Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
The SysAdmin Handbook
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere...
Kafka: The Definitive Guide
Every enterprise application creates data, whether it consists of log messages, metrics, user activity, or outgoing messages. Moving all this data is just as important as the data itself. With this updated edition, application architects, developers, and production engineers new to the Kafka streaming platform will learn how to handle data in motio...
Trade Unions on YouTube
This book investigates how trade unions representing different social classes use YouTube videos for renewal purposes. Information and communication technology has undoubtedly offered new opportunities for social movements, but while research suggests that these new means of communication can be used for trade union revitalization, few studies hav...
Hacking Secret Ciphers with Python
There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap. This book is for complete beginners who do not know anything about en...
The Foundations of Hip-Hop Encyclopedia
Deejaying, emceeing, graffiti writing, and breakdancing. Together, these artistic expressions combined to form the foundation of one of the most significant cultural phenomena of the late 20th century - Hip-Hop. Rooted in African American culture and experience, the music, fashion, art, and attitude that is Hip-Hop crossed both racial boundaries an...
Business Communication for Success
Business Communication for Success is adapted from a work produced by a publisher who has requested that they and the original author not receive attribution. Business Communication for Success (BCS) provides a comprehensive, integrated approach to the study and application of written and oral business communication to serve both student and pro...
Android Notes for Professionals
The Android Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
C# Notes for Professionals
The C# Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
JavaScript Notes for Professionals
The JavaScript Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Python Notes for Professionals
The Python Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Operating Systems and Middleware
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
Ruby Notes for Professionals
The Ruby Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
B C, Before Computers
The idea that the digital age has revolutionized our day-to-day experience of the world is nothing new, and has been amply recognized by cultural historians. In contrast, Stephen Robertson's BC: Before Computers is a work which questions the idea that the mid-twentieth century saw a single moment of rupture. It is about all the things that we ...
Java-Based Real-Time Programming
Development of embedded software has for some years mainly been carried out by hardware-aware programming using the C-language, and in some cases even in assembly languages. This works well in simple cases when the application demands and the hardware are known at design time, and the size of the (statically defined) software is small. When applica...
Learning JavaScript
JavaScript is a programming language that conforms to the ECMAScript specification. It is an unofficial and free JavaScript ebook created for educational purposes. All the content is extracted from Stack Overflow Documentation, which is written by many hardworking individuals at Stack Overflow....
Learning C#
C# is a general-purpose, modern and object-oriented programming language pronounced as "C sharp". It is an unofficial and free C# ebook created for educational purposes. All the content is extracted from Stack Overflow Documentation, which is written by many hardworking individuals at Stack Overflow....
Learning SAP ABAP
ABAP (Advanced Business Application Programming) is a high-level programming language developed by SAP for programming business applications in the SAP environment. It is an unofficial and free SAP ABAP book created for educational purposes. All the content is extracted from Stack Overflow Documentation, which is written by many hardworking indivi...
Text Mining with R
Much of the data available today is unstructured and text-heavy, making it challenging for analysts to apply their usual data wrangling and visualization tools. With this practical book, you'll explore text-mining techniques with tidytext, a package that authors Julia Silge and David Robinson developed using the tidy principles behind R packag...
The Power of Our Words
Do you know that an empowering word can spark ideas, open doors, change attitudes, and create solutions? Words can do all these things and much more. They have the potency to redefine personalities, lives, and entire communities. Just think of some of the things words are used for every day: - To communicate a message - To express a feeling -...
100 Laravel Quick Tips
Laravel is full of hidden gems, undocumented or less-known features, functions parameters and "hacks". While finding them in work of my team, I decided to compile them into an ebook....
OOP - Learn Object Oriented Thinking and Programming
You can find a whole range of programming textbooks intended for complete beginners. However, this one is exceptional to certain extent. The whole textbook is designed as a record of the dialogue of the author with his daughter who wants to learn programming. The author endeavors not to explain the Java programming language to the readers, but to t...
Architecture Patterns with Python
As Python continues to grow in popularity, projects are becoming larger and more complex. Many Python developers are taking an interest in high-level software design patterns such as hexagonal/clean architecture, event-driven architecture, and the strategic patterns prescribed by domain-driven design (DDD). But translating those patterns into Pytho...
Advanced Professional Communication
This open textbook supports the learning outcomes of Fanshawe College's Advanced Professional Communications curriculum (COMM 6019). Organized in five major units - Foundational Principles of Business Messaging, The Principles of Business Style, Format, and Composition, The Principles of Social, Cultural and Employment Communication, The Princ...
Pro Git
Pro Git, 2nd Edition is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented v...
Learn BlackBerry 10 App Development
Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app's UI, and C++/Qt for the application logic. No prior know...
Enabling Asia to Stabilise the Climate
This book presents good practices in Asia and ASEAN countries for effectively promoting advances in response to climate change, which can help to achieve sustainable development in Asia and around the world. As a proposal, the aim is to influence the discussions at COP 21 by providing a positive agenda with concrete actions from an Asian perspectiv...
The Values of Independent Hip-Hop in the Post-Golden Era
Utilizing a mixed-methods approach, this book uncovers the historical trajectory of U.S. independent hip-hop in the post-golden era, seeking to understand its complex relationship to mainstream hip-hop culture and U.S. culture more generally. Christopher Vito analyzes the lyrics of indie hip-hop albums from 2000-2013 to uncover the dominant ideolog...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
Bayesian Methods in the Search for MH370
This book demonstrates how nonlinear/non-Gaussian Bayesian time series estimation methods were used to produce a probability distribution of potential MH370 flight paths. It provides details of how the probabilistic models of aircraft flight dynamics, satellite communication system measurements, environmental effects and radar data were constructed...
Designing Digital Work
"This book could well be the most comprehensive collection to date of integrated ideas on the elicitation, representation, integration and digitization of work processes and collaboration. The authors take a heavily human-centered approach while never losing sight of engineering aspects involved. Rooted in relevant theories, they present a set...

1 2 3 ... 5