, set parole, and monitor our health.

Data & Analytics

What Is ChatGPT Doing ... and Why Does It Work? by Stephen Wolfram

Find out how the success of ChatGPT brings together the latest neural net technology with foundational questions about language and human thought posed by Aristotle more than two thousand years ago.

ChatGPT

What We Call Security by Greg van der Gaast

A thought-provoking and business-focused look at problems and missed opportunities within the field and practice of Information Security for business and security leaders alike.

Security

When Machines Become Customers: Ready or not, AI enabled non-human customers are coming to your business. How you adapt will make or break your future by Don Scheibenreif, Mark Raskino

For thousands of years, customers have been individual humans, families or organizations. But soon, generative AI enabled software and hardware machines will start to act as customers. First they will shop for us, later they will act for themselves. You can’t take them to dinner, and they won’t fall for your slogans, but they might help grow your market – if you know how.

Artificial Intelligence

Why Privacy Matters by Neil Richards

If we want to build a digital society that is consistent with our hard-won commitments to political freedom, individuality, and human
flourishing, then we must make a meaningful commitment to privacy.

Privacy

Your Face Belongs to Us: A Secretive Startup's Quest to End Privacy as We Know It by Kashmir Hill

The story of a small AI company that gave facial recognition to law enforcement, billionaires, and businesses, threatening to end privacy as we know it.

Privacy

Your Amazing Itty Bitty Guide to Being TED-Worthy: 15 Essential Secrets of Successful Speaking Based in Human Neurobiology by John-Alfred Kohler Bates

In this deeply insightful Itty Bitty Book, John Bates shows you how to use the powerful principles he teaches to TED and TEDx speakers, the NASA astronauts, top executives, and other leaders around the world.You will:•Discover the incredible power of mirror neurons as applied to public speaking and leadership.

Leadership

Zero Trust Networks: Building Secure Systems in Untrusted Networks by Evan Gilman, Doug Barth

Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You’ll learn the architecture of a zero trust network, including how to build one using currently available technology.

Security