The SysAdmin Handbook
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere...
Trade Unions on YouTube
This book investigates how trade unions representing different social classes use YouTube videos for renewal purposes. Information and communication technology has undoubtedly offered new opportunities for social movements, but while research suggests that these new means of communication can be used for trade union revitalization, few studies hav...
Hacking Secret Ciphers with Python
There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap. This book is for complete beginners who do not know anything about en...
The Foundations of Hip-Hop Encyclopedia
Deejaying, emceeing, graffiti writing, and breakdancing. Together, these artistic expressions combined to form the foundation of one of the most significant cultural phenomena of the late 20th century - Hip-Hop. Rooted in African American culture and experience, the music, fashion, art, and attitude that is Hip-Hop crossed both racial boundaries an...
Business Communication for Success
Business Communication for Success is adapted from a work produced by a publisher who has requested that they and the original author not receive attribution. Business Communication for Success (BCS) provides a comprehensive, integrated approach to the study and application of written and oral business communication to serve both student and pro...
Android Notes for Professionals
The Android Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
C# Notes for Professionals
The C# Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
JavaScript Notes for Professionals
The JavaScript Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Python Notes for Professionals
The Python Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Operating Systems and Middleware
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
Ruby Notes for Professionals
The Ruby Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Pro Git
Pro Git, 2nd Edition is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented v...
Learn BlackBerry 10 App Development
Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app's UI, and C++/Qt for the application logic. No prior knowledge...
Enabling Asia to Stabilise the Climate
This book presents good practices in Asia and ASEAN countries for effectively promoting advances in response to climate change, which can help to achieve sustainable development in Asia and around the world. As a proposal, the aim is to influence the discussions at COP 21 by providing a positive agenda with concrete actions from an Asian perspectiv...
The Values of Independent Hip-Hop in the Post-Golden Era
Utilizing a mixed-methods approach, this book uncovers the historical trajectory of U.S. independent hip-hop in the post-golden era, seeking to understand its complex relationship to mainstream hip-hop culture and U.S. culture more generally. Christopher Vito analyzes the lyrics of indie hip-hop albums from 2000-2013 to uncover the dominant ideolog...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
Bayesian Methods in the Search for MH370
This book demonstrates how nonlinear/non-Gaussian Bayesian time series estimation methods were used to produce a probability distribution of potential MH370 flight paths. It provides details of how the probabilistic models of aircraft flight dynamics, satellite communication system measurements, environmental effects and radar data were constructed...
Designing Digital Work
"This book could well be the most comprehensive collection to date of integrated ideas on the elicitation, representation, integration and digitization of work processes and collaboration. The authors take a heavily human-centered approach while never losing sight of engineering aspects involved. Rooted in relevant theories, they present a set...
Economic Evaluation of Sustainable Development
This book presents methods to evaluate sustainable development using economic tools. The focus on sustainable development takes the reader beyond economic growth to encompass inclusion, environmental stewardship and good governance. Sustainable Development Goals (SDGs) provide a framework for outcomes. In illustrating the SDGs, the book employs thr...
TouchDevelop
Mobile devices such as smartphones and tablets are set to become the main computers that virtually all people will own and carry with them at all times. And yet,mobile devices are not yet used for all computing tasks. A project at Microsoft Research was created to answer a simple question: "It is possible to create interesting apps directly on...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Programming Languages and Systems
This book constitutes the proceedings of the 27th European Symposium on Programming, ESOP 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018. The 36 papers presented in this volume were carefully reviewed and selected from 114 submissions. The ...
Pro TBB
This book is a modern guide for all C++ programmers to learn Threading Building Blocks (TBB). Written by TBB and parallel programming experts, this book reflects their collective decades of experience in developing and teaching parallel programming with TBB, offering their insights in an approachable manner. Throughout the book the authors present ...
S-BPM Illustrated
S-BPM stands for "subject-oriented business process management" and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for process professionals. Its potential particularly lies in the integration of advanced informati...
Cyber-Physical Systems of Systems
Technical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating to achieve a well-defined objective – form the backbone of most of today's infrastructure. The energy grid, most transportation systems, the global banking industry, the water-supply system, the military equipment, ...
S-BPM in the Wild
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with implications or suggestions for further studies. Significant variables and success factors are identified that...
Time Predictions
Predicting the time needed to complete a project, task or daily activity can be difficult and people frequently underestimate how long an activity will take. This book sheds light on why and when this happens, what we should do to avoid it and how to give more realistic time predictions. It describes methods for predicting time usage in situations ...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Intel Galileo and Intel Galileo Gen 2
Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel Galileo and Intel Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. ...
Designing Sustainable Energy for All
This book addresses the issue of diffusing sustainable energy access inlow- and middle-income contexts. Access to energy is one of the greatest challenges for many people living in low-income and developing contexts, as around 1.4 billion people lack access to electricity.Distributed Renewable Energy systems (DRE) are considered a promising approa...

1 2 3