Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Evaluating Environment in International Development
This book provides novel and in-depth perspectives on evaluating environment and sustainability issues in developing countries. Evaluating Environment in International Development focuses on the approaches and experiences of leading international organizations, not-for-profits, and multilateral and bilateral aid agencies to illustrate how systemati...
Application Delivery and Load Balancing in Microsoft Azure
With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute t...
Taking Kubernetes from Test to Production
With Kubernetes came many new concepts, particularly around networking and traffic management. Alongside these new concepts were entirely new classes of tools, designed for ephemeral, containerized, and distributed application deployments. In particular, Ingress controllers and service meshes did not exist prior to the Kubernetes era. Nor were Laye...
Defense against the Black Arts
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
The Future of Financial Systems in the Digital Age
The increasing capacity of digital networks and computing power, together with the resulting connectivity and availability of "big data", are impacting financial systems worldwide with rapidly advancing deep-learning algorithms and distributed ledger technologies. They transform the structure and performance of financial markets, the serv...
Teaching in the University
Teaching in the University: Learning from Graduate Students and Early Career Faculty provides insight and strategies for successful teaching, advising, and mentoring postsecondary students. In particular, the authors offer support and encouragement for implementing student-centered teaching practices relevant to college classrooms. This book is des...
Computer Networks
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students ...
Professional Web Accessibility Auditing Made Easy
Digital accessibility skills are in high demand, as the world becomes more aware of barriers in digital content that prevent some people from participating in a digital society. These are essential skills for web developers, and essential knowledge for organizations that want to ensure their web content is reaching the broadest audience possible. ...
Presto: The Definitive Guide
Perform fast interactive analytics against different data sources using the Presto high-performance, distributed SQL query engine. With this practical guide, you'll learn how to conduct analytics on data where it lives, whether it's Hive, Cassandra, a relational database, or a proprietary data store. Analysts, software engineers, and prod...
Creative Clinical Teaching in the Health Professions
For healthcare professionals, clinical education is foundational to the learning process. However, balancing safe patient care with supportive learning opportunities for students can be challenging for instructors and the complex social context of clinical learning environments makes intentional teaching approaches essential. Clinical instructors r...
Spring Data Programming Cookbook
Spring Data's mission is to provide a familiar and consistent, Spring-based programming model for data access while still retaining the special traits of the underlying data store. It makes it easy to use data access technologies, relational and non-relational databases, map-reduce frameworks, and cloud-based data services. This is an umbre...
FPGAs for Dummies
Field programmable gate arrays (FPGAs) are integrated circuits that enable designers to program customized digital logic in the field. FPGAs have been around since the 1980s and were originally conceived to give all design teams the ability to create custom logic. In the early days, using an FPGA in your design meant you had to do a lot of programm...
Ansible Succinctly
Ansible is an open-source software, automation engine, and automation language mainly used in software configuration management, infrastructure provisioning, configuration management, application deployment, and orchestration. The core Ansible is written in Python and can be used on Unix-like machines or Microsoft Windows. In Ansible Succinctly, Zo...
Intermediate Statistics with R
Introductory statistics courses prepare students to think statistically but cover relatively few statistical methods. Building on the basic statistical thinking emphasized in an introductory course, a second course in statistics at the undergraduate level can explore a large number of statistical methods. This text covers more advanced graphical su...
Next-Gen 802.11ac Wi-Fi For Dummies
HD movies and videos, gigabyte photo and music collections, extreme games ... today's digital content is bigger and better than ever. And now you (and many others!) are interacting with this content simultaneously on an expanding range of Wi-Fi devices, from smartphones, tablets, and laptops to consumer electronics and appliances. The Wi-Fi of...
Competitive Programmer's Handbook
The purpose of this book is to give you a thorough introduction to competitive programming. It is assumed that you already know the basics of programming, but no previous background in competitive programming is needed. The book is especially intended for students who want to learn algorithms and possibly participate in the International Olympi...
Foundations of Machine Learning
A new edition of a graduate-level machine learning textbook that focuses on the analysis and theory of algorithms. This book is a general introduction to machine learning that can serve as a textbook for graduate students and a reference for researchers. It covers fundamental modern topics in machine learning while providing the theoretical basi...
