- 22 Sep 2024
- 45 Minutes to read
- DarkLight
Teckedin - Technology Books
- Updated on 22 Sep 2024
- 45 Minutes to read
- DarkLight
Thank you to our sponsor. All columns are sortable
Title/Link | Description | Category |
---|---|---|
300+ Free Python Books for All Developers - DataDrivenInvestor | Download links to over 300 books - written by Priyesh Sinha | Apps/DevOps |
97 Things Every Information Security Professional Should Know by Christina Morillo | In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through everyday security problems. | Security |
Adaptive Resilience: How to Thrive in a Digital Era by Maria Santacaterina | The author’s new paradigm for growth is a radical shift in the way we think and do “good” business. It helps Business Leaders re-imagine the Enterprise and steer new frontier technologies in the right direction. You’ll learn how to create adaptability and build resilience in your Enterprise, encourage visionary leadership and effective oversight. | Digital Transformation |
Advancing into Analytics: From Excel to Python and R: 1st Edition by George Mount | With this hands-on guide, intermediate Excel users will gain a solid understanding of analytics and the data stack. By the time you complete this book, you'll be able to conduct exploratory data analysis and hypothesis testing using a programming language. | Data & Analytics |
AI - A Primer for State and Local Governments by Alan R Shark | The government landscape is undergoing a significant transformation driven by the power of artificial intelligence (AI). From streamlining administrative tasks to informing data-driven policy decisions, AI offers many opportunities to enhance efficiency, improve constituent services, and optimize resource allocation at the state and local levels. | AI/Government |
If you're looking to make a career move from programmer to AI specialist, this is the ideal place to start. Based on Laurence Moroney's extremely successful AI courses, this introductory book provides a hands-on, code-first approach to help you build confidence while you learn key topics. | Artificial Intelligence | |
AI & Data Literacy: Empowering Citizens of Data Science by Bill Schmarzo | We'll explore AI's inner workings, user intent, and the critical role of the AI Utility Function. Additionally, we'll briefly touch on statistics and probabilities to build decision models leveraging AI and data for making informed, more accurate, and less risky decisions. | Data & Analytics |
In the book, you’ll learn about how climate change, illness and disease, and challenges to fundamental human rights are all being fought using replicable methods and reusable AI code. | Tech for Good | |
The reader will explore a conceptual model for data and understand what humans are good at and what machines are good at. The book dives into why accountability, fairness, transparency, explainability, kindness, robustness, and data privacy are essential concepts in AI that are not being taught nor insisted upon. | Artificial Intelligence | |
In AI Snake Oil, computer scientists Arvind Narayanan and Sayash Kapoor cut through the confusion to give you an essential understanding of how AI works and why it often doesn’t, where it might be useful or harmful, and when you should suspect that companies are using AI hype to sell AI snake oil—products that don’t work, and probably never will. | AI | |
An Artificial Revolution: On Power, Politics and AI by Ivana Bartolettii | World-leading privacy expert Ivana Bartoletti exposes the reality behind the AI revolution, from the low-paid workers who train algorithms to recognise cancerous polyps, to the rise of data violence and the symbiotic relationship between AI and right-wing populism. | Artificial Intelligence |
Applied Ethics in a Digital World by Ingrid Vasiliu-Feltesand Jane Thomason | Covering topics such as artificial intelligence (AI) ethics, digital equity, and translational ethics, this book is a dynamic resource for policymakers, civil society, CEOs, ethicists, technologists, security advisors, sociologists, cyber behavior specialists, criminologists, data scientists, global governments, students, researchers, professors, academicians, and professionals. | Artificial Intelligence |
This book provides ten key analytics best practices that will improve the odds of delivering enterprise data analytics solutions successfully. It is intended for anyone who has a stake and interest in deriving insights from data analytics | Data Analytics | |
This book will make you an adaptive thinker and help you apply concepts to real-world scenarios. Using some of the most interesting AI examples, right from computer programs such as a simple chess engine to cognitive chatbots, you will learn how to tackle the machine you are competing with. | Artificial Intelligence | |
Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence by Kate Crawford | Drawing on more than a decade of research, award‑winning scholar Kate Crawford reveals how AI is a technology of extraction: from the minerals drawn from the earth, to the labor pulled from low-wage information workers, to the data taken from every action and expression. | Artificial Intelligence |
Automating Humanity is the shocking and eye-opening new manifesto from international award-winning designer Joe Toscano that unravels and lays bare the power agendas of the world's greatest tech titans in plain language, and delivers a fair warning to policymakers, civilians, and industry professionals alike: we need a strategy for the future, and we need it now. | Privacy & Security | |
Murat Durmus is CEO and founder of AISOMA (a Frankfurt am Main (Germany) based company specializing in AI-based technology development and consulting) and Author of the book "Mindful AI - Reflections on Artificial Intelligence" and "INSIDE ALAN TURING." | AI Ethics | |
Big Data MBA: Driving Business Strategies with Data Science by Bill Schmarzo | Big Data MBA brings insight and expertise to leveraging big data in business so you can harness the power of analytics and gain a true business advantage | Data & Analytics |
