Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Automatic Control with Experiments
This book presents theory and practice in the context of automatic control education. It presents the relevant theory in the first eight chapters,applying them later on to the control of several real plants. Each plant is studied following a uniform procedure: a) the plant’s functionis described, b) a mathematical model is obtained, c) plant cons...
Multimedia Big Data Computing for IoT Applications
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (...
Evidence-Based Practice in Clinical Social Work
The 2nd edition of Evidence-Based Practice in Clinical Social Work continues to bridge the gap between social work research and clinical practice, presenting EBP as both an effective approach to social work and a broader social movement. Building on the models and insights outlined in the first edition, this new edition provides updated research an...
Teaching Medicine and Medical Ethics Using Popular Culture
This book demonstrates how popular culture can be successfully incorporated into medical and health science curriculums, capitalising on the opportunity fictional media presents to humanise case studies. Studies show that the vast majority of medical and nursing students watch popular medical television dramas and comedies such as Grey’s Anatomy,...
Building Secure and Reliable Systems
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best prac...
CSS Animation 101
This book is for people who build for the web and want to add animation to their designs and sites. A bit of basic CSS knowledge is needed but I won't assume any knowledge of transitions or animations. We'll start with the basics, and through a mix of theory and practical examples, learn all about transitions and animation....
C# Notes for Professionals
The C# Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Modern Web Development on the JAMstack
Learn how to run your web projects - everything from simple sites to complex applications - without a single server. It's possible with the JAMstack, a modern web development architecture for deploying fast, highly-scalable sites and applications that don't require traditional origin infrastructure. This practical report explains how the ...
Neural Networks with JavaScript Succinctly
James McCaffrey leads you through the fundamental concepts of neural networks, including their architecture, input-output, tanh and softmax activation, back-propagation, error and accuracy, normalization and encoding, and model interpretation. Although most concepts are relatively simple, there are many of them, and they interact with each other in...
Keras Succinctly
Neural networks are a powerful tool for developers, but harnessing them can be a challenge. With Keras Succinctly, author James McCaffrey introduces Keras, an open-source, neural network library designed specifically to make working with backend neural network tools easier....
Data Visualization in Society
Today we are witnessing an increased use of data visualization in society. Across domains such as work, education and the news, various forms of graphs, charts and maps are used to explain, convince and tell stories. In an era in which more and more data are produced and circulated digitally, and digital tools make visualization production increasi...
Street-Fighting Mathematics
In problem solving, as in street fighting, rules are for fools: do whatever works - don't just stand there! Yet we often fear an unjustified leap even though it may land us on a correct result. Traditional mathematics teaching is largely about solving exactly stated problems exactly, yet life often hands us partly defined problems needing only...
Writing Native Mobile Apps in a Functional Language Succinctly
In Implementing a Custom Language Succinctly, Succinctly series author Vassili Kaplan demonstrated how to create a customized programming language. Now, he returns to showcase how you can use that language to build fully functional mobile apps. In Writing Native Mobile Apps in a Functional Language Succinctly, you will build off the skills you'...
Introduction to CNTK Succinctly
Microsoft CNTK (Cognitive Toolkit, formerly Computational Network Toolkit), an open source code framework, enables you to create feed-forward neural network time series prediction systems, convolutional neural network image classifiers, and other deep learning systems. In Introduction to CNTK Succinctly, author James McCaffrey offers instruction on...
Open Education
This insightful collection of essays explores the ways in which open education can democratise access to education for all. It is a rich resource that offers both research and case studies to relate the application of open technologies and approaches in education settings around the world. Global in perspective, this book argues strongly for the...
Access Controlled
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
Close Reading with Computers
Most contemporary digital studies are interested in distant-reading paradigms for large-scale literary history. This book asks what happens when such telescopic techniques function as a microscope instead. The first monograph to bring a range of computational methods to bear on a single novel in a sustained fashion, it focuses on the award-winning ...
