Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Google Maps API Succinctly
In Google Maps API Succinctly, Mark Lewin gives you a hands-on, beginner-level introduction to developing mapping applications using the Google Maps JavaScript API. Learn the ins and outs of the API so that you can harness the power of Google Maps within your own websites and applications. Lewin will take you from requesting an API key, through add...
Libelf by Example
This tutorial introduces libelf, a library for reading and writing object code in the Extensible Linking Format (ELF) file format. - Getting started with libelf: obtaining a handle to an ELF object, establishing a working ELF version, and handling errors reported by libelf. - How ELF data structures are laid out in-memory and on disk, the notions...
Inferring and Explaining
Inferring and Explaining is a book in practical epistemology. It examines the notion of evidence and assumes that good evidence is the essence of rational thinking. Evidence is the cornerstone of the natural, social, and behavioral sciences. But it is equally central to almost all academic pursuits and, perhaps most importantly, to the basic need t...
Peace and Democratic Society
Recent acts of terrorism and the current unrest in the Middle East remind us how important it is to understand the relationship between violence, peace and democracy. In a challenging and insightful essay, Amartya Sen explores ideas around 'organised violence' (such as war, genocide and terrorism) and violence against the individual. High...
Visualising Facebook
Since the growth of social media, human communication has become much more visual. This book presents a scholarly analysis of the images people post on a regular basis to Facebook. By including hundreds of examples, readers can see for themselves the differences between postings from a village north of London, and those from a small town in Trinida...
Grey Area
Coffeeshops are the most famous example of Dutch tolerance. But in fact, these cannabis distributors are highly regulated. Coffeeshops are permitted to break the law, but not the rules. On the premises, there cannot be minors, hard drugs or more than 500 grams. Nor can a coffeeshop advertise, cause nuisance or sell over five grams to a person in a ...
Leading Cities
Leading Cities is a global review of the state of city leadership and urban governance today. Drawing on research into 202 cities in 100 countries, the book provides a broad, international evidence base grounded in the experiences of all types of cities. It offers a scholarly but also practical assessment of how cities are led, what challenges thei...
Musical Cities
Musical Cities represents an innovative approach to scholarly research and dissemination. A digital and interactive 'book', it explores the rhythms of our cities, and the role they play in our everyday urban lives, through the use of sound and music. Sara Adhitya first discusses why we should listen to urban rhythms in order to design ...
A Conversation about Healthy Eating
What constitutes a healthy diet? Mainstream media and advertisers would like you to think that the answer to this question is complicated and controversial. But science, fortunately, tells us otherwise. A Conversation about Healthy Eating brings together all the relevant science about healthy eating in one place, and it's exactly that - a c...
Support Vector Machines Succinctly
Support Vector Machines (SVMs) are some of the most performant off-the-shelf, supervised machine-learning algorithms. In Support Vector Machines Succinctly, author Alexandre Kowalczyk guides readers through the building blocks of SVMs, from basic concepts to crucial problem-solving algorithms. He also includes numerous code examples and a lengthy b...
Scala Succinctly
Learning a new programming language can be a daunting task, but Scala Succinctly makes it a simple matter. Author Chris Rose guides readers through the basics of Scala, from installation to syntax shorthand, so that they can get up and running quickly....
Rhetorical Code Studies
Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which software developers construct...
10 PRINT CHR$(205.5+RND(1)); : GOTO 10
This book takes a single line of code - the extremely concise BASIC program for the Commodore 64 inscribed in the title - and uses it as a lens through which to consider the phenomenon of creative computing and the way computer programs exist in culture. The authors of this collaboratively written book treat code not as merely functional but as a t...
Cultural Crowdfunding
This new book analyses the strategies, usages and wider implications of crowdsourcing and crowdfunding platforms in the culture and communication industries that are reshaping economic, organizational and social logics. Platforms are the object of considerable hype with a growing global presence. Relying on individual contributions coordinated by s...
Contribute to Opensource
Have you ever wondered how the open source world exists thanks to the contribution of thousands of people all over the world? Is there a way to learn the skills to contribute at maximum, or to improve it? Open Source is a trending topic every year in the IT world but nobody talks about how to be part of it, instead only to be a consumer. Join...
Estimating Illicit Financial Flows
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...