Breached!: Why Data Security Law Fails and How to Improve it by Daniel J. Solove and Woodrow Hartzog | Despite the passage of many data security laws, data breaches | Data Privacy |
Build a Large Language Model (From Scratch) by Sebastian Raschka | Each stage is explained with clear text, diagrams, and examples. You’ll go from the initial design and creation, to pretraining on a general corpus, and on to fine-tuning for specific tasks. | AI/LLM |
"Shyam and Pieter are both recognized professionals in the industrial internet, IoT, and Digital Twins community. They converted the OT/IT task group to the Digital Twins Interoperability task group at the Industry IoT Consortium (formerly known as the Industrial Internet Consortium). | Digital Twins | |
The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. | Security | |
Co-Intelligence: Living and Working with AI by Ethan Mollick | Through his writing, speaking, and teaching, Mollick has become one of the most prominent and provocative explainers of AI, focusing on the practical aspects of how these new tools for thought can transform our world. | AI |
These acclaimed leaders―each profiled in their own chapter―explain the toughest business decision they had to make, and how the outcome influenced and impacted their leadership style. These in-depth anecdotes take the reader inside some of the most challenging business climates imaginable and chronicle how these elite CIOs made the decisions that mattered. | Leadership | |
Andy Pardoe has spent decades working with AI, not only as an influential academic but also within corporations and as a consultant and accelerator for AI start-ups. He draws upon his expertise and lived experience to offer the essential skills and tools that you need to succeed with Artificial Intelligence, whether you are pursuing it as a career or simply working with AI in your work-life. | AI | |
Exploring everything from the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. | Security | |
Connected Planning: A Playbook for Agile Decision Making by Ron Dimon | The book is intended for business owners, managers and executives who want to improve their ability to execute their strategy sustainably. | Management Strategy |
This richly detailed book exposes the consequences of Big Tech’s digital surveillance, exploitative use of AI, and monopolistic and anticompetitive practices. | Tech4Good | |
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program by John Jackson | Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program | Security |
You'll learn the ins and outs of distribution, how to overcome roadblocks in the process, why remixing and republishing content is important, and how to uncover the most profitable distribution channels for your business. | Digital Marketing | |
Peter Scott lays out the stark choices and consequences facing us in clear, provocative, and sometimes humorous language. This book is for those with the courage to face unpleasant facts head-on: the stakes could not be higher. | Artificial Intelligence | |
He hopes that by describing the maturity journey of the cDc, from internet pranksters to seasoned and respected “graybeards,” that millennials – born between 1981 and 1996 – who are now in charge of “Big Tech” might use that journey as a blueprint to guide them in the future. | Security | |
Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current cybersecurity issues in the military, business, and government. | Cybersecurity | |
Cybersecurity and Third-Party Risk: Third Party Threat Hunting by Gregory Rasner | You’ll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation. | Privacy & Security |
The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you’ll focus on how to choose the right career field best suited to you from options such as security operations, penetration testing, and risk analysis. | Security Careers | |
Cybersecurity Leadership: Powering the Modern Organization by Dr. Mansur Hasib | Managing cybersecurity requires a multi-disciplinary holistic business approach. Many of the current cybersecurity approaches in organizations and most books are based on an outdated 1991 model of cybersecurity - focused solely on technology solutions. | Privacy & Security |
Cybersecurity should be a collaborative effort between vendors and security teams because what’s at stake truly matters | Cybersecurity | |
Damage Control is an approachable, non-technical, collection of knowledge and experience from a Master’s in Cybersecurity Law (MSL), a Chartered Property Casualty Underwriter (CPCU), and a Certified Information Systems Security Professional (CISSP) | Privacy & Security | |
For years, companies have had free rein to use every click, purchase, and “like” you make, to earn money. Now, across the globe, new laws have been written, passed, and are coming into force, giving individuals the right to access, delete, and monetise their own data. This book provides a vision of how you can use these laws, regulations, and services to directly benefit from your data in new and lucrative ways. | Data Privacy | |
Today, digitization is dramatically changing the business landscape, and many progressive organizations have started to treat data as a valuable business asset. While many enterprises are investing in improved data management, only a few have leveraged data to truly impact business performance | Data Analytics | |
Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. | Data Privacy | |
Data Reimagined: Building Trust One Byte at a Time by Jodi Daniels, Justin Daniels | Data Reimagined will help you fast-track your approach, create trust in your data collection, and safeguard this trust with proper data use and sharing practices. | Data Management |
Deep Learning with Python, Second Edition by François Chollet | Learn directly from the creator of Keras and master practical Python deep learning techniques that are easy to apply in the real world. | DevOps |
Not only is the book aimed to help with the drive towards democratizing AI and its applications to maximize the beneficial outcomes for humanity, but Dr Ludik is specifically arguing for a more decentralized beneficial human-centric future where AI and its benefits can be democratized to as many people as possible. | Artificial Intelligence | |
