Today could be the day that you start a whole year of unlimited reading!
Add this book to bookshelf
Grey 902feb64d8b6d481ab8ddda06fbebbba4c95dfa9b7936a7beeb197266cd8b846
Write a new comment Default profile 50px
Grey 902feb64d8b6d481ab8ddda06fbebbba4c95dfa9b7936a7beeb197266cd8b846
Read online the first chapters of this book!
All characters reduced 7236434c7af12f85357591f712aa5cce47c3d377e8addfc98f989c55a4ef4ca5
Philosophy of Physics - Quantum Theory - cover

Philosophy of Physics - Quantum Theory

Tim Maudlin

Publisher: Princeton University Press

  • 0
  • 0
  • 0

Summary

A sophisticated and original introduction to the philosophy of quantum mechanics from one of the world’s leading philosophers of physics 
In this book, Tim Maudlin, one of the world’s leading philosophers of physics, offers a sophisticated, original introduction to the philosophy of quantum mechanics. The briefest, clearest, and most refined account of his influential approach to the subject, the book will be invaluable to all students of philosophy and physics. 
Quantum mechanics holds a unique place in the history of physics. It has produced the most accurate predictions of any scientific theory, but, more astonishing, there has never been any agreement about what the theory implies about physical reality. Maudlin argues that the very term “quantum theory” is a misnomer. A proper physical theory should clearly describe what is there and what it does—yet standard textbooks present quantum mechanics as a predictive recipe in search of a physical theory. 
In contrast, Maudlin explores three proper theories that recover the quantum predictions: the indeterministic wavefunction collapse theory of Ghirardi, Rimini, and Weber; the deterministic particle theory of deBroglie and Bohm; and the conceptually challenging Many Worlds theory of Everett. Each offers a radically different proposal for the nature of physical reality, but Maudlin shows that none of them are what they are generally taken to be.

Other books that might interest you

  • 30-Second Psychology - The 50 Most Thought-provoking Psychology Theories Each Explained in Half a Minute - cover

    30-Second Psychology - The 50...

    Christian Jarrett

    • 4
    • 5
    • 0
    The key ideas in Psychology explained, with colour illustrations, in half a minute. Pavlov's Dogs, Psychoanalysis, Milgram's Obedience Study, and Beck's Cognitive Therapy? Sure, you know what they all mean. That is, you've certainly heard of them. But do you know enough about these psychology theories to join a dinner party debate or dazzle the bar with your knowledge? 30-Second Psychology takes the top 50 strands of thinking in this fascinating field, and explains them to the general reader in half a minute, using nothing more than two pages, 300 words, and one picture. The inner workings of the human mind will suddenly seem a lot more fun, and along the way we meet many of the luminaries in the field, including William James, Aaron Beck, and (of course) Sigmund Freud. From Behaviorism to Cognitivism, what better way to get a handle on your inner demons?
    Show book
  • Hacking: Learn the Basics of Ethical Hacking and Penetration Testing - cover

    Hacking: Learn the Basics of...

    Martin Donovan

    • 0
    • 1
    • 0
    If you’ve ever read about computer hacking, you might be surprised to learn that companies actually pay people to try to hack into their systems. It’s called “ethical hacking”. Should you decide to learn to conduct ethical hacking, you will be responsible for helping organizations to protect their assets and information systems from malicious hackers, who would like to take advantage of any information they can get their hands on. It’s quite an interesting field of work, learning to legally hack into the systems of organizations like utility companies, banks and even government agencies. You will use the same skills as malicious hackers, but you will be using them for a much nobler purpose. Instead of trying to rip companies off, or steal secrets, you will be reporting the problems in their systems, so that they can repair them. Ethical hacking pays well, and it can easily be a full time job. Courses are available in various locations. You can research courses online and register for classes that will qualify you to be a certified ethical hacker. 
    Here is what you will learn after reading this book: 
    White hat hacking versus black hat and gray hat hacking 
    How to hack into computer systems 
    Reporting vulnerabilities to business management 
    Becoming CEH certified as an ethical hacker 
    Performing penetration testing 
    Helping IT management to protect their sensitive information
    Show book
  • Hacking for Beginners: 48 Things Every Hacker Must Know About How to Hack - cover

    Hacking for Beginners: 48 Things...

