Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Boundary Value Problems, Weyl Functions, and Differential Operators
This book presents a comprehensive survey of modern operator techniques for boundary value problems and spectral theory, employing abstract boundary mappings and Weyl functions. It includes self-contained treatments of the extension theory of symmetric operators and relations, spectral characterizations of selfadjoint operators in terms of the anal...
From Assessing to Conserving Biodiversity
This book features essays written by philosophers, biologists, ecologists and conservation scientists facing the current biodiversity crisis. Despite increasing communication, accelerating policy and management responses, and notwithstanding improving ecosystem assessment and endangered species knowledge, conserving biodiversity continues to be mor...
Research, Ethics and Risk in the Authoritarian Field
This free book offers a synthetic reflection on the authors' fieldwork experiences in seven countries within the framework of 'Authoritarianism in a Global Age', a major comparative research project. It responds to the demand for increased attention to methodological rigor and transparency in qualitative research, and seeks to advanc...
Interdisciplinary Insights for Digital Touch Communication
Communication is increasingly moving beyond 'ways of seeing' to 'ways of feeling'. This Open Access book provides social design insights and implications for HCI research and design exploring digitally mediated touch communication. It offers a socially orientated map to help navigate the complex social landscape of digitally me...
Responsible Innovation
This Open Access book, Responsible innovation provides benefits for society, for instance more sustainable products, more engagement with consumers and less anxiety about emerging technologies. As a governance tool it is mostly driven by research funders, including the European Commission, under the term "responsible research and innovation&qu...
Towards a Systemic Theory of Irregular Migration
This open access book provides an alternative theoretical framework of irregular migration that allows to overcome many of the contradictions and theoretical impasses displayed by the majority of approaches in current literature. The analytical framework allows moving from an interpretation biased by methodological nationalism, to a more general sy...
Think Data Structures
If you're a student studying computer science or a software developer preparing for technical interviews, this practical book will help you learn and review some of the most important ideas in software engineering - data structures and algorithms - in a way that's clearer, more concise, and more engaging than other materials. By emphas...
Gallucci's Commentary on Dürer's 'Four Books on Human Proportion'
In 1591, Giovanni Paolo Gallucci published his Della simmetria dei corpi humani, an Italian translation of Albrecht Dürer's Four Books on Human Proportion. While Dürer's treatise had been translated earlier in the sixteenth-century into French and Latin, it was Gallucci's Italian translation that endured in popularity as the most c...
Tellings and Texts
Examining materials from early modern and contemporary North India and Pakistan, Tellings and Texts brings together seventeen first-rate papers on the relations between written and oral texts, their performance, and the musical traditions these performances have entailed. The contributions from some of the best scholars in the field cover a wide ra...
Remote Capture
This is a must-read how-to guide if you are planning to embark on a scholarly digitisation project. Tailored to the specifications of the British Library's EAP (Endangered Archives Programme) projects, it is full of sound, practical advice about planning and carrying out a successful digitisation project in potentially challenging conditions. ...
SQL Server Internals: In-Memory OLTP
The SQL Server 2016 In-Memory OLTP engine (a.k.a. Hekaton) is designed to exploit terabytes of available memory and high numbers of processing cores. It allows us to work with memory-optimized tables and indexes, and natively compiled stored procedures, in addition to the disk-based tables and indexes, and T-SQL stored procedures, that SQL Server h...
Hacking the Xbox
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects ...
CS Unplugged
Computers are everywhere. We all need to learn how to use them, and many of us use them every day. But how do they work? How do they think? And how can people write software that is fast and easy to use? Computer science is a fascinating subject that explores these very questions. The easy and fun activities in this book, designed for studentren of...
The Elements of Data Analytic Style
The dramatic change in the price and accessibility of data demands a new focus on data analytic literacy. This book is intended for use by people who perform regular data analyses. It aims to give a brief summary of the key ideas, practices, and pitfalls of modern data analysis. One goal is to summarize in a succinct way the most common difficultie...
Economic Aspects and Business Models of Free Software
This module is focused on the study of Free Software in relation with the private sector and the economic implications of its use and development models. We analyse the software industry from an economic perspective: how it was affected by the raise of free software and what is its potential for the future. On the other hand, we study how to use Fr...