Whether you are just starting and are looking for an entry-level position or want to translate many years of experience to the right level, this book will help. | Security Careers | |
DevOps Overture: What you Need to Know When Starting a DevOps Journey by Shawn D. Doyle | It begins with an overview of what software development methodologies came before DevOps and of the problems associated with those systems. It then explains what DevOps is and how it works to address these problems | DevOps |
Digital Darwinism: Surviving the New Age of Business Disruption by Tom Goodwin | Learn how to become truly customer-centric, drive digital transformation through a culture of real innovation and challenge assumptions of how things have been done before. The survival of your business depends on it. | Digital Transformation |
In Driving Digital, author Isaac Sacolick shares the lessons he's learned over the years as he has successfully spearheaded multiple transformations and helped shape digital-business best practices. | Digital Transformation | |
This book brings a fresh look at a core component of Cybersecurity, laying our Modern Vulnerability Management practices, processes and tools to enable organizations to mitigate risk and do so efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust. | Security | |
Presents collection of chapters in the newly developing area of ethics in artificial intelligence. Discusses both theoretical and practical aspects of integrating ethics into artificial intelligence. Serves as a reference for researchers and practitioners in academia and industry | Artificial Intelligence | |
Ultimately, you will understand how the business world is changing in the face of extreme competition and, most importantly, you will learn how to adapt now to stay relevant and in demand. | Digital Transformation | |
Attain a deep understanding of building, maintaining, packaging, and shipping robust Python applications | Apps/DevOps | |
Exploring Smart Cities Activity Book for Kids by Dr Jonathan Reichental, Brett Hoffstadt | Learning Adventures Through Coloring, Games, Puzzles, Projects, and More! (STEAM-Powered Kids) | Smart Cities |
You will discover how businesses and organisations are implementing the technology, with case examples, including some of the world’s biggest brands, to showcase how they are starting to use XR in practice. | VR | |
Visionary and Author Releases New Book Explaining Why, Now More Than Ever, Industry Leaders Must Adapt to Compete in an Era of Disruption, Big Data, and AI | Leadership | |
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Roger A. Grimes | Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. | Security |
A Step-by-Step Guide to Computer Security and Privacy for Non-Techies | Privacy & Security | |
The author explores fascinating work being undertaken by firms in the real world, as well as high-value use cases and innovative projects and products made possible by realigning organizational frameworks using the capabilities of new technologies. | Data & Analytics | |
Rich Heimann and Clayton Pummill rely on their seasoned professional expertise to help leaders understand the potential of generative AI to drive business innovation, navigate the complexities of ethical deployment, and recognize the pitfalls and misconceptions associated with this transformative technology | AI | |
'100% zesty. It is not only a powerful telling of humanity’s ongoing relationship with technology and a reflection on the current questions surrounding AI, but it is also the most compelling radical theological text I have read.' | AI | |
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. | Security | |
Handbook on the Ethics of Artificial Intelligence Edited by David J. Gunkel | This engaging Handbook identifies and critically examines the moral opportunities and challenges typically attributed to artificial intelligence. It provides a comprehensive overview and examination of the most pressing and urgent problems with this technology by drawing on a wide range of analytical methods, traditions, and approaches. | AI Ethics |
Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data. This practical book shows you how | Machine Learning | |
Harness Your Speaking Anxiety: And Connect Emotionally With Your Audience by Nathan Gold | When it’s your turn to speak, do you experience: ✓ Heart racing ✓ Tunnel vision ✓ Shoulder tension ✓ Butterflies in your gut ✓ Shortness of breath ✓ Cold clammy hands ✓ A blank mind ✓ Dry mouth ✓ Nauseousness Yes? Good! You read that right. Good! Anyone of these symptoms means you are human and someone who cares about their audience when you speak | Leadership |
How to Become a Data Analyst: My Low-Cost, No Code Roadmap for Breaking into Tech by Annie Nelson | In How to Become a Data Analyst: My Low-Cost, No Code Roadmap for Breaking into Tech, data analyst and analytics consultant Annie Nelson walks you through how she took the reins and made a dramatic career change to unlock new levels of career fulfilment and enjoyment. | Data & Analytics |
Christopher Hadnagy is the founder and CEO of Social-Engineer, LLC. In his sixteen years in the industry, he has written the world’s first social engineering–framework, created the first social engineering–based podcast and newsletter, and written four books on the topic. | Social Engineering | |
Touching on the many profound ethical dilemmas posed by emerging technologies, and full of fascinating case studies, Human Rights, Robot Wrongs is a rallying cry for humanity in the age of AI. | AI Ethics | |
One of CIO Magazine's top five "must read" books of the year, Infonomics provides the foundation and methods for quantifying information asset value and tactics for using information as your competitive edge to drive growth. | Data Management | |
In today’s technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. | Security | |
INVENTING WORLD 3.0: Evolutionary Ethics for Artificial Intelligence by Matthew James Bailey | In this future, artificial intelligence has become evolutionary, operating at lightning speed within every aspect of society. It understands and honours human values and ethics | Artificial Intelligence |
