Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Intermediate Financial Accounting Volume 1
Intermediate Financial Accounting Volume 1 developed in collaboration by Athabasca University and Lyryx, is intended for a first course in Intermediate Financial Accounting, and presumes that students have already completed one or two Introductory Financial Accounting courses. The textbook reflects current International Financial Reporting Standard...
Intermediate Financial Accounting Volume 2
Intermediate Financial Accounting Volume 2 developed in collaboration by Athabasca University and Lyryx, is intended for the second of two in Intermediate Financial Accounting courses. It presumes that students have already completed the Introductory Financial Accounting, and the first Intermediate Financing Accounting course. The textbook reflects...
Hadoop for Windows Succinctly
Author Dave Vickers provides a thorough guide to using Hadoop directly on Windows operating systems. From a conceptual overview to practical examples, Hadoop for Windows Succinctly is a valuable resource for developers....
Python Machine Learning Projects
As machine learning is increasingly leveraged to find patterns, conduct analysis, and make decisions - sometimes without final input from humans who may be impacted by these findings - it is crucial to invest in bringing more stakeholders into the fold. This book of Python projects in machine learning tries to do just that: to equip the developers ...
The Little MongoDB Book
Karl Seguin is a developer with experience across various fields and technologies. He's an expert .NET and Ruby developer. He's a semi-active contributor to OSS projects, a technical writer and an occasional speaker. With respect to MongoDB, he was a core contributor to the C# MongoDB library NoRM, wrote the interactive tutorial mongly as...
PHPUnit Manual
PHPUnit is a unit testing framework for the PHP programming language. Manual edition for PHPUnit 9.1....
Margery Spring Rice
This book vividly presents the story of Margery Spring Rice, an instrumental figure in the movements of women's health and family planning in the first half of the twentieth century. Margery Spring Rice, née Garrett, was born into a family of formidable female trailblazers - niece of physician and suffragist Elizabeth Garrett Anderson, and of...
The Piracy Crusade
In the decade and a half since Napster first emerged, forever changing the face of digital culture, the claim that "internet pirates killed the music industry" has become so ubiquitous that it is treated as common knowledge. Piracy is a scourge on legitimate businesses and hard-working artists, we are told, a "cybercrime" simila...
Rider Succinctly
Rider is the new .NET-centric IDE from JetBrains. In Rider Succinctly, author Dmitri Nesteruk introduces it to developers and provides an overview on its origins, functions, and features. With this ebook, readers will be ready to begin developing using Rider....
Keras Succinctly
Neural networks are a powerful tool for developers, but harnessing them can be a challenge. With Keras Succinctly, author James McCaffrey introduces Keras, an open-source, neural network library designed specifically to make working with backend neural network tools easier....
Azure Functions Succinctly
Azure Functions is a new service available in Microsoft Azure to help developers run code on serverless architectures. In essence, Azure Functions is about events and code - developers write some code that will be executed upon some triggering event - but what sets Azure Functions apart is its simplicity. Developers can write just the code they nee...
3D Game Development with LWJGL 3
This book will introduce the main concepts required to write a 3D game using the LWJGL 3 library. LWJGL is a Java library that provides access to native APIs used in the development of graphics (OpenGL), audio (OpenAL) and parallel computing (OpenCL) applications. This library leverages the high performance of native OpenGL applications while us...
Effective AWK Programming
When processing text files, the awk language is ideal for handling data extraction, reporting, and data-reformatting jobs. This practical guide serves as both a reference and tutorial for POSIX-standard awk and for the GNU implementation, called gawk. This book is useful for novices and awk experts alike. In this thoroughly revised 5th edition, ...
Achieving Viability for Public Service Media in Challenging Settings
In the face of challenges posed by a shifting digital media landscape, an array of international bodies continue to endorse public service media (PSM) as an essential component of democratisation. Yet how can PSM achieve viability in settings where models of media independence and credibility are unfamiliar or rejected by political leaders? The ...
Network Sense
In this offers a methodological response to recent efforts by scholars in rhetoric and composition/writing studies to account for patterns indicative of the discipline's maturation. Influenced by work on distant reading and thin description, this monograph attends to forms of knowledge newly available via computationally mined, aggregated data...
MonoGame Succinctly
Video games are a massive market, but reaching an audience requires supporting many platforms. MonoGame offers a near-complete implementation of XNA 4 that makes it possible to develop games for iOS, Android, Mac OS X, Linux, Windows, PlayStation Vita, Xbox One, and PlayStation 4. In MonoGame Succinctly, author Jim Perry offers an introduction to M...
