SQL Notes for Professionals
The SQL Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Fractional Graph Theory
A unified treatment of the most important results in the study of fractional graph concepts, this volume explores the various ways in which integer-valued concepts can be modified to derive nonintegral values. It begins with the general fractional theory of hypergraphs and presents in-depth coverage of fundamental and advanced topics. Subjects incl...
PicoLisp Works
PicoLisp Works is a compilation of (almost) all available information about the technological gem PicoLisp - a programming language and environment that definitely deserves wider attention. Built on the unique characteristics of Lisp (almost no syntax, code is equivalent to data), PicoLisp combines powerful abstractions with simplicity and purit...
Go Succinctly
The Go programming language is relatively small and concise, but its depth makes it an ideal option for solving modern-day development problems. In Go Succinctly, author Mark Lewin guides readers through the basics of Go, and he provides documentation and resources that allow users to dive into the language and learn it for themselves. By the end o...
Human Physiology
Physiology - The word physiology is from the Ancient Greek (phusiologĂ­a) and it is the study of how organisms perform their vital functions. An example is the study of how a muscle contracts or the force contracting muscles exert on the skeleton. It was introduced by French physician Jean Fernery in 1552. Physiology is built upon a tripod of scien...
Spring Framework Notes for Professionals
The Spring Framework Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Chronicles from Kashmir
Chronicles from Kashmir explores this question through a site-adaptive 24-hour theatrical performance. Developed between 2013 and 2018 by the Ensemble Kashmir Theatre Akademi and Nandita Dinesh, the play uses a durational, promenade format to immerse its audience within a multitude of perspectives on life in Kashmir. From a wedding celebration that...
Java Succinctly Part 2
In this second e-book on Java, Christopher Rose takes readers through some of the more advanced features of the language. Java Succinctly Part 2 explores powerful and practical features of Java, such as multithreading, building GUI applications, and 2-D graphics and game programming. Then learn techniques for using these mechanisms in coherent proj...
Java Succinctly Part 1
Java is a high-level, cross-platform, object-oriented programming language that allows applications to be written once and run on a multitude of different devices. Java applications are ubiquitous, and the language is consistently ranked as one of the most popular and dominant in the world. Christopher Rose's Java Succinctly Part 1 describes the fo...
Narratives of Memory, Migration, and Xenophobia in the European Union and Canada
"Narratives of Memory, Migration, and Xenophobia in the European Union and Canada" explores the role of memory and narratives of the past political tools and opportunities for cultural reconciliation. This is an edited volume that compiles the proceedings of an interdisciplinary conference and graduate field school that took place in the ...
Ruby on Rails Notes for Professionals
The Ruby on Rails Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
The Coder's Apprentice
The Coder's Apprentice is a course book, written by Pieter Spronck, that is aimed at teaching Python 3 to students and teenagers who are completely new to programming. Contrary to many of the other books that teach Python programming, this book assumes no previous knowledge of programming on the part of the students, and contains numerous exercises...
Go Web Development Succinctly
Go is a modern programming language built to deal with modern programming challenges, such as concurrency and compilation. Designed specifically with the web in mind, Go is an excellent language for writing web applications, specifically for web services. In his second book on Go, Mark Lewin will take you through serving, routing, connecting to a d...
GNU GREP and RIPGREP
The book heavily leans on examples to present features of grep as well as regular expressions one by one. It is recommended that you manually type each example and experiment with them. Understanding both the nature of sample input string and the output produced is essential. You should have prior experience working with command line and bash sh...
Sailing from Polis to Empire
What can the architecture of ancient ships tell us about their capacity to carry cargo or to navigate certain trade routes? How do such insights inform our knowledge of the ancient economies that depended on maritime trade across the Mediterranean? These and similar questions lie behind Sailing from Polis to Empire, a fascinating insight into th...
Introduction to Data Science
The demand for skilled data science practitioners in industry, academia, and government is rapidly growing. This book introduces concepts and skills that can help you tackle real-world data analysis challenges. It covers concepts from probability, statistical inference, linear regression and machine learning. It also helps you develop skills such a...