Peer Participation and Software
Firefox, a free Web browser developed by the Mozilla Foundation, is used by an estimated 270 million people worldwide. To maintain and improve the Firefox browser, Mozilla depends not only on its team of professional programmers and managers but also on a network of volunteer technologists and enthusiasts - free/libre and open source software (FLOS...
Re-Mapping Centre and Periphery
Historians often assume a one-directional transmission of knowledge and ideas, leading to the establishment of spatial hierarchies defined as centres and peripheries. In recent decades, transnational and global history have contributed to a more inclusive understanding of intellectual and cultural exchanges that profoundly challenged the ways in wh...
Musical Cities
Musical Cities represents an innovative approach to scholarly research and dissemination. A digital and interactive 'book', it explores the rhythms of our cities, and the role they play in our everyday urban lives, through the use of sound and music. Sara Adhitya first discusses why we should listen to urban rhythms in order to design ...
Comics Beyond the Page in Latin America
Comics Beyond the Page in Latin America is a cutting-edge study of the expanding worlds of Latin American comics. Despite lack of funding and institutional support, not since the mid-twentieth century have comics in the region been so dynamic, so diverse and so engaged with pressing social and cultural issues. Comics are being used as essential too...
Cloud Design Patterns
Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to pro...
The Kademlia Protocol Succinctly
With its novel XOR-based metric topology, Kademlia is the first peer-to-peer system to combine provable consistency and performance, latency-minimizing routing, and a symmetric, unidirectional topology. In The Kademlia Protocol Succinctly, author Marc Clifton leads readers through the positive aspects of Kademlia's decentralized specifications...
Mobile Media Learning
This book is an inspirational message about what is possible and practical in the name of learning through mobile media. We present stories from a diverse set of educators, a microcosm of the landscape of mobile media learning. Each author has found a way to create something new and beautiful in their own world. And though their results are exce...
Operating Systems and Middleware
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
The Condition of Digitality
David Harvey's The Condition of Postmodernity rationalised capitalism's transformation during an extraordinary year: 1989. It gave theoretical expression to a material and cultural reality that was just then getting properly started - globalisation and postmodernity - whilst highlighting the geo-spatial limits to accumulation imposed by o...
Rhetorical Code Studies
Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which software developers construct...
Certified Programming with Dependent Types
The technology of mechanized program verification can play a supporting role in many kinds of research projects in computer science, and related tools for formal proof-checking are seeing increasing adoption in mathematics and engineering. This book provides an introduction to the Coq software for writing and checking mathematical proofs. It takes ...
Cultural Crowdfunding
This new book analyses the strategies, usages and wider implications of crowdsourcing and crowdfunding platforms in the culture and communication industries that are reshaping economic, organizational and social logics. Platforms are the object of considerable hype with a growing global presence. Relying on individual contributions coordinated by s...
Ethnicity, Race and Inequality in the UK
Ethnicity and Race in the UK examines the state of racial inequality in a wide range of areas in post-Brexit Britain, including employment, health care, education, criminal justice, housing, and representation in the arts and media. Written to coincide with the fiftieth anniversary of the UK Race Relations Act of 1968 as well as the founding of the...
The DARPA Model for Transformative Technologies
The U.S. Defense Advanced Research Projects Agency (DARPA) has played a remarkable role in the creation new transformative technologies, revolutionizing defense with drones and precision-guided munitions, and transforming civilian life with portable GPS receivers, voice-recognition software, self-driving cars, unmanned aerial vehicles, and, most fa...
Bing Maps V8 Succinctly
At least 80% of all information being collected by enterprises includes geolocation data. The Bing Maps V8 library is a very large collection of JavaScript code that allows web developers to place a map on a webpage, query for data, and manipulate objects on a map, creating a geo-application. In Bing Maps V8 Succinctly, James McCaffrey takes reader...

1 ... 5 6 7 8 9 10