Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
The little book about OS development
The OS kernel and this book were produced as part of an advanced individual course at the Royal Institute of Technology, Stockholm. The authors had previously taken courses in OS theory, but had only minor practical experience with OS kernel development. In order to get more insight and a deeper understanding of how the theory from the previous OS ...
Sales
Notes from the excellent lecture on sales that Steli Efti did at Y Combinator....
Beej's Guide to Network Programming
Back in the mid 90s, Beej got tired of all his friends asking him how to do this stuff with networking programming in C, so he put pen to paper on the early World Wide Web and wrote down everything he knew just to get them off his back. Since then, the Guide has expanded significantly, with plenty of examples, and covers IPv6. Inside you'll fi...
The Onlife Manifesto
What is the impact of information and communication technologies (ICTs) on the human condition? In order to address this question, in 2012 the European Commission organized a research project entitled The Onlife Initiative: concept reengineering for rethinking societal concerns in the digital transition. This volume collects the work of the Onlife ...
The European Higher Education Area
Bridging the gap between higher education research and policy making was always a challenge, but the recent calls for more evidence-based policies have opened a window of unprecedented opportunity for researchers to bring more contributions to shaping the future of the European Higher Education Area (EHEA). Encouraged by the success of the 2011 fir...
Reconsidering Constitutional Formation II Decisive Constitutional Normativity
This second volume of ReConFort, published open access, addresses the decisive role of constitutional normativity, and focuses on discourses concerning the legal role of constitutional norms. Taken together with ReConFort I (National Sovereignty), it calls for an innovative reassessment of constitutional history drawing on key categories to convey ...
Security in Computer and Information Sciences
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
Autonomous Control for a Reliable Internet of Services
This free book was prepared as a Final Publication of the COST Action IC1304 "Autonomous Control for a Reliable Internet of Services (ACROSS)". The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-grad...
Integration Processes and Policies in Europe
In this book, experts on integration processes, integration policies, transnationalism, and the migration and development framework provide an academic assessment of the 2011 European Agenda for the Integration of Third-Country Nationals, which calls for integration policies in the EU to involve not only immigrants and their society of settlement, ...
Actors and the Art of Performance: Under Exposure
Actors and the Art of Performance: Under Exposure combines the author's two main biographical paths: her professional commitment to the fields of both theatre and philosophy. The art of acting on stage is analysed here not only from the theoretical perspective of a spectator, but also from the perspective of the actor. The author draws on her ...
Using Blocks in Ruby
Unannounced and unmarked, blocks turn up all over Ruby programs. Their use ranges from some of Ruby's most basic structures, such as loops, to some of its most sophisticated tricks. Similar to closures or lambdas in other languages, blocks enable some of Ruby's vaunted efficiency. Blocks even allow other people to write some of the code y...
The Behavioral Ecology of the Tibetan Macaque
This open access book summarizes the multi-disciplinary results of one of China's main primatological research projects on the endemic Tibetan macaque (Macaca thibetana), which had continued for over 30 years, but which had never been reported on systematically. Dedicated to this exceptional Old World monkey, this book makes the work of Chines...
Skills Development for Inclusive and Sustainable Growth in Developing Asia-Pacific
Focusing on the Asia-Pacific region, which in recent years has been the engine of global economic growth , this volume surveys trends and prospects in technical and vocational education and training (TVET) with particular reference to achieving inclusive growth and the greening of economies. Underlying the increasing pressure for new models of TV...
Stories from Quechan Oral Literature
The Quechan are a Yuman people who have traditionally lived along the lower part of the Colorado River in California and Arizona. They are well known as warriors, artists, and traders, and they also have a rich oral tradition. The stories in this volume were told by tribal elders in the 1970s and early 1980s. The eleven narratives in this volume ta...
God's Babies
The human population's annual total consumption is not sustainable by one planet. This unprecedented situation calls for a reform of religious cultures that promote a large ideal family size. Many observers assume that Christianity is inevitably part of this problem because it promotes "family values" and statistically, in America an...
