Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Rethinking the Internet of Things
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Fashion Figures
Missy Maker is a middle school girl who loves math and fashion. She sees math in everything she does. She tries to hide this from her friends, because she thinks it's too geeky. Missy hears that the school math club needs more members, but she's worried about what her friends will think if she joins, and she's already committed to jo...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Intel Galileo and Intel Galileo Gen 2
Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel Galileo and Intel Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. ...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
DevOps for Digital Leaders
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications. In DevOps for Digital Leaders, deep collective experience on both sides of the dev - ops divide informs the global thought l...
Collective Actions in Europe
This book offers an analytical presentation of how Europe has created its own version of collective actions. In the last three decades, Europe has seen a remarkable proliferation of collective action legislation, making class actions the most successful export product of the American legal scholarship. While its spread has been surrounded by distru...
Reality Lost
This book looks at how a democracy can devolve into a post-factual state.The media is being flooded by populist narratives, fake news, conspiracy theories and make-believe. Misinformation is turning into a challenge for all of us, whether politicians, journalists, or citizens. In the age of information, attention is a prime asset and may be convert...
GUI Design for Android Apps
GUI Design for Android Apps is the perfect - and concise - introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. T...
Android on x86
Android on x86: an Introduction to Optimizing for IntelĀ® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel's x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x...
Big Data in Context
This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ's Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking ...
Efficient Learning Machines
Machine learning techniques provide cost-effective alternatives to traditional methods for extracting underlying relationships between information and data and for predicting future events by processing existing information to train models. Efficient Learning Machines explores the major topics of machine learning, including knowledge discovery, cla...
The Technological and Economic Future of Nuclear Power
This open book discusses the eroding economics of nuclear power for electricity generation as well as technical, legal, and political acceptance issues. The use of nuclear power for electricity generation is still a heavily disputed issue. Aside from technical risks, safety issues, and the unsolved problem of nuclear waste disposal, the economic pe...
Impacts of the Fukushima Nuclear Accident on Fish and Fishing Grounds
This book presents the results from the Japanese Fisheries Research Agency's 3-year intensive monitoring of radionuclides in a variety of fish, plankton, benthos, and their living environments after the Fukushima Daiichi Nuclear Power Plant (FNPP) accident in March 2011. The book reveals the dynamics of contamination processes in marine and fr...
Embedded Firmware Solutions
Embedded Firmware Solutions is the perfect introduction and daily-use field guide - for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel's new firmware direction (including Quark coverage), showing how to integrate IntelĀ® Architecture designs into their plans. Featuring hands-on exampl...
Energy Efficient Servers
Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outline...
Optimizing HPC Applications with Intel Cluster Tools
Optimizing HPC Applications with Intel Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve...
Programming Persistent Memory
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times - a huge leap forward in byte-addressable capacity compar...
Low-Dose Radiation Effects on Animals and Ecosystems
This free book summarizes the latest scientific findings regarding the biological effects of the Fukushima Daiichi Nuclear Power Plant (FNPP) accident in 2011. Various cases of changes in animals and organisms have been reported since the FNPP accident. However, it is often unknown whether they are actually due to radiation, since the dose or dos...
Punishing the Criminal Corpse, 1700-1840
This book analyses the different types of post-execution punishments and other aggravated execution practices, the reasons why they were advocated, and the decision, enshrined in the Murder Act of 1752, to make two post-execution punishments, dissection and gibbeting, an integral part of sentences for murder. It traces the origins of the Act, and t...
Digital Video Concepts, Methods, and Metrics
Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to...
Politics, Power, & Playboy
The 1960s was a time of reform and revolution in America, brought on by individuals willing to challenge political, social, and cultural norms. Politics, Power, & Playboy explores the American mindset during this turbulent and transformative time in American history. Each chapter examines instances of Americans confronting power, whether it be ...
D3 Tips and Tricks v3.x
D3 Tips and Tricks is a book written to help those who may be unfamiliar with JavaScript or web page creation get started turning information into visualization. Data is the new medium of choice for telling a story or presenting compelling information on the Internet and d3.js is an extraordinary framework for presentation of data on a web page....
Earth 2020
Fifty years have passed since the first Earth Day, on 22 April 1970. This accessible, incisive and timely collection of essays brings together a diverse set of expert voices to examine how the Earth's environment has changed over this past half century, and what lies in store for our planet over the coming fifty years. Earth 2020: An Inside...
From Family to Philosophy
A cultural change in the Renaissance freed talented European writers to compose letters rivalling the finest that survived from ancient Rome. This book traces the lives and outlooks of distinguished Britons as revealed in their correspondence. The subjects range from the fierce satirist Jonathan Swift to the long-lived, all-observing Horace Walpole...
Access Controlled
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
Global Corruption
This book has been specifically created to make it easier for professors to offer a law school course on global corruption. It is issued under a creative commons license and can be used for free in whole or in part for non-commercial purposes. The first chapter sets out the general context of global corruption: its nature and extent, and some views...
The dream pillow
Pirate, Tree and Bear are making it difficult to sleep. By day they are great friends, but when night comes, everything changes. No one can sleep. The Dream Pillow is a story about how to change bad dreams into good ones. A boy who is afraid because everything changes at night learns about dreaming and how to have good dreams....
Who takes the Train?
Naledi is taking the train for the first time and wonders what kind of people she will see. The train is full of surprises! Taking the train for the first time, Naledi wonders what kind of people she and her mother will meet on their way to the beach....
Wiggle jiggle
Wiggle jiggle wriggle with the wiggly worm, on a fun adventure that is full of surprises....
Rational Cybersecurity for Business
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and...

1 2 3