Introduction to CNTK Succinctly
Microsoft CNTK (Cognitive Toolkit, formerly Computational Network Toolkit), an open source code framework, enables you to create feed-forward neural network time series prediction systems, convolutional neural network image classifiers, and other deep learning systems. In Introduction to CNTK Succinctly, author James McCaffrey offers instruction on...
Coffee Break Python Slicing
Puzzle-based learning is an active learning technique. With code puzzles, you will learn faster, smarter, and better. Coffee Break Python Slicing is all about growing your Python expertise - one coffee at a time. The focus lies on the important slicing technique to access consecutive data ranges. Understanding slicing thoroughly is crucial for y...
Tensorflow 2 Tutorial
TensorFlow is a free and open-source software library for machine learning. It can be used across a range of tasks but has a particular focus on training and inference of deep neural networks. This book is a somewhat intermediate-level introduction to Tensorflow 2. We will eventually cover everything tf.keras, but no so fast until we implemented t...
The Basics of User Experience Design
If you're looking to gain an introduction into the world of user experience (UX) design - or maybe even freshen up your knowledge of the field - then this UX design book is the ideal place to start. You'll cover a wide range of topics over nine highly readable chapters, with each one acting as a mini crash course. By the end, you'...
Peace and Democratic Society
Recent acts of terrorism and the current unrest in the Middle East remind us how important it is to understand the relationship between violence, peace and democracy. In a challenging and insightful essay, Amartya Sen explores ideas around 'organised violence' (such as war, genocide and terrorism) and violence against the individual. High...
Open Education
This insightful collection of essays explores the ways in which open education can democratise access to education for all. It is a rich resource that offers both research and case studies to relate the application of open technologies and approaches in education settings around the world. Global in perspective, this book argues strongly for the...
Access Denied
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries. Many countries around the world block or filter Internet content, denying access to information that they deem too sensitive for ordinary citizens - most often about politics, b...
Access Controlled
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
Consumer Data Research
Big Data collected by customer-facing organisations - such as smartphone logs, store loyalty card transactions, smart travel tickets, social media posts, or smart energy meter readings - account for most of the data collected about citizens today. As a result, they are transforming the practice of social science. Consumer Big Data are distinct from...
Mobile Research Methods
Daily activity sees data constantly flowing through cameras, the internet, satellites, radio frequencies, sensors, private appliances, cars, smartphones, tablets and the like. Among all the tools currently used, mobile devices, especially mobile phones, smartphones and tablets, are the most widespread, with their use becoming prevalent in everyday ...
Project Management Skills for All Careers
Project Management Skills for All Careers offers a framework for managing projects in any career area. The concepts can be applied no matter where you work. As a matter of fact, many of our dislocated workers are trained to become certified in Project Management. Project management skills are essential and invaluable for anyone who initiates or is ...
Confessions of an IT Manager
From IT projects that have trampled all over the guiding principles of successful development, to tips on training your manager to the required standard, each of Phil's tales is shot through with a wild seam of anarchic humour. And yet, in each case, the humor is just a sugar coating for a pill of sage advice, wrought from years of rough-and-t...
Working with a Personal Assistant
A truly effective assistant knows their manager's priorities, concerns and responsibilities as well as they do themselves. They know how to make their manager more effective, and how to help them add value. They work alongside their manager as part of a tight-knit, high-functioning team, sharing a single purpose and workload. Of all teams, of ...
Information ­technology ­project managers' ­competencies
The purpose of this book is to shed light on the performance and personal competencies of information technology (IT) project managers in South Africa. Predictive models are built to determine what project managers consider the crucial competencies they should possess to deliver an IT project successfully. This investigation takes place in the cont...
Mind Hacking
Have you ever wished you could reprogram your brain, just as a hacker would a computer? In this 3-step guide to improving your mental habits, learn to take charge of your mind and banish negative thoughts, habits, and anxiety - in just 21 days! A seasoned author, comedian, and entrepreneur, Sir John Hargrave once suffered from unhealthy addictio...
Happiness and Utility
Happiness and Utility brings together experts on utilitarianism to explore the concept of happiness within the utilitarian tradition, situating it in earlier eighteenth-century thinkers and working through some of its developments at the end of the nineteenth and beginning of the twentieth centuries. Drawing on a range of philosophical and historic...

1 ... 18 19 20 21 22 ... 27