Teckedin - Technology Books
- 06 Apr 2023
- Print
- DarkLight
- PDF
Teckedin - Technology Books
- Updated on 06 Apr 2023
- Print
- DarkLight
- PDF
Article Summary
Thank you to our sponsor. All columns are sortable
Title/Link | Description | Category |
---|---|---|
300+ Free Python Books for All Developers - DataDrivenInvestor | Download links to over 300 books - written by Priyesh Sinha | Apps/DevOps |
97 Things Every Information Security Professional Should Know by Christina Morillo | In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through everyday security problems. | Security |
Advancing into Analytics: From Excel to Python and R: 1st Edition by George Mount | With this hands-on guide, intermediate Excel users will gain a solid understanding of analytics and the data stack. By the time you complete this book, you'll be able to conduct exploratory data analysis and hypothesis testing using a programming language. | Data & Analytics |
AI and Machine Learning for Coders: A Programmer's Guide to Artificial Intelligence 1st Edition by Laurence Moroney | If you're looking to make a career move from programmer to AI specialist, this is the ideal place to start. Based on Laurence Moroney's extremely successful AI courses, this introductory book provides a hands-on, code-first approach to help you build confidence while you learn key topics. | Artificial Intelligence |
An Artificial Revolution: On Power, Politics and AI by Ivana Bartolettii | World-leading privacy expert Ivana Bartoletti exposes the reality behind the AI revolution, from the low-paid workers who train algorithms to recognise cancerous polyps, to the rise of data violence and the symbiotic relationship between AI and right-wing populism. | Artificial Intelligence |
Applied Ethics in a Digital World by Ingrid Vasiliu-Feltesand Jane Thomason | Covering topics such as artificial intelligence (AI) ethics, digital equity, and translational ethics, this book is a dynamic resource for policymakers, civil society, CEOs, ethicists, technologists, security advisors, sociologists, cyber behavior specialists, criminologists, data scientists, global governments, students, researchers, professors, academicians, and professionals. | Artificial Intelligence |
Analytics Best Practices: A Business-driven Playbook for Creating Value through Data Analytics by Prashanth Southekal , PHD | This book provides ten key analytics best practices that will improve the odds of delivering enterprise data analytics solutions successfully. It is intended for anyone who has a stake and interest in deriving insights from data analytics | Data Analytics |
Artificial Intelligence By Example: Acquire advanced AI, machine learning, and deep learning design skills by Denis Rothman | This book will make you an adaptive thinker and help you apply concepts to real-world scenarios. Using some of the most interesting AI examples, right from computer programs such as a simple chess engine to cognitive chatbots, you will learn how to tackle the machine you are competing with. | Artificial Intelligence |
Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence by Kate Crawford | Drawing on more than a decade of research, award‑winning scholar Kate Crawford reveals how AI is a technology of extraction: from the minerals drawn from the earth, to the labor pulled from low-wage information workers, to the data taken from every action and expression. | Artificial Intelligence |
Automating Humanity by Joe Toscano | Automating Humanity is the shocking and eye-opening new manifesto from international award-winning designer Joe Toscano that unravels and lays bare the power agendas of the world's greatest tech titans in plain language, and delivers a fair warning to policymakers, civilians, and industry professionals alike: we need a strategy for the future, and we need it now. | Privacy & Security |
Big Data MBA: Driving Business Strategies with Data Science by Bill Schmarzo | Big Data MBA brings insight and expertise to leveraging big data in business so you can harness the power of analytics and gain a true business advantage | Data & Analytics |
Breached!: Why Data Security Law Fails and How to Improve it by Daniel J. Solove and Woodrow Hartzog | Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world's leading experts on privacy and data security, argue that the law fails because, ironically, it focuses too much on the breach itself. | Data Privacy |
Building Industrial Digital Twins: Design, develop, and deploy digital twin solutions for real-world industries using Azure Digital Twins by Shyam Varan Nath, Pieter van Schalkwyk | "Shyam and Pieter are both recognized professionals in the industrial internet, IoT, and Digital Twins community. They converted the OT/IT task group to the Digital Twins Interoperability task group at the Industry IoT Consortium (formerly known as the Industrial Internet Consortium). | Digital Twins |