Invisible Women: Data Bias in a World Designed for Men by Caroline Criado Perez | Data is fundamental to the modern world. From economic development, to healthcare, to education and public policy, we rely on numbers to allocate resources and make crucial decisions. But because so much data fails to take into account gender, because it treats men as the default and women as atypical, bias and discrimination are baked into our systems. | Data & Analytics |
This book is about Park's social impact journey to develop DQ (Digital Intelligence) as the global standard for digital literacy, digital skills, and digital readiness with the belief that 'technology is only meaningful when it enhances humanness. | Artificial Intelligence | |
IRREPLACEABLE: The Art of Standing Out in the Age of Artificial Intelligence by Pascal Bornet | With over 20 years of pioneering research at the human-AI intersection, Bornet reveals the secrets to living in harmony with AI while cultivating uniquely human qualities. He introduces the Three Competencies of the Future that we need to develop urgently to thrive in our new world. | AI |
Machine Readable Me considers how and why data that is gathered about us is increasingly limiting what we can and can’t do in our lives and, crucially, what the alternatives are. | Data Privacy | |
Is co-written by a group of 21 high-level IT & Cybersecurity experts who have come together to teach business owners what you need to know about protecting your business from cybersecurity threats. | Security | |
Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth by Theresa Payton | Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. | Privacy & Security |
Mastering AI A Survival Guide to Our Superpowered Future By Jeremy Kahn | A Fortune magazine journalist draws on his expertise and extensive contacts among the companies and scientists at the forefront of artificial intelligence to offer dramatic predictions of AI’s impact over the next decade, from reshaping our economy and the way we work, learn, and create to unknitting our social fabric, jeopardizing our democracy, and fundamentally altering the way we think. | AI |
You'll learn how to examine malware code and determine the damage it can possibly cause to systems, along with ensuring that the right prevention or remediation steps are followed. As you cover all aspects of malware analysis for Windows, Linux, macOS, and mobile platforms in detail, you'll also get to grips with obfuscation, anti-debugging, and other advanced anti-reverse-engineering techniques | Security | |
MINDFUL AI: Reflections on Artificial Intelligence by Murat Durmus | Mindful AI refers to designing and building artificial intelligence (AI) systems with awareness and consideration of their ethical, moral, and societal implications. Mindful AI involves taking a holistic approach to AI that incorporates considerations of fairness, transparency, accountability, and respect for human rights. | Artificial Intelligence |
Mobilizing the C-Suite: Waging War Against Cyberattacks by Frank Riccardi | Mobilizing the C-Suite: Waging War Against Cyberattacks is a call to arms for c-suite leaders to implement the tried-and-true cybersecurity countermeasures proven to thwart cyberattacks. In addition, this book is a handy, entertaining guide explaining fundamental cybersecurity principles to non-geek c-suite leaders. | Security |
Move Over Brokers Here Comes the Blockchain by Keír Finlow-Bates | Join Keir on a fascinating journey as he explores everything from how the technology behind blockchain works, through to what it means to us as a society, and assesses whether it will change the way we view the world. | Blockchain |
Natural Language Processing with Transformers by Lewis Tunstall, Leandro von Werra, Thomas Wolf | If you're a data scientist or machine learning engineer, this practical book shows you how to train and scale these large models using HuggingFace Transformers, a Python-based deep learning library. | NLP |
In Navigating the Cybersecurity Career Path, decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security team | Tech Careers | |
In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards | Security | |
The Inside Truth About Cybercrime, and How to Protect Your Business | Privacy & Security | |
Finally, do not be misled by the title, its relevance goes far beyond digital transformation: it’s a fundamental toolkit to fully exploit all dimensions of innovation, and prosper in the ‘Phygital’ economy. | Innovation | |
The work delivers an in-depth examination of the community, legal, and commercial structures relating to the usage and exploitation of Open Source. This enables readers to understand the legal environment within which Open Source operates and what is required for its appropriate governance and curation in enterprise and the public sector. | Open Source | |
Powered by immersive eyewear and driven by interactive AI agents, this new age of computing has the potential to make our world a magical place where the boundaries between the real and the virtual, the human and the artificial, rapidly fade away. If managed well, this could unleash a new age of abundance. If managed poorly, this technological revolution could easily go astray, deeply compromising our privacy, autonomy, agency, and even our humanity. | AI/Metaverse | |
Offers an authoritative guide to research in the area, surveying what's been done and opening up new avenues of inquiry | Digital Ethics | |
Partners Are the Customer Experience by Nancy Ridge, Norma Watenpaugh | The business world has become focused on customer experience, almost to the point of obsession. Now, for the first time, the key link has been made between partner experience (PX) and customer experience (CX) | Vendor Management |
Physics of Artificial Intelligence: Theory And Applications by Achint Kumar | From the complex dynamics of spin glass physics and graph coloring in statistical mechanics to cutting-edge deep learning algorithms like variational autoencoders and maximum entropy reinforcement learning, this book provides a comprehensive exploration that is both rigorous and accessible. | AI/Physics |
