Amazon Price: $17.99 $12.32 You save: $5.67 (32%). (as of May 23, 2017 02:21 –
Part how-to, part girl-empowerment, and all fun, from the leader of the movement championed by Sheryl Sandberg, Jack Dorsey, and other giants of tech.
Since 2012, the organization Girls Who Code has taught computing skills to and inspired over 10,000 girls across America. Now its founder, Reshma Saujani, wants to inspire you to be a girl who codes! Bursting with dynamic artwork, down-to-earth explanations of coding principles, and real-life stories of girls and women working at places like Pixar and NASA, this graphically animated book shows what a huge role computer science plays in our lives and how much fun it can be. No matter your interest—sports, the arts, baking, student government, social justice—coding can help you do what you love and make your dreams come true. Whether you’re a girl who’s never coded before, a girl who codes, or a parent raising one, this entertaining book, printed in bold two-color and featuring art on every page, will have you itching to create your own apps, games, and robots to make the world a better place.
Amazon Price: N/A (as of May 22, 2017 15:31 –
Following his blockbuster biography of Steve Jobs, Walter Isaacson’s New York Times bestselling and critically acclaimed The Innovators is a “riveting, propulsive, and at times deeply moving” (The Atlantic) story of the people who created the computer and the Internet.
What were the talents that allowed certain inventors and entrepreneurs to turn their visionary ideas into disruptive realities? What led to their creative leaps? Why did some succeed and others fail?
Amazon Price: N/A (as of May 23, 2017 06:16 –
How do criminals continue to use computers for illegitimate purposes? Are current forensics tools good enough? Explore the ways in which it may be easy for criminals to take advantage of computer technology for criminals purposes and the challenges that computer forensics experts face in today's technically savvy world and bringing criminals to justice. This book is intended for people that work in the computer forensics field that wish to extend their knowledge, computer students or just people with an interest in computer forensics. The results have been derived mainly from primary research via testing in a lab, some secondary research has also been used, however the results are quite surprising. This project was concluded in April 2013 and is based around how data can be hidden in the firmware of a computer and recovered for use in a court of law and the problems associated with it, read the book to find out more……..