CISSP (ISC)² Certification Practice Exams and Tests: Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version by Ted Jordan | The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. | Security |
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career by Dr Jessica Barker | Exploring everything from the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. | Security |
Connected Planning: A Playbook for Agile Decision Making by Ron Dimon | The book is intended for business owners, managers and executives who want to improve their ability to execute their strategy sustainably. | Management Strategy |
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program by John Jackson | Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program | Security |
Crisis of Control: How Artificial SuperIntelligences May Destroy or Save the Human Race by Peter J. Scott | Peter Scott lays out the stark choices and consequences facing us in clear, provocative, and sometimes humorous language. This book is for those with the courage to face unpleasant facts head-on: the stakes could not be higher. | Artificial Intelligence |
Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe by Shira Rubinoff | Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current cybersecurity issues in the military, business, and government. | Cybersecurity |
Cybersecurity and Third-Party Risk: Third Party Threat Hunting by Gregory Rasner | You’ll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation. | Privacy & Security |
Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Kindle Edition by Dr. Gerald Auger, Jaclyn Scott, Jonathan Helmus, Kim Nguyen | The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you’ll focus on how to choose the right career field best suited to you from options such as security operations, penetration testing, and risk analysis. | Security Careers |
Cybersecurity Leadership: Powering the Modern Organization by Dr. Mansur Hasib | Managing cybersecurity requires a multi-disciplinary holistic business approach. Many of the current cybersecurity approaches in organizations and most books are based on an outdated 1991 model of cybersecurity - focused solely on technology solutions. | Privacy & Security |
Cybersecurity Sales by Neil Saltman, Anthony Johnson | Cybersecurity should be a collaborative effort between vendors and security teams because what’s at stake truly matters | Cybersecurity |
Damage Control: Cyber Insurance and Compliance by Joseph E. Brunsman MSL, Daniel W. Hudson CPCU, Kenneth J. Reiners CISSP | Damage Control is an approachable, non-technical, collection of knowledge and experience from a Master’s in Cybersecurity Law (MSL), a Chartered Property Casualty Underwriter (CPCU), and a Certified Information Systems Security Professional (CISSP) | Privacy & Security |
Data for Business Performance: The Goal-Question-Metric (GQM) Model to Transform Business Data into an Enterprise Asset by Prashanth Southekal, PHD | Today, digitization is dramatically changing the business landscape, and many progressive organizations have started to treat data as a valuable business asset. While many enterprises are investing in improved data management, only a few have leveraged data to truly impact business performance | Data Analytics |
Data Privacy - a runbook for engineeers by Nishant Bhajaria | Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. | Data Privacy |
Deep Learning with Python, Second Edition by François Chollet | Learn directly from the creator of Keras and master practical Python deep learning techniques that are easy to apply in the real world. | DevOps |
Democratizing Artificial Intelligence to Benefit Everyone: Shaping a Better Future in the Smart Technology Era by Jacques Ludik | Not only is the book aimed to help with the drive towards democratizing AI and its applications to maximize the beneficial outcomes for humanity, but Dr Ludik is specifically arguing for a more decentralized beneficial human-centric future where AI and its benefits can be democratized to as many people as possible. | Artificial Intelligence |
Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level by Gary Hayslip, Christophe Foulon, Renee Small | Whether you are just starting and are looking for an entry-level position or want to translate many years of experience to the right level, this book will help. | Security Careers |
DevOps Overture: What you Need to Know When Starting a DevOps Journey by Shawn D. Doyle | It begins with an overview of what software development methodologies came before DevOps and of the problems associated with those systems. It then explains what DevOps is and how it works to address these problems | DevOps |