    Daniel James

    • 0
    • 2
    • 0
    Hacking. An art, curse, piece of knowledge, illegality, business or an insatiable thirst for power and money? How can a word represent all that and much more? How can a notion become so synonymous to politics and power that they both are afraid of it? All these questions and their responses are inductive enough to have a great number of young people caught up every year in trying to learn the intricacies of the trade and become hackers. Some of them attempt to enter this world attempting to do everything on their own without telling anyone or asking anyone’s advice or guidance. In 99.99% of the cases they either give it up after a few failed attempts, or they do something incredibly wrong that secures for them a place in jail. It is not a recommended option to try something as extreme as hacking without first acquiring some insights about it. This is the purpose behind “Hacking for Beginners: 48 things every hacker must know about how to hack”. To present an informative and educational list of the various issues involved at the beginning of someone’s journey into the world of hacking. However, the most important issue addressed is knowledge. Out of all the above, hacking is all about and requires a lot of knowledge. And it is a most important issue to learn where to look for, how to acquire and what to do with it. Because in the end, a hacker that does what he or she does for the sake of knowledge, is worthy of respect and recognition. 
    Here is what you will learn after reading this book: 
    - The background 
    - Self Protection 
    - TCP/IP 
    - First Steps 
    - Cracking Password 
    - Things to keep in mind 
    - The database of Hacking resources
    Show book
  • Mathapalooza - A Collection of Math Poetry for Primary and Intermediate Students - cover

    Mathapalooza - A Collection of...

    Franny Vergo

    • 0
    • 1
    • 0
    Mathapalooza is a collection of math poetry for grades one through five. Each rhyming poem has a catchy title and focuses on a specific math topic. Children in the primary and intermediate grades will enjoy reading these fun poems, while simultaneously improving their math vocabulary and content. Author Franny Vergo sparks a love for math in young children with her creative and intriguing math poetry.
    Show book
  • The Book of Numbers - cover

    The Book of Numbers

    Tim Glynne Jones

    • 0
    • 1
    • 0
    From zero to infinity, The Book of Numbers is a handy-sized volume which opens up a new realm of knowledge. Where else in one place could you find out how the illegal numbers racket worked, what makes some people see numbers as colours, why the standard US rail gauge exactly matches the axle width of an ancient Roman chariot, and the numerological connection between Adolf Hitler and Osama Bin Laden?
    Show book
  • Endangered Orcas - The Story of the Southern Residents - cover

    Endangered Orcas - The Story of...

    Monika Wieland Shields

    • 0
    • 1
    • 0
    The Southern Resident killer whales are icons of the Pacific Northwest, a beloved population of orcas that are considered the most-watched whales in the world. Despite decades of research and focused conservation efforts, they are on the brink of extinction. 
    Each year J-, K-, and L-Pods return to the inland waters of Washington State and British Columbia, a region known as the Salish Sea, where scientists and whale watchers alike know them as individuals. J2 Granny lost relatives to captivity but went on to lead her family for decades. The controversial satellite tagging of K25 Scoter reshaped orca conservation efforts. L112 Sooke was only three years old when she washed up dead from blunt force trauma to the head on the outer coast, a death shrouded in mystery. 
    From the capture era and the beginning of killer whale research to the whale-watching boom and endangered listing, the whole story of the Southern Residents is told here. Our relationship to these whales, complicated by both the positive attachments and negative politics we have created around them, has changed dramatically over the last 50 years. With more challenges on the horizon, one question looms: can we still create a sustainable future for humans and orcas in the Salish Sea?
    Show book