Practical Data Privacy: Enhancing Privacy and Security in Data by Katharine Jarmul | This essential guide will give you a fundamental understanding of modern privacy building blocks, like differential privacy, federated learning, and encrypted computation. Based on hard-won lessons, this book provides solid advice and best practices for integrating breakthrough privacy-enhancing technologies into production systems. | Privacy & Security |
Privacy and AI - Protecting Individuals' Rights in the Age of AI by Federico Marengo | In this book, which is based on my Ph.D. thesis defended earlier this year, I try to find an adequate balance between the understanding of the privacy provisions, the technical challenges of #AI systems and what privacy professionals can do to reduce the risks posed by AI systems when they process personal data. | Privacy & AI |
Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. | Privacy & Security | |
Privacy Engineering: A Dataflow and Ontological Approach by Ian Oliver | This book presents an approach based upon data flow modelling, coupled with standardised terminological frameworks, classifications and ontologies to properly annotate and describe the flow of information into, out of and across these systems. | Privacy & Security |
We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet. | Data Privacy | |
Privacy is Power: Why and How You Should Take Back Control of Your Data by Carissa Véliz | Carissa is an Associate Professor for Ethics in AI at University of Oxford. The book paints a comprehensive and compelling picture of where we are at with copious amounts of data being generated and collected and analyzed with AI systems and what we can do to circumvent some of it. | Privacy & Security |
Privacy’s Blueprint: The Battle to Control the Design of New Technologies by Woodrow Hartzog | In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. | Data Privacy |
Probability and Statistics for Data Science: Math + R + Data by Norman Matloff | * Leads the student to think critically about the "how" and "why" of statistics, and to "see the big picture." * Not "theorem/proof"-oriented, but concepts and models are stated in a mathematically precise manner. *Prerequisites are calculus, some matrix algebra, and some experience in programming. | Data & Analytics |
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business by George Finney | In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director. | Security |
Python for Data Analysis is a book that focuses on processing, cleaning and visualizing data with Python. It is also a practical introduction to scientific computing, tailored for data-intensive applications. | Data & Analytics | |
If you want to find out how to use Python to start answering critical questions of your data, pick up Python Machine Learning – whether you want to get started from scratch or want to extend your data science knowledge, this is an essential and unmissable resource. | Data & Analytics | |
Rebooting AI: Building Artificial Intelligence We Can Trust by Gary Marcus, Ernest Davis | Professors Gary Marcus and Ernest Davis have spent their careers at the forefront of AI research and have witnessed some of the greatest milestones in the field, but they argue that a computer beating a human in Jeopardy! does not signal that we are on the doorstep of fully autonomous cars or superintelligent machines. | Artificial Intelligence |
Responsible AI in the Enterprise is a comprehensive guide to implementing ethical, transparent, and compliant AI systems in an organization. With a focus on understanding key concepts of machine learning models, this book equips you with techniques and algorithms to tackle complex issues such as bias, fairness, and model governance. | Artificial Intelligence | |
A start-up wastes a billion dollars making videos nobody wants to watch. A city rushes to build landing pads for flightless air taxi prototypes. Tech giants hire thousands of techies for fake projects to stop them working for rivals. The tech industry has a tendency to go crazy. In Siliconned, industry insider Emmanuel Maggiori decodes tech’s hysteria and explains why we all pay the price for it. | Technology | |
Small Teaching Online: Applying Learning Science in Online Classes by Flower Darby, James M. Lang | The concept of small teaching is simple: small and strategic changes have enormous power to improve student learning. Instructors face unique and specific challenges when teaching an online course. This book offers small teaching strategies that will positively impact the online classroom. | E-Learning |
At its core, a smart city is a collection of technological responses to the growing demands, challenges, and complexities of improving the quality of life for billions of people now living in urban centers across the world. | Smart Cities | |
Social Engineering: The Science of Human Hacking by Christopher Hadnagy | Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past | Privacy & Security |
Software Wasteland: How the Application-Centric Mindset is Hobbling our Enterprises by Dave McComb | This is the book your Systems Integrator and your Application Software vendor don't want you to read. Enterprise IT (Information Technology) is a $3.8 trillion per year industry worldwide. Most of it is waste. | Application Development |
Solar Powered Auto-irrigation system using PLC Programming by Faazla Iqbal | Join us on a journey through the innovative world of solar-powered agriculture, where smart technology takes center stage. Learn how automatic irrigation systems, equipped with advanced sensors, detect soil conditions and deliver precise care to crops, even in unfavorable weather conditions. By integrating renewable energy sources such as solar power, these systems become a lifeline for regions plagued by unreliable electricity supplies. | Sustainability |
