Amazon Price: $27.99 $27.99 (as of June 21, 2018 07:59 –
This is a book about hacking, but not just any kind of hacking. It is about mathematical hacking, or scientific computing. If you like math and want to use computers to do math or solve mathematical problems, then this book is the for you.
This is version 3, which includes over 80 additional pages, with extensive additions on Python classes, iPython with jupyter notebooks, magic functions, random numbers, and probability and statistics. The emphasis throughout the text is on programming in the iPython notebook. Version 3.0.3 (2017) is revised and corrected.
Continue reading “Scientific Computation: Python Hacking for Math Junkies”
Amazon Price: $100.00 $21.64 You save: $78.36 (78%). (as of June 21, 2018 09:48 –
Al-Rodhan sheds new light on the debate about the geopolitics of outer space, going beyond applying traditional International Relations approaches to space power and security by introducing a multidimensional spatial framework. The meta-geopolitics framework includes space and expands classical power considerations to cover seven state capacities.
Amazon Price: N/A (as of June 21, 2018 06:20 –
This is official Amazon Web Services (AWS) documentation for Amazon Redshift.
Amazon Redshift is a fast, fully managed, petabyte-scale data warehouse service that makes it simple and cost-effective to efficiently analyze all your data using your existing business intelligence tools. It is optimized for datasets ranging from a few hundred gigabytes to a petabyte or more and costs less than $1,000 per terabyte per year, a tenth the cost of most.
Amazon Price: $34.95 $34.35 You save: $0.60 (2%). (as of June 21, 2018 03:47 –
Cyber weapons and the possibility of cyber conflict ― including interference in foreign political campaigns, industrial sabotage, attacks on infrastructure, and combined military campaigns ― require policymakers, scholars, and citizens to rethink twenty-first-century warfare. Yet because cyber capabilities are so new and continually developing, there is little agreement about how they will be deployed, how effective they can be, and how they can be managed.
Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems. The chapters are divided into three groups. The first ― What Are Cyber Weapons Like? ― examines the characteristics of cyber capabilities and how their use for intelligence gathering, signaling, and precision striking compares with earlier technologies for such missions. The second section ― What Might Cyber Wars Be Like? ― explores how lessons from several wars since the early nineteenth century, including the World Wars, could apply ― or not ― to cyber conflict in the twenty-first century. The final section ― What Is Preventing and/or Managing Cyber Conflict Like? ― offers lessons from past cases of managing threatening actors and technologies.