The Sword of Judith
The Book of Judith tells the story of a fictitious Jewish woman beheading Holofernes, the general of a powerful army, to free her people. The story has fascinated artists and authors for centuries, and is becoming a major field of research in its own right. The Sword of Judith is the first multidisciplinary collection of essays to discuss repres...
Storytelling in Northern Zambia
Storytelling plays an important part in the vibrant cultural life of Zambia and in many other communities across Africa. This innovative book provides a collection and analysis of oral narrative traditions as practiced by five Bemba-speaking ethnic groups in Zambia. The integration of newly digitalised audio and video recordings into the text enabl...
Electromagnetics, Volume 1
Electromagnetics, volume 1 by Steven W. Ellingson is a 225-page, peer-reviewed open educational resource intended for electrical engineering students in the third year of a bachelor of science degree program. It is intended as a primary textbook for a one-semester first course in undergraduate engineering electromagnetics. The book employs the &quo...
Welcome to the Beatles
Organized, authored, and edited over the course of five months by a class of eighteen Virginia Tech undergraduate students, Welcome to the Beatles represents their collective contribution to the larger scholarship on the most important band in rock history. The chapters build upon the work of noted author and historian Mark Lewisohn and take into a...
Programming Windows Store Apps with HTML, CSS, and JavaScript
Microsoft Press is pleased to offer the second edition of Kraig Brockschmidt's in-depth ebook on writing Windows Store apps using HTML, CSS3, and JavaScript on the Windows 8.1 platform. The ebook includes 20 chapters and 4 appendices....
SQL Server Hardware
SQL Server Hardware will provide the fundamental knowledge and resources you need to make intelligent decisions about choice, and optimal installation and configuration, of SQL Server hardware, operating system and the SQL Server RDBMS. Relational databases place heavy demands on their underlying hardware and many of these databases are mission-...
The Linux Command Line
The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matchin...
Applied Combinatorics
Applied Combinatorics is an open-source book for a course covering the fundamental enumeration techniques (permutations, combinations, subsets, pigeon hole principle), recursion and mathematical induction, more advanced enumeration techniques (inclusion-exclusion, generating functions, recurrence relations, Polyá theory), discrete structures (grap...
Don't Just Roll the Dice
How do you price your software? Is it art, science or magic? How much attention should you pay to your competitors? This short handbook will provide you with the theory, practical advice and case studies you need to stop yourself from reaching for the dice. Neil Davidson is co-founder of Red Gate Software. Redgate was founded in 1999 and now ...
50 Ways to Avoid Find and Fix ASP.NET Performance Issues
Read the tips and tricks that top developers from the .NET and SQL Server communities use to boost code and query performance in their applications. 50 tips from the .NET and SQL Server communities for boosting performance in your .NET application; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers pe...
Blockchain and Crypt Currency
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
Security Infrastructure Technology for Integrated Utilization of Big Data
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especia...
Fundamentals of Biomechanics
This book integrates the classic fields of mechanics - statics, dynamics, and strength of materials - using examples from biology and medicine. The book is excellent for teaching either undergraduates in biomedical engineering programs or health care professionals studying biomechanics at the graduate level. Extensively revised from a successful th...
Handbook of Evolutionary Research in Archaeology
Evolutionary Research in Archaeology seeks to provide a comprehensive overview of contemporary evolutionary research in archaeology. The book will provide a single source for introduction and overview of basic and advanced evolutionary concepts and research programs in archaeology. Content will be organized around four areas of critical research in...
WSES Handbook of Mass Casualties Incidents Management
This manual, written by world opinion leaders in the field, is designed to provide readily accessible, step-by-step guidance on all aspects of the management of mass casualty incidents. Readers will find a wealth of helpful practical suggestions as well as information on the latest relevant scientific advances and their implications. Globally, mass...
Prevention and Control of Infections in Hospitals
This volume offers extensive information on preventive and infection surveillance procedures, routines and policies adapted to the optimal infection control level needed to tackle today's microbes in hospital practice. It especially focuses on preventive measures for serious hospital infections. Each chapter includes a practical section that a...
Of Cigarettes, High Heels, and Other Interesting Things
This book deals with one the most interesting aspects of human life - the search for meaning. It discusses how the science of semiotics is equipped to provide insight on what meaning is and how we produce it. Why is it that certain people routinely put their survival at risk by smoking? Why is it that some women make locomotion difficult for themse...

1 ... 4 5 6 7 8 ... 12