State of the Art in GenAI & LLMs — Creative Projects, with Solutions by Vincent Granville | This textbook is an invaluable resource to instructors and professors teaching AI, or for corporate training. Also, it is useful to prepare for job interviews or to build a robust portfolio. And for hiring managers, there are plenty of original interview questions. The amount of Python code accompanying the solutions is considerable, using a vast array of libraries as well as home-made implementations showing the inner workings and improving existing black-box algorithms | AI/LLM |
Stone Age Code illustrates the evolution of improbable data scientists. Shane Neeley, the author of this exceptional book, shows the easiest and funniest approach to learning to code. | AI & DevOps | |
In Superconvergence, leading futurist and OneShared.World founder Jamie Metzl explores how artificial intelligence, genome sequencing, gene editing, and other revolutionary technologies are transforming our lives, world, and future. These accelerating and increasingly interconnected technologies have the potential to improve our health, feed billions of people, supercharge our economies, store essential information for millions of years, and save our planet, but they can also―if we are not careful―do immeasurable harm. | AI | |
Taming Silicon Valley: How We Can Ensure That AI Works for Us by Gary F. Marcus | Marcus explains the potential—and potential risks—of AI in the clearest possible terms and how Big Tech has effectively captured policymakers. He begins by laying out what is lacking in current AI, what the greatest risks of AI are, and how Big Tech has been playing both the public and the government, before digging into why the US government has thus far been ineffective at reining in Big Tech | AI |
A fascinating look at how the Space Barons and Techtitans—heads of companies like Uber, Amazon, Tesla—have hijacked technology, preventing it from being used on behalf of the common good and profiting from the politics of fear and consumerism. | Tech for Good | |
The book takes readers through the steps and mindset necessary to restore the West’s belief in technological progress. Each individual chapter provides a cogent and often controversial rebuttal to a common tech accusation. The resulting text will inspire conversations among tech insiders, policymakers, and the general public alike. | Privacy/Trends | |
The Active Defender: Immersion in the Offensive Security Mindset by Dr. Catherine J. Ullman | In the book, you’ll learn to understand and embrace the knowledge you can gain from the offensive security community. You’ll become familiar with the hacker mindset, which allows you to gain emergent insight into how attackers operate and better grasp the nature of the risks and threats in your environment. | Security |
The Age of Living Machines: How Biology Will Build the Next Technology Revolution by Susan Hockfield | The Age of Living Machines describes some of the most exciting new developments and the scientists and engineers who helped create them. Virus-built batteries. Protein-based water filters. Cancer-detecting nanoparticles. Mind-reading bionic limbs. Computer-engineered crops. | Emerging Tech |
Understand the Impact of AI in Industries and Assess Your Organizational AI Readiness | Artificial Intelligence | |
The greatest tool is the hardest to use. Machine learning is the world's most important general-purpose technology—but it's notoriously difficult to launch. Outside Big Tech and a handful of other leading companies, machine learning initiatives routinely fail to deploy, never realizing value. What's missing? | Machine Learning | |
Based on exclusive information from whistleblowers, internal documents, and real world test results, Emmy‑award winning Wall Street Journal contributor Hilke Schellmann delivers a shocking and illuminating expose on the next civil rights issue of our time: how AI has already taken over the workplace and shapes our future. | Artificial Intelligence | |
Today’s “machine-learning” systems, trained by data, are so effective that we’ve invited them to see and hear for us—and to make decisions on our behalf. But alarm bells are ringing. Recent years have seen an eruption of concern as the field of machine learning advances. When the systems we attempt to teach will not, in the end, do what we want or what we expect, ethical and potentially existential risks emerge. Researchers call this the alignment problem. | Machine Learning | |
The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage | Security | |
The Atomic Human: Understanding Ourselves in the Age of AI by Neil D. Lawrence | Neil D. Lawrence's visionary book shows why these fears may be misplaced. Atomism, proposed by Democritus, suggested it was impossible to continue dividing matter down into ever smaller components: eventually we reach a point where a cut cannot be made (the Greek for uncuttable is 'atom'). In the same way, by slicing away at the facets of human intelligence that can be replaced by machines, AI uncovers what is left: an indivisible core that is the essence of humanity. | AI |
The Atomic Human: What Makes Us Unique in the Age of AI by Neil D. Lawrence | The greatest fear of AI is not that it rules out digital lives but that it displaces human intelligence entirely. If artificial intelligence takes over decision-making what, then, is unique and irreplaceable about human intelligence? The Atomic Human is a journey of discovery to the core of what it is to be human, in search of the qualities that cannot be replaced by the machine. | AI |
The CIO Paradox: Battling the Contradictions of IT Leadership by Martha Heller | The successful management of information has become so critical to a company's goals, that in many ways, now is the age of the CIO. Yet IT executives are besieged by a host of contradictions: bad technology can bring a company to its knees, but corporate boards rarely employ CIOs; CIOs must keep costs down at the very same time that they drive innovation | Leadership |
An urgent warning of the unprecedented risks that AI and other fast-developing technologies pose to global order, and how we might contain them while we have the chance—from a co-founder of the pioneering artificial intelligence company DeepMind. | Artificial Intelligence | |
