Non-Vitamin K Antagonist Oral Anticoagulants
This book is an essential guide to the medical treatment of thrombosis and presents core principles of anticoagulant therapeutics as well as drug recommendations. Written by recognized experts in the field, this concise, accessible handbook provides a unique and valuable resource in the cardiovascular field, both for those currently in training, an...
Forecasting and Assessing Risk of Individual Electricity Peaks
The overarching aim of this book is to present self-contained theory and algorithms for investigation and prediction of electric demand peaks. A cross-section of popular demand forecasting algorithms from statistics, machine learning and mathematics is presented, followed by extreme value theory techniques with examples.In order to achieve carbon t...
Boundary Value Problems, Weyl Functions, and Differential Operators
This book presents a comprehensive survey of modern operator techniques for boundary value problems and spectral theory, employing abstract boundary mappings and Weyl functions. It includes self-contained treatments of the extension theory of symmetric operators and relations, spectral characterizations of selfadjoint operators in terms of the anal...
Data Protection for the Hybrid Cloud
If you are responsible for architecting and designing the backup strategy for your organization, especially if you're looking for ways to incorporate cloud backup into your business continuity scenarios, this book is for you. With the increasing trends in virtualization as well as the move to the pubic cloud, IT organizations are headed toward a wo...
Azure Cognitive Services Succinctly
Azure Cognitive Services puts the power of AI and machine learning into the hands of software developers without requiring a PhD or years of experience in the field. With Azure Cognitive Services Succinctly, author Ed Freitas delivers an accessible guide to integrating computer vision, decision-making, speech, and more into your applications to giv...
Istio Succinctly
Istio is one of the most popular solutions for service meshes in cloud-native infrastructures, and it is most often deployed on Kubernetes clusters. In Istio Succinctly, authors Rahul Rai and Tarun Pabbi provide a practical guide to getting started with Istio, from setting up a Kubernetes cluster, to managing its traffic management, security, obser...
Cloud Design Patterns
Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to pro...
Learning Zeromq
Even connecting a few programs across a few sockets is plain nasty when you start to handle real life situations. Trillions? The cost would be unimaginable. Connecting computers is so difficult that software and services to do this is a multi-billion dollar business. So today we're still connecting applications using raw UDP and TCP, proprietary pr...