Driving Digital by Isaac Sacolick | In Driving Digital, author Isaac Sacolick shares the lessons he's learned over the years as he has successfully spearheaded multiple transformations and helped shape digital-business best practices. | Digital Transformation |
Everybody Wants to Rule the World - Surviving And Thriving In A World Of Digital Giants by R. "Ray" Wang | Ultimately, you will understand how the business world is changing in the face of extreme competition and, most importantly, you will learn how to adapt now to stay relevant and in demand. | Digital Transformation |
Expert Python Programming: Master Python by learning the best coding practices and advanced programming concepts by Michał Jaworski, Tarek Ziadé | Attain a deep understanding of building, maintaining, packaging, and shipping robust Python applications https://www.amazon.com/Infonomics-Monetize-Information-Competitive-Advantage/dp/1138090387 | Apps/DevOps |
Exploring Smart Cities Activity Book for Kids by Dr Jonathan Reichental, Brett Hoffstadt | Learning Adventures Through Coloring, Games, Puzzles, Projects, and More! (STEAM-Powered Kids) | Smart Cities |
Extended Reality in Practice by Bernard Marr | You will discover how businesses and organisations are implementing the technology, with case examples, including some of the world’s biggest brands, to showcase how they are starting to use XR in practice. | VR |
Fail Fast, Learn Faster by Randy Bean | Visionary and Author Releases New Book Explaining Why, Now More Than Ever, Industry Leaders Must Adapt to Compete in an Era of Disruption, Big Data, and AI | Leadership |
Firewalls Don't Stop Dragons by Carey Parker | A Step-by-Step Guide to Computer Security and Privacy for Non-Techies | Privacy & Security |
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems by Aurélien Géron | Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data. This practical book shows you how | Machine Learning |
Human Hacking: Win Friends, Influence People, and Leave Them Better Off For Having Met You by Christopher Hadnagy | Christopher Hadnagy is the founder and CEO of Social-Engineer, LLC. In his sixteen years in the industry, he has written the world’s first social engineering–framework, created the first social engineering–based podcast and newsletter, and written four books on the topic. | Social Engineering |
Infonomics: How to Monetize, Manage, and Measure Information as an Asset for Competitive Advantage by Douglas B. Laney | One of CIO Magazine's top five "must read" books of the year, Infonomics provides the foundation and methods for quantifying information asset value and tactics for using information as your competitive edge to drive growth. | Data Management |
INVENTING WORLD 3.0: Evolutionary Ethics for Artificial Intelligence by Matthew James Bailey | In this future, artificial intelligence has become evolutionary, operating at lightning speed within every aspect of society. It understands and honours human values and ethics | Artificial Intelligence |
IQ EQ DQ: New Intelligence in the AI Age by Yuhyun Park | This book is about Park's social impact journey to develop DQ (Digital Intelligence) as the global standard for digital literacy, digital skills, and digital readiness with the belief that 'technology is only meaningful when it enhances humanness. | Artificial Intelligence |
Managing Your Business Risk in the Cybersecurity Minefield: Critical Strategies from 21 Cybersecurity Experts by Chris Wiser, Amir Sachs, Brian Artigas, Brian Galli & 18 more | Is co-written by a group of 21 high-level IT & Cybersecurity experts who have come together to teach business owners what you need to know about protecting your business from cybersecurity threats. | Security |
Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth by Theresa Payton | Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. | Privacy & Security |
MINDFUL AI: Reflections on Artificial Intelligence by Murat Durmus | Mindful AI refers to designing and building artificial intelligence (AI) systems with awareness and consideration of their ethical, moral, and societal implications. Mindful AI involves taking a holistic approach to AI that incorporates considerations of fairness, transparency, accountability, and respect for human rights. | Artificial Intelligence |
Move Over Brokers Here Comes the Blockchain by Keír Finlow-Bates | Join Keir on a fascinating journey as he explores everything from how the technology behind blockchain works, through to what it means to us as a society, and assesses whether it will change the way we view the world. | Blockchain |