RESTful Web Services
You've built web sites that can be used by humans. But can you also build web sites that are usable by machines? That's where the future lies, and that's what RESTful Web Services shows you how to do. The World Wide Web is the most popular distributed application in history, and Web services and mashups have turned it into a powerful...
Asterisk: The Future of Telephony
This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control ...
The Design and Implementation of the Anykernel and Rump Kernels
The mission of the first edition of this book was to introduce the anykernel and rump kernels and motivate their existence. Additionally, we explored the characteristics of the technology through various experiments. The paramount, often criminally overlooked experiment was the one hiding in plain sight: is it possible to construct the system in a ...
Why Should I Care? Mobile Security for The Rest of Us
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief...
Fundamentals of Python Programming
Guido van Rossum created the Python programming language in the late 1980s. In contrast to other popular languages such as C, C++ , Java, and C#, Python strives to provide a simple but powerful syntax. Python is used for software development at companies and organizations such as Google, Yahoo, Facebook, CERN, Industrial Light and Magic, and NAS...
Educating Students to Improve the World
This book addresses how to help students find purpose in a rapidly changing world. In a probing and visionary analysis of the field of global education Fernando Reimers explains how to lead the transformation of schools and school systems in order to more effectively prepare students to address today’s’ most urgent challenges and to invent a be...
Security in an Interconnected World
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is sh...
Engineering Reliable Mobile Applications
Imagine a situation where your services report healthy and serving but you receive multiple user reports of poor availability. How are these users accessing your service? Most likely, they are using your service through a client application, such as a mobile application on their phone. SRE traditionally has only supported systems and services run i...
Modern C
Modern C focuses on the new and unique features of modern C programming. The book is based on the latest C standards and offers an up-to-date perspective on this tried-and-true language. C is extraordinarily modern for a 50-year-old programming language. Whether you're writing embedded code, low-level system routines, or high-performance ap...
Evolve the Monolith to Microservices with Java and Node
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This book shows how to break out a traditiona...
Natural Language Processing Succinctly
AI assistants represent a significant frontier for development. But the complexities of such systems pose a significant barrier for developers. In Natural Language Processing Succinctly, author Joseph Booth will guide readers through designing a simple system that can interpret and provide reasonable responses to written English text. With this fou...
Libelf by Example
This tutorial introduces libelf, a library for reading and writing object code in the Extensible Linking Format (ELF) file format. - Getting started with libelf: obtaining a handle to an ELF object, establishing a working ELF version, and handling errors reported by libelf. - How ELF data structures are laid out in-memory and on disk, the notions...
Open Data Structures (in C++)
There are plenty of books that teach introductory data structures. Some of them are very good. Most of them cost money, and the vast majority of computer science undergraduate students will shell out at least some cash on a data structures book. Open Data Structures (in C++) - The goal of this project is to free undergraduate computer science stud...
Open Data Structures (in Java)
There are plenty of books that teach introductory data structures. Some of them are very good. Most of them cost money, and the vast majority of computer science undergraduate students will shell out at least some cash on a data structures book. Open Data Structures (in Java) - The goal of this book is to free undergraduate computer science stud...
Optimizing software in C++
This is an optimization manual for advanced C++ programmers. This book are not for beginners. Topics include: - The choice of platform and operating system. - Choice of compiler and framework. - Finding performance bottlenecks. - The efficiency of different C++ constructs. - Multi-core systems. - Parallelization with vector operations. - CPU dispa...
The Security Development Lifecycle
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...
PicoLisp Works
PicoLisp Works is a compilation of (almost) all available information about the technological gem PicoLisp - a programming language and environment that definitely deserves wider attention. Built on the unique characteristics of Lisp (almost no syntax, code is equivalent to data), PicoLisp combines powerful abstractions with simplicity and purit...

1 2