The Data-Centric Revolution: Restoring Sanity to Enterprise Information Systems by Dave McComb | This book is the first part of a trilogy to follow "Software Wasteland". In "Software Wasteland", we detailed the current poor state of application software development. | Information Systems |
In this book, we explore heuristics from a practical perspective. We | Data & Analytics | |
This book frames the big data problem from a business perspective. It focuses on how important economic concepts can help organizations exploit the new economic assets of data and analytics to fuel economic growth – assets that actually appreciate, not depreciate, in value the more that they are used. | Data Analytics | |
The Essential Cybersecurity Exercise Playbook by Lester Chng | If you take cyber readiness seriously,run your exercises and establish your program today. | Security |
The second part of the book is about what privacy is (and what it isn't): its relationship with the public/private divide, its definition, and its epistemology (how much does someone need to know about me, and with what degree of confidence, for me to lose privacy to them?). | Privacy | |
As a MacArthur fellow and distinguished professor of law at the University of Virginia, acclaimed civil rights advocate Danielle Citron has spent decades working with lawmakers and stakeholders across the globe to protect what she calls intimate privacy―encompassing our bodies, health, gender, and relationships. | Privacy | |
Gain the mindset, knowledge, and techniques to persuade with ease and motivate others to take action. Learn the importance emotions play in any presentation and how to deliver your message to resonate and make it highly memorable. Master a delivery style that is entertaining and keeps your audience's attention focused on your message | Leadership | |
The Future Is Faster Than You Think by Peter Diamandis & Steven Kotler | In this gripping and insightful roadmap to our near future, Diamandis and Kotler investigate how wave after wave of exponentially accelerating technologies will impact both our daily lives and society as a whole. | Tech Trends |
Workplace fear comes in many forms, including the fear of change, the fear of looking stupid, and the fear of working relationships, and in all cases these fears have deep roots that extend far below having to learn a new technology | Automation & Productivity | |
In light of this uncertainty, The Future Starts Now looks toward the various innovations and technologies that may shape our future. Authors Theo Priestley and Bronwyn Williams have brought together the world's leading futurists to articulate and clarify the current trajectories in technology, economics, politics and business. | Emerging Tech | |
“Burkov has undertaken a very useful but impossibly hard task in reducing all of machine learning to 100 pages. He succeeds well in choosing the topics — both theory and practice — that will be useful to practitioners, and for the reader who understands that this is the first 100 (or actually 150) pages you will read, not the last, provides a solid introduction to the field." | Machine Learning | |
The Internet Con: How to Seize the Means of Computation by Cory Doctorow | We can - we must - dismantle the tech platforms. In The Internet Con, Cory Doctorow explains how to seize the means of computation, by forcing Silicon Valley to do the thing it fears most: interoperate. Interoperability will tear down the walls between technologies, allowing users leave platforms, remix their media, and reconfigure their devices without corporate permission. | Tech for Good |
Those who give it careful consideration will never see the Web the same way again. | Internet | |
The Pentester BluePrint: Starting a Career as an Ethical Hacker by Phillip L. Wylie, Kim Crawley | Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. | Security |
The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. | Privacy & Security | |
The Rise of Skeleton Marketing: How AI is Revolutionizing the Marketing Industry by Jeff Locke | From the death of traditional marketing roles to the birth of AI-powered marketing and the future of marketing departments, this ebook offers insights and strategies for professionals looking to adapt to the changing landscape. | AI/Marketing Tech |
A CISO’s Guide to a Robust Employment Agreement, Employment Risks, and Technology Risk Governance | Security | |
The Singularity is Nearer: When We Merge with AI by by Ray Kurzweil | By the end of this decade, AI will exceed human levels of intelligence. During the 2030s, it will become ‘superintelligent’, vastly outstripping our capabilities and enabling dramatic interventions in our bodies. By 2045, we will be able to connect our brains directly with AI, enhancing our intelligence a millionfold and expanding our consciousness in ways we can barely imagine. This is the Singularity. | AI |
The Singularity of Hope: Humanity's Role in an AI-Dominated Future by Sam Sammane | In The Singularity of Hope, author Sam Sammane strikes this crucial middle ground. Instead of getting caught up in fanatical claims or hyperfocusing on visions of AI-induced doom, Sam turns the focus back to us, the people behind the machines. He offers a hopeful vision of a future where AI empowers, invigorates and emboldens humanity. | AI/Humanity |
With his seven-step methodology and stories from the field, Christian helps you develop your team’s technical minds so they become better humans and strong leaders who excel in every role. | Security | |
The Sound of the Future: The Coming Age of Voice Technology by Tobias Dengel | Voice is the next technology - remarkably similar in potential impact to the internet and mobile computing - poised to change the way the world works. Tobias Dengel is in the vanguard of this breakthrough, understanding the deep, wide-ranging implications voice will have for every industry. | Voice Technology |
The Ultimate Job Search Companion: Strategies for a Changing Market by Angie Callen | As a multi-award-winning coach, Angie has been recognized globally for her commitment to her clients, an ethos she has weaved deeply into Career Bender’s culture and approach to career development coaching. | Tech Jobs |
Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.. | Security | |
