Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
JavaScript Notes for Professionals
The JavaScript Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Kotlin Notes for Professionals
The Kotlin Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Microsoft SQL Server Notes for Professionals
The Microsoft SQL Server Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
MySQL Notes for Professionals
The MySQL Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Statistics with Julia
Ccurrently many of Julia's users are hard-core developers that contribute to the language's standard libraries, and to the extensive package eco-system that surrounds it. Therefore, much of the Julia material available at present is aimed at other developers rather than end users. This is where our book comes in, as it has been written wi...
Evolve the Monolith to Microservices with Java and Node
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This book shows how to break out a traditiona...
Understanding Machine Learning
The subject of this book is automated learning, or, as we will more often call it, Machine Learning (ML). That is, we wish to program computers so that they can "learn" from input available to them. Roughly speaking, learning is the process of converting experience into expertise or knowledge. The input to a learning algorithm is training...
Node.js Notes for Professionals
The Node.js Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Angular Succinctly
Angular is a massively popular JavaScript framework built to take advantage of component development in web apps. It is constantly evolving, with a new major release delivered every six months. In Angular Succinctly, author Joseph D. Booth guides you through setting up a development environment, interacting with the Angular CLI, building Hello Worl...
Xamarin.Forms Succinctly
The demand for mobile applications across Android, iOS, and Windows platforms often puts developers accustomed to .NET and C# in a bind. The gap between platform operating systems, programming languages, and devices is an immense obstacle. Ideally, these developers would be able use their existing skills and knowledge to build native mobile apps. X...
Keras Succinctly
Neural networks are a powerful tool for developers, but harnessing them can be a challenge. With Keras Succinctly, author James McCaffrey introduces Keras, an open-source, neural network library designed specifically to make working with backend neural network tools easier....
Effective AWK Programming
When processing text files, the awk language is ideal for handling data extraction, reporting, and data-reformatting jobs. This practical guide serves as both a reference and tutorial for POSIX-standard awk and for the GNU implementation, called gawk. This book is useful for novices and awk experts alike. In this thoroughly revised 5th edition, ...
Tensorflow 2 Tutorial
TensorFlow is a free and open-source software library for machine learning. It can be used across a range of tasks but has a particular focus on training and inference of deep neural networks. This book is a somewhat intermediate-level introduction to Tensorflow 2. We will eventually cover everything tf.keras, but no so fast until we implemented t...
Programming Computer Vision with Python
If you want a basic understanding of computer vision's underlying theory and algorithms, this hands-on introduction is the ideal place to start. You'll learn techniques for object recognition, 3D reconstruction, stereo imaging, augmented reality, and other computer vision applications as you follow clear examples written in Python. Pro...
Algorithmic Graph Theory and Sage
This is an introductory book on algorithmic graph theory. Theory and algorithms are illustrated using the Sage open source mathematics software....
Visualising Facebook
Since the growth of social media, human communication has become much more visual. This book presents a scholarly analysis of the images people post on a regular basis to Facebook. By including hundreds of examples, readers can see for themselves the differences between postings from a village north of London, and those from a small town in Trinida...
Building Real-World Cloud Apps with Windows Azure
This book walks you through a patterns-based approach to building real-world cloud solutions. The patterns apply to the development process as well as to architecture and coding practices. Developers who are curious about developing for the cloud, considering a move to the cloud, or are new to cloud development will find here a concise overview ...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
Support Vector Machines Succinctly
Support Vector Machines (SVMs) are some of the most performant off-the-shelf, supervised machine-learning algorithms. In Support Vector Machines Succinctly, author Alexandre Kowalczyk guides readers through the building blocks of SVMs, from basic concepts to crucial problem-solving algorithms. He also includes numerous code examples and a lengthy b...
React JS Notes for Professionals
The React JS Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
PHP Notes for Professionals
The PHP Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Free Innovation
Free innovation is already widespread in national economies and is steadily increasing in both scale and scope. Today, tens of millions of consumers are collectively spending tens of billions of dollars annually on innovation development. However, because free innovations are developed during consumers' unpaid, discretionary time and are given...
Operating Systems and Middleware
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
Smooth CoffeeScript
An introduction to CoffeeScript programming with an emphasis on clarity, abstraction and verification. Smooth CoffeeScript is a free book about CoffeeScript and programming. No previous programming knowledge is required. Over 200 pages and 35 exercises....
Contribute to Opensource
Have you ever wondered how the open source world exists thanks to the contribution of thousands of people all over the world? Is there a way to learn the skills to contribute at maximum, or to improve it? Open Source is a trending topic every year in the IT world but nobody talks about how to be part of it, instead only to be a consumer. Join...
Robotic Process Automation Succinctly
Around the world, organizations are facing the challenge of becoming more efficient by increasing productivity with their existing resources - or sometimes even less. Robotic process automation (RPA) is a technology that can augment the productivity of human workers by liberating them from tedious and repetitive tasks that can be performed faster a...
The Coder's Apprentice
The Coder's Apprentice is a course book, written by Pieter Spronck, that is aimed at teaching Python 3 to students and teenagers who are completely new to programming. Contrary to many of the other books that teach Python programming, this book assumes no previous knowledge of programming on the part of the students, and contains numerous exer...
Invitation to Dynamical Systems
Designed for those wishing to study mathematics beyond linear algebra but unready for abstract material, this "invitation" to the excitement of dynamical systems appeals to readers from a wide range of backgrounds. Rather than taking a theorem-proof-corollary-remark approach, it stresses geometry and intuition. Topics include both the cla...
The Art of Sustainable Performance
This open access book revisits common notions on how to select and recruit the right employees. It reveals that the secret of successful individuals and teams lies in a combination of talent and four important performance indicators, offering an innovative approach that companies can fruitfully adopt. Bas Kodden has studied key performance indicato...
The Law Is (Not) for Kids
In this practical guide to the law for young people of Canada, Ned Lecic and Marvin Zuker provide an all-encompassing manual meant to empower and educate children and youth and those that serve them. The authors address questions about how rights and laws affect the lives of young people at home, at school, at work, and in their relationships as th...
Protecting SQL Server Data
In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, vie...

1 2 3 4 5