Swift Notes for Professionals
The Swift Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Software Innovation
Innovation is the forgotten key to modern systems development - the element that defines the enterprising engineer, the thriving software firm and the cutting edge software application. Traditional forms of technical education pay little attention to creativity - often encouraging overly rationalistic ways of thinking which stifle the ability to in...
Epidemics and the Health of African Nations
Researchers and practitioners from within the continent explore why Africa is so vulnerable to disease, and show how this vulnerability is closely linked to political and economic factors. They demonstrate how these same factors determine the way epidemics are treated. Authors extract lessons from case studies in different parts of Africa; chall...
The Security Development Lifecycle
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...
Foundations of Behavioral Health
This comprehensive book examines the organization, financing, delivery, and outcomes of behavioral health (i.e., alcohol, drug abuse, and mental health) services from both U.S. and global perspectives. Addressing the need for more integrative and collaborative approaches in public health and behavioral health initiatives, the book covers the fundam...
Programming Persistent Memory
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times - a huge leap forward in byte-addressable capacity compar...
Creative Multilingualism
Multilingualism is integral to the human condition. Hinging on the concept of Creative Multilingualism - the idea that language diversity and creativity are mutually enriching - this timely and thought-provoking volume shows how the concept provides a matrix for experimentation with ideas, approaches and methods. The book presents four years of ...
The Entrepreneurial Society
This book is an outcome of the EU's Horizon 2020 project 'Financial and Institutional Reforms for an Entrepreneurial Society' (FIRES). Building on historical, economic and legal analysis, and combining methods and data across disciplines, the authors provide policymakers, stakeholders and scholars with valuable new tools for assessing and improving...
Statistical Population Genomics
This open access volume presents state-of-the-art inference methods in population genomics, focusing on data analysis based on rigorous statistical techniques. After introducing general concepts related to the biology of genomes and their evolution, the book covers state-of-the-art methods for the analysis of genomes in populations, including demog...
Managing Socio-ecological Production Landscapes and Seascapes for Sustainable Communities in Asia
This free book presents up-to-date analyses of community-based approaches to sustainable resource management of SEPLS (socio-ecological production landscapes and seascapes) in areas where a harmonious relationship between the natural environment and the people who inhabit it is essential to ensure community and environmental well-being as well as t...
Boundary Value Problems, Weyl Functions, and Differential Operators
This book presents a comprehensive survey of modern operator techniques for boundary value problems and spectral theory, employing abstract boundary mappings and Weyl functions. It includes self-contained treatments of the extension theory of symmetric operators and relations, spectral characterizations of selfadjoint operators in terms of the anal...
An Invitation to Statistics in Wasserstein Space
This open access book presents the key aspects of statistics in Wasserstein spaces, i.e. statistics in the space of probability measures when endowed with the geometry of optimal transportation. Further to reviewing state-of-the-art aspects, it also provides an accessible introduction to the fundamentals of this current topic, as well as an overvie...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Biological Invasions in South Africa
This open access volume presents a comprehensive account of all aspects of biological invasions in South Africa, where research has been conducted over more than three decades, and where bold initiatives have been implemented in attempts to control invasions and to reduce their ecological, economic and social effects. It covers a broad range of the...
The JavaScript Way
Love it or hate it, JavaScript is avidly eating the world of software development. From web sites and apps to servers, smartphones and connected objects, JavaScript is everywhere. It has evolved from a niche scripting tool crafted in a few days into a modern, multi-purpose language sitting on top of a rich ecosystem and a vibrant developer communit...
Narrating China's Governance
This open access book captures and elaborates on the skill of storytelling as one of the distinct leadership features of Xi Jinping, the General Secretary of the Communist Party of China and the President of the People's Republic of China. It gathers the stories included in Xi's speeches on various occasions, where they conveyed the essence of Chin...