Towards an Ethic of Autism
What does it mean to say that someone is autistic? Towards an Ethics of Autism is an exploration of this question and many more. In this thoughtful, wide-ranging book, Kristien Hens examines a number of perspectives on autism, including psychiatric, biological, and philosophical, to consider different ways of thinking about autism, as well as it...
Making AI Intelligible
Can humans and artificial intelligences share concepts and communicate? Making AI Intelligible shows that philosophical work on the metaphysics of meaning can help answer these questions. Herman Cappelen and Josh Dever use the externalist tradition in philosophy to create models of how AIs and humans can understand each other. In doing so, they ill...
Beej's Guide to C Programming
This is an intro to C for folks who already know how to program in another language. The first half of the book is written in a tutorial style, while the second half is a reference section complete with examples (inspired by the incomparable Turbo C Bible). The goal is to keep this up-to-date with the latest C standards. This guide assumes that ...
Beej's Guide to Network Programming
Back in the mid 90s, Beej got tired of all his friends asking him how to do this stuff with networking programming in C, so he put pen to paper on the early World Wide Web and wrote down everything he knew just to get them off his back. Since then, the Guide has expanded significantly, with plenty of examples, and covers IPv6. Inside you'll fi...
NGINX Cookbook
NGINX is one of the most widely used web servers available today, in part because of itscapabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical recipes help you set up and use either the open source...
Shaping the Digital Dissertation
Digital dissertations have been a part of academic research for years now, yet there are still many questions surrounding their processes. Are interactive dissertations significantly different from their paper-based counterparts? What are the effects of digital projects on doctoral education? How does one choose and defend a digital dissertation? T...
MonoGame Role-Playing Game Development Succinctly
For MonoGame developers looking to build their own role-playing game, this ebook is an essential guide. Authors Jim Perry and Charles Humphrey break down design complexities into smaller topics that are easy to think through to help you produce a working game. Learn how to animate sprites, construct conversation trees, build multilevel maps, manage...
Algorithms for Decision Making
A broad introduction to algorithms for decision making under uncertainty, introducing the underlying mathematical problem formulations and the algorithms for solving them. Automated decision-making systems or decision-support systems - used in applications that range from aircraft collision avoidance to breast cancer screening - must be designed...
Anonymous Point Collection
This book is a comprehensive, formal treatment of anonymous point collection. The proposed definition does not only provide a strong notion of security and privacy, but also covers features which are important for practical use. An efficient realization is presented and proven to fulfill the proposed definition. The resulting building block is the ...
Open Workbook of Cryptology
Everyone needs a little cryptology. The problem with crypto is that it has a reputation of being very hard and mysterious, as well as very easy to get wrong. While there are aspects of crypto that are connected to quite modern and complex theories - such as number theory, an old and deep branch of mathematics; complexity theory, a new(er) and su...
Resilient Web Design
Resilient Web Design, you might think that this is a handbook for designing robust websites. This is not a handbook. It's more like a history book. But in the world of web design, we are mostly preoccupied with the here and now. When we think beyond our presentmoment, it is usually to contemplate the future - to imaginethe devices, features...
How To Do Science
How To Do Science has been written for students of the life sciences who are actively engaged in the scientific process. This guide introduces you to what it means to be a scientist. You will learn about the scientific method and how to carry out many tasks of a scientist, including: designing experiments, visualising data, accessing scientific lit...
A Treatise on Systems (volume 2)
This 2d volume describes the systematic application of Promise Theory to systems, representing a significant step forward in describing functional systems with both dynamics and semantics. By combining quantitative and qualitative descriptions in a single framework, Promise Theory provides the first impartial language for multiscale system phenomen...
Introduction to Autonomous Robots
This book provides an algorithmic perspective to autonomous robotics to students with a sophomore-level of linear algebra and probability theory. Robotics is an emerging field at the intersection of mechanical engineering, electrical engineering, and computer science. With computers becoming more powerful, making robots smart is getting more and mo...
Introduction to Embedded Systems
An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems. The most visible use of computers and software is processing information for human consumption. The vast majority of computers in use, however, are much less visible. They run the engine, brakes, seatbelts,...

1 ... 28 29 30 31 32