Drawing on her experience with hundreds of CIOs, Nunno charts a viable way to master the Machiavellian principles of power, manipulation, love, and war. Through compelling case studies, her approach demonstrates how CIOs and IT leaders can adjust their leadership styles in extreme situations for their own success and that of their teams. | Leadership | |
The Worlds I See: Curiosity, Exploration, and Discovery at the Dawn of AI by Fei-Fei Li | The Worlds I See is a story of science in the first person, documenting one of the century’s defining moments from the inside. It provides a riveting story of a scientist at work and a thrillingly clear explanation of what artificial intelligence actually is―and how it came to be. Emotionally raw and intellectually uncompromising, this book is a testament not only to the passion required for even the most technical scholarship but also to the curiosity forever at its heart. | Artificial Intelligence |
The primary theme of this book is that adhering to basic security building blocks creates a strong foundation for cyber resilience.The idea is to share our learnings in small accessible and practical chunks. | Privacy & Security | |
Toward a Post-Digital Society: Where Digital Evolution Meets People’s Revolution by Antonio Grasso | Embark on a thought-provoking journey with "Toward a Post-Digital Society - Where Digital Evolution Meets People's Revolution," a book that delves deep into the interplay between cutting-edge tech advancements and the evolving dynamics of our societies, with a nuanced exploration of how these advancements reshape the fabric of our daily lives, economies, and ethical frameworks. | Emerging Tech |
Truth from the Trenches: A Practical Guide to the Art of It Management by Mark Settle | Settle describes the key constituencies that an IT leader needs to influence, seduce, leverage, and manage to be successful. | IT Management |
Truth from the Valley: A Practical Primer on IT Management for the Next Decade by Mark Settle | Truth from the Valley describes the organizational challenges confronting Silicon Valley IT teams and proposes ways of transforming such challenges into organizational opportunities | IT Management |
This book examines different types of cyber attackers, explores their motivations and examines the methods used. It also reviews key industry developments such as cybercrime as a service, brokers and syndicates, nation-sponsored actors, insider sabotage and the challenges faced by law enforcement in tracking and apprehending attackers. | Security | |
But ignoring these technologies can be even worse, as this can mean failing to capitalise on the next great step in innovation. From cryptocurrencies, blockchain, the metaverse, Web3, and NFTs, to self-driving vehicles, delivery drones, solid state batteries, eVTOLs, and more, technology bubbles have been inflating and popping for many years. Each time a bubble pops, tens if not hundreds of billions of investment dollars disappear with them | Emerging Tech | |
Unmasking AI: My Mission to Protect What is Human in a World of Machines By Joy Buolamwini | "I take you behind the scenes to the moments of doubt, the defeats, and the ongoing work of challenging tech companies, governments, and AI researchers to create more ethical and accountable AI systems." | Artificial Intelligence |
Unwritten Laws of Engineering by by James G. Skakoon and original by W. J. King | It addresses three areas: what the beginner needs to learn at once; "laws" relating chiefly to engineering executives; and purely personal considerations for engineers. | Engineering |
Vital Foresight - The Case for Active Transhumanism by David W. Wood | Oncoming waves of technological change are poised to deliver either global destruction or a paradise-like sustainable superabundance, with the outcome depending on the timely elevation of transhumanist vision, transhumanist politics, and transhumanist education. | Artifical Intelligence |
Tracing the arc of a person’s life, O’Neil exposes the black box models that shape our future, both as individuals and as a society. These “weapons of math destruction” score teachers and students, sort résumés, grant (or deny) loans, evaluate workers, target voters, set parole, and monitor our health. | Data & Analytics | |
What Is ChatGPT Doing ... and Why Does It Work? by Stephen Wolfram | Find out how the success of ChatGPT brings together the latest neural net technology with foundational questions about language and human thought posed by Aristotle more than two thousand years ago. | ChatGPT |
A thought-provoking and business-focused look at problems and missed opportunities within the field and practice of Information Security for business and security leaders alike. | Security | |
For thousands of years, customers have been individual humans, families or organizations. But soon, generative AI enabled software and hardware machines will start to act as customers. First they will shop for us, later they will act for themselves. You can’t take them to dinner, and they won’t fall for your slogans, but they might help grow your market – if you know how. | Artificial Intelligence | |
If we want to build a digital society that is consistent with our hard-won commitments to political freedom, individuality, and human | Privacy | |
Your Face Belongs to Us: A Secretive Startup's Quest to End Privacy as We Know It by Kashmir Hill | The story of a small AI company that gave facial recognition to law enforcement, billionaires, and businesses, threatening to end privacy as we know it. | Privacy |
In this deeply insightful Itty Bitty Book, John Bates shows you how to use the powerful principles he teaches to TED and TEDx speakers, the NASA astronauts, top executives, and other leaders around the world.You will:•Discover the incredible power of mirror neurons as applied to public speaking and leadership. | Leadership | |
Zero Trust Networks: Building Secure Systems in Untrusted Networks by Evan Gilman, Doug Barth | Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You’ll learn the architecture of a zero trust network, including how to build one using currently available technology. | Security |