National Weather Service Glossary
The National Weather Service glossary contains information on more than 2000 terms, phrases and abbreviations used by the NWS.
National Weather Service Glossary Read MoreSources including books, reports, documentaries, films, videos, images and other visual media.
The National Weather Service glossary contains information on more than 2000 terms, phrases and abbreviations used by the NWS.
National Weather Service Glossary Read More“This is a starter kit for good design. It is intended to be enjoyable and informative for everyone: everyday people, technical people, designers, and nondesigners.”
The Design of Everyday Things Read MoreWhy do nations break into one another’s most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn’t the full story.
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations Read MoreAfter discovering that a history of keyboards— from typewriters to iPhones—had yet to be written, designer and typographer Marcin Wichary got to work.
Shift happens: Writing about the history of keyboards Read MoreA real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time.
The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime Read MoreThe Wasatch Backcountry Skiing Map is a full-color paper map that compliments the website, Android app, and iOS app. The map includes the names of almost 1,000 backcountry locations in the Central Wasatch.
Wasatch Backcountry Skiing Map, 4th Ed. Read MoreWatch our (home) movie: Trillions of Questions, No Easy Answers
Trillions of Questions, No Easy Answers: A (home) movie about how Google Search works Read MoreThe pixel as the organizing principle of all pictures, from cave paintings to Toy Story.
A Biography of the Pixel Read MoreThe people who are crazy enough to think they can change the world are the ones who do. —Apple’s “Think Different” commercial, 1997.
Steve Jobs Read MoreThe page-turning inside story of the global team wielding the internet to fight for facts and combat autocracy-revealing the extraordinary ability of ordinary people to hold the powerful to account.
We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News Read More“The most interesting book ever written about Google” (The Washington Post) delivers the inside story behind the most successful and admired technology company of our time, now updated with a new Afterword.
In the Plex: How Google Thinks, Works, and Shapes Our Lives Read MoreThe data detectives at Bellingcat showed 60 Minutes how social media is providing evidence of alleged Russian war crimes and other atrocities.
How Bellingcat is using TikTok to investigate the war in Ukraine Read MoreIn Bounty Everything: Hackers and the Making of the Global Bug Marketplace, researchers Ryan Ellis and Yuan Stevens provide a window into the working lives of hackers who participate in “bug bounty” programs—programs that hire hackers to discover and report bugs or other vulnerabilities in their systems.
Bounty Everything: Hackers and the Making of the Global Bug Marketplace Read MoreThe computer and the Internet are among the most important inventions of our era, but few people know who created them. There were a lot of fascinating people involved, some ingenious and a few even geniuses. This is the story of these pioneers, hackers, inventors, and entrepreneurs—who they were, how their minds worked, and what made them so creative. It’s also a narrative of how they collaborated and why their ability to work as teams made them even more creative.
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Read MoreAn astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?
The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage Read MoreHow the computer became universal.
A New History of Modern Computing Read MoreA top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon Read MoreLevy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as “the hacker ethic,” that still thrives today.
Hackers: Heroes of the Computer Revolution Read MoreKnowledge is powerful. This report encompasses learnings from security experts, practitioners, and defenders at Microsoft to empower people everywhere to defend against cyberthreats.
Microsoft Digital Defense Report (2021) Read More