Natural Language Processing with Transformers by Lewis Tunstall, Leandro von Werra, Thomas Wolf | If you're a data scientist or machine learning engineer, this practical book shows you how to train and scale these large models using HuggingFace Transformers, a Python-based deep learning library. | NLP |
Navigating the Cybersecurity Career Path by Helen E. Patton | In Navigating the Cybersecurity Career Path, decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security team | Tech Careers |
No Safe Harbor by Mark Sangster | The Inside Truth About Cybercrime, and How to Protect Your Business | Privacy & Security |
Online Innovation by Gijs van Wulfen, Maria Vittoria Colucci, Andrew Constable, Florian Hameister, Rody Vonk | Finally, do not be misled by the title, its relevance goes far beyond digital transformation: it’s a fundamental toolkit to fully exploit all dimensions of innovation, and prosper in the ‘Phygital’ economy. | Innovation |
Open Source Law, Policy and Practice by Amanda Brock | The work delivers an in-depth examination of the community, legal, and commercial structures relating to the usage and exploitation of Open Source. This enables readers to understand the legal environment within which Open Source operates and what is required for its appropriate governance and curation in enterprise and the public sector. | Open Source |
Privacy Engineering by Nishant Bhajaria | Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. | Privacy & Security |
Privacy Engineering: A Dataflow and Ontological Approach by Ian Oliver | This book presents an approach based upon data flow modelling, coupled with standardised terminological frameworks, classifications and ontologies to properly annotate and describe the flow of information into, out of and across these systems. | Privacy & Security |
Privacy is Power: Why and How You Should Take Back Control of Your Data by Carissa Véliz | Carissa is an Associate Professor for Ethics in AI at University of Oxford. The book paints a comprehensive and compelling picture of where we are at with copious amounts of data being generated and collected and analyzed with AI systems and what we can do to circumvent some of it. | Privacy & Security |
Privacy’s Blueprint: The Battle to Control the Design of New Technologies by Woodrow Hartzog | In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. | Data Privacy |
Probability and Statistics for Data Science: Math + R + Data by Norman Matloff | * Leads the student to think critically about the "how" and "why" of statistics, and to "see the big picture." * Not "theorem/proof"-oriented, but concepts and models are stated in a mathematically precise manner. *Prerequisites are calculus, some matrix algebra, and some experience in programming. | Data & Analytics |
Python Machine Learning: Unlock deeper insights into Machine Leaning with this vital guide to cutting-edge predictive analytics by Sebastian Raschka | If you want to find out how to use Python to start answering critical questions of your data, pick up Python Machine Learning – whether you want to get started from scratch or want to extend your data science knowledge, this is an essential and unmissable resource. | Data & Analytics |
Small Teaching Online: Applying Learning Science in Online Classes by Flower Darby, James M. Lang | The concept of small teaching is simple: small and strategic changes have enormous power to improve student learning. Instructors face unique and specific challenges when teaching an online course. This book offers small teaching strategies that will positively impact the online classroom. | E-Learning |
Smart Cities for Dummies by Dr. Jonathan Reichental | At its core, a smart city is a collection of technological responses to the growing demands, challenges, and complexities of improving the quality of life for billions of people now living in urban centers across the world. | Smart Cities |
Social Engineering: The Science of Human Hacking by Christopher Hadnagy | Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past | Privacy & Security |
Software Wasteland: How the Application-Centric Mindset is Hobbling our Enterprises by Dave McComb | This is the book your Systems Integrator and your Application Software vendor don't want you to read. Enterprise IT (Information Technology) is a $3.8 trillion per year industry worldwide. Most of it is waste. | Application Development |
Stone Age Code: From Monkey Business to AI by Shane Neeley | Stone Age Code illustrates the evolution of improbable data scientists. Shane Neeley, the author of this exceptional book, shows the easiest and funniest approach to learning to code. | AI & DevOps |