Java Succinctly Part 1
Java is a high-level, cross-platform, object-oriented programming language that allows applications to be written once and run on a multitude of different devices. Java applications are ubiquitous, and the language is consistently ranked as one of the most popular and dominant in the world. Christopher Rose's Java Succinctly Part 1 describes t...
Annals of Scientific Society for Assembly, Handling and Industrial Robotics
This open proceedings presents a good overview of the current research landscape of industrial robots.The objective of MHI Colloquium is the successful networking at both academic and management level. Thereby, the colloquium focuses an academic exchange at a high level in order to distribute the obtained research results, to determine synergy effe...
American Labour's Cold War Abroad
During the Cold War, American labour organizations were at the centre of the battle for the hearts and minds of working people. At a time when trade unions were a substantial force in both American and European politics, the fiercely anti-communist American Federation of Labor - Congress of Industrial Organizations (AFL - CIO), set a strong example...
Azure Serverless Succinctly
Serverless computing can be a powerful, cost-effective solution when your cloud-based apps and services don't need to run 24/7. Best of all, it saves you from the headache of tinkering with server configurations and settings. In Azure Serverless Succinctly, author Sander Rossel provides a clear guide to working with Azure Functions, Logic Apps...
When Right Makes Might
Why do great powers accommodate the rise of some challengers but contain and confront others, even at the risk of war? When Right Makes Might proposes that the ways in which a rising power legitimizes its expansionist aims significantly shapes great power responses. Stacie E. Goddard theorizes that when faced with a new challenger, great powers wil...
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, intro...
Modern Java EE Design Patterns
With the ascent of DevOps, microservices, containers, and cloud-based development platforms, the gap between state-of-the-art solutions and the technology that enterprises typically support has greatly increased. But as Markus Eisele explains in this O'Reilly report, some enterprises are now looking to bridge that gap by building microservice-...
How To Build a Website With CSS and HTML
This project-based eBook will introduce you to Cascading Style Sheets (CSS), a stylesheet language used to control the presentation of websites, by building a personal website using our demonstration site as a model. Though our demonstration site features Sammy the Shark, you can switch out Sammy's information with your own if you wish to pers...
Collaboration for Impact
Collaboration is often seen as a palliative for the many wicked problems challenging our communities. These problems affect some of the most vulnerable and unempowered people in our community. They also carry significant implications for policy processes, programs of service and, ultimately, the budgets and resourcing of national and sub-national g...
The Atheist's Bible
'Love is harder to explain than hunger, for a piece of fruit does not feel the desire to be eaten': Denis Diderot's Éléments de physiologie presents a world in flux, turning on the relationship between man, matter and mind. In this late work, Diderot delves playfully into the relationship between bodily sensation, emotion and perce...
Circular Migration and the Rights of Migrant Workers in Central and Eastern Europe
This open book adopts a rights-based approach to shed light on the different legal and policy instruments that have been developed to implement circular migration policies in the EU, and their consequences for the rights of migrant workers. It contributes to the understanding of the meaning of this concept in general and in the EU, as well as speci...
Brexit and the Control of Tobacco Illicit Trade
This open book assesses the consequences of Brexit for the control of illicit trade in tobacco products in the UK and EU. Based on the currently applicable legal framework, it examines the significance of a possible non-application of the acquis communautaire in the UK in matters relating to anti-illicit trade in tobacco legislation. It also analys...
European Guide to Power System Testing
This open book provides an overview of the ERIGrid validation methodology for validating CPES, a holistic power system testing method. It introduces readers to corresponding simulation and laboratory-based tools, including co-simulation, real-time simulation, and hardware-in-the-loop. Selected test cases and validation examples are provided, in ord...
How To Manage a Redis Database
This book aims to provide an approachable introduction to Redis concepts by outlining many of the key-value store's commands so readers can learn their patterns and syntax, thus building up readers' understanding gradually. The goal for this book is to serve as an introduction to Redis for those interested in getting started with it, or k...
Academic Success
Academic Success is designed to help students on their university journey. It is divided into four parts, each reflecting different aspects of a student's tertiary experience. Part A: Successful Beginnings addresses what it is like to be a new student at an Australian university. Part B: Successful Foundations introduces basic skills in Englis...
Philosophy of Computer Science
This book looks at some of the central issues in the philosophy of computer science. It is not designed to answer all (or even any) of the philosophical questions that can be raised about the nature of computing, computers, and computer science. Rather, it is designed to "bring you up to speed" on a conversation about these issues - to gi...

1 2 3 4