The Age of Living Machines: How Biology Will Build the Next Technology Revolution by Susan Hockfield | The Age of Living Machines describes some of the most exciting new developments and the scientists and engineers who helped create them. Virus-built batteries. Protein-based water filters. Cancer-detecting nanoparticles. Mind-reading bionic limbs. Computer-engineered crops. | Emerging Tech |
The AI Dilemma: A Leadership Guide to Assess Enterprise AI Maturity & Explore AI's Impact in Your Industry by Dr. Cindy Gordon | Understand the Impact of AI in Industries and Assess Your Organizational AI Readiness | Artificial Intelligence |
The Art of Attack by Maxie Reynolds | The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage | Security |
The Data-Centric Revolution: Restoring Sanity to Enterprise Information Systems by Dave McComb | This book is the first part of a trilogy to follow "Software Wasteland". In "Software Wasteland", we detailed the current poor state of application software development. | Information Systems |
The Data Path Less Traveled by Dr. Zacharias Voulgaris | In this book, we explore heuristics from a practical perspective. We illustrate how heuristics can help you solve challenging problems through simple examples and real-life situations. Apply Jaccard Similarity and a variant, F1 score, Entropy, Ectropy, Area Under Curve, Particle Swarm Optimization, and Genetic Algorithms (along with GA variants). | Data & Analytics |
The Economics of Data, Analytics, and Digital Transformation: The theorems, laws, and empowerments to guide your organization's digital transformation by Bill Schmarzo | This book frames the big data problem from a business perspective. It focuses on how important economic concepts can help organizations exploit the new economic assets of data and analytics to fuel economic growth – assets that actually appreciate, not depreciate, in value the more that they are used. | Data Analytics |
The Future Is Faster Than You Think by Peter Diamandis & Steven Kotler | In this gripping and insightful roadmap to our near future, Diamandis and Kotler investigate how wave after wave of exponentially accelerating technologies will impact both our daily lives and society as a whole. | Tech Trends |
The Pentester BluePrint: Starting a Career as an Ethical Hacker by Phillip L. Wylie, Kim Crawley | Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. | Security |
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value by Michelle Finnerman Dennedy, Jonathan Fox, Thomas Finnerman | The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. | Privacy & Security |
The Rise of Skeleton Marketing: How AI is Revolutionizing the Marketing Industry by Jeff Locke | From the death of traditional marketing roles to the birth of AI-powered marketing and the future of marketing departments, this ebook offers insights and strategies for professionals looking to adapt to the changing landscape. | AI/Marketing Tech |
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Christian Espinosa | With his seven-step methodology and stories from the field, Christian helps you develop your team’s technical minds so they become better humans and strong leaders who excel in every role. | Security |
Titaniam - Back to Basics | The primary theme of this book is that adhering to basic security building blocks creates a strong foundation for cyber resilience.The idea is to share our learnings in small accessible and practical chunks. | Privacy & Security |
Truth from the Trenches: A Practical Guide to the Art of It Management by Mark Settle | Settle describes the key constituencies that an IT leader needs to influence, seduce, leverage, and manage to be successful. | IT Management |
Truth from the Valley: A Practical Primer on IT Management for the Next Decade by Mark Settle | Truth from the Valley describes the organizational challenges confronting Silicon Valley IT teams and proposes ways of transforming such challenges into organizational opportunities | IT Management |
Unwritten Laws of Engineering by by James G. Skakoon and original by W. J. King | It addresses three areas: what the beginner needs to learn at once; "laws" relating chiefly to engineering executives; and purely personal considerations for engineers. | Engineering |
Vital Foresight - The Case for Active Transhumanism by David W. Wood | Oncoming waves of technological change are poised to deliver either global destruction or a paradise-like sustainable superabundance, with the outcome depending on the timely elevation of transhumanist vision, transhumanist politics, and transhumanist education. | Artifical Intelligence |
Why Privacy Matters by Neil Richards | If we want to build a digital society that is consistent with our hard-won commitments to political freedom, individuality, and human flourishing, then we must make a meaningful commitment to privacy. | Privacy |