The SysAdmin Handbook
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere...
Trade Unions on YouTube
This book investigates how trade unions representing different social classes use YouTube videos for renewal purposes. Information and communication technology has undoubtedly offered new opportunities for social movements, but while research suggests that these new means of communication can be used for trade union revitalization, few studies hav...
The Values of Independent Hip-Hop in the Post-Golden Era
Utilizing a mixed-methods approach, this book uncovers the historical trajectory of U.S. independent hip-hop in the post-golden era, seeking to understand its complex relationship to mainstream hip-hop culture and U.S. culture more generally. Christopher Vito analyzes the lyrics of indie hip-hop albums from 2000-2013 to uncover the dominant ideolog...
Bayesian Methods in the Search for MH370
This book demonstrates how nonlinear/non-Gaussian Bayesian time series estimation methods were used to produce a probability distribution of potential MH370 flight paths. It provides details of how the probabilistic models of aircraft flight dynamics, satellite communication system measurements, environmental effects and radar data were constructed...
Programming Languages and Systems
This book constitutes the proceedings of the 27th European Symposium on Programming, ESOP 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018. The 36 papers presented in this volume were carefully reviewed and selected from 114 submissions. The ...
S-BPM Illustrated
S-BPM stands for "subject-oriented business process management" and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for process professionals. Its potential particularly lies in the integration of advanced informati...
S-BPM in the Wild
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with implications or suggestions for further studies. Significant variables and success factors are identified that...
Cloud Native Applications
Cloud computing is a game changer. Being able to automate and constantly adjust infrastructure is one important reason to use cloud computing for your clients. And developing and operating systems that are able to recover from failure automatically has never been easier. Cloud providers offer you the needed infrastructure for a very reasonable pric...
Programming for Computations - Python
This book presents computer programming as a key method for solving mathematical problems. This second edition of the well-received book has been extensively revised: All code is now written in Python version 3.6 (no longer version 2.7). In addition, the two first chapters of the previous edition have been extended and split up into five new chapte...
Contextual Process Digitalization
This free book presents an overview and step-by-step explanation of process management. It starts with the individual participants' perspectives on their work in a process and its structuring and harmonization, and then moves on to its specification in a model and how it is embedded in the organizational and IT environment of the company. Lastly, t...
Linux Appliance Design
Modern appliances are complex machines with processors, operating systems, and application software. While there are books that will tell you how to run Linux on embedded hardware, and books on how to build a Linux application, Linux Appliance Design is the first book to demonstrate how to merge the two and create a Linux appliance. You'll see for ...
CS Unplugged
Computers are everywhere. We all need to learn how to use them, and many of us use them every day. But how do they work? How do they think? And how can people write software that is fast and easy to use? Computer science is a fascinating subject that explores these very questions. The easy and fun activities in this book, designed for studentren of...
Hacking Secret Ciphers with Python
There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap. This book is for complete beginners who do not know anything about en...
Blown to Bits
For thousands of years, people have been saying that the world is changing and will never again be the same. Yet the profound changes happening today are different, because they result from a specific technological development. It is now possible, in principle, to remember everything that anyone says, writes, sings, draws, or photographs. Everythi...
LaTeX in 24 Hours
This book presents direct and concise explanations and examples to many LaTeX syntax and structures, allowing students and researchers to quickly understand the basics that are required for writing and preparing book manuscripts, journal articles, reports, presentation slides and academic theses and dissertations for publication. Unlike much of th...
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Elixir Succinctly
Author Emanuele DelBono guides readers along the first steps of mastering the Elixir programming language in Elixir Succinctly. Providing a brief overview of Elixir's history and purpose and clear instructions to create an app with Elixir, DelBono makes it easy for developers who wish to add a new language to their repertoire....
Akka.NET Succinctly
Akka.NET is an open-source actor model framework written exclusively for Microsoft.NET in C# and compatible with .NET Core. It simplifies the building of scalable, concurrent, high-throughput, and low-latency systems, making life for software developers a bit easier. Zoran Maksimovic's Akka.NET Succinctly will show readers what an actor model is an...
Networking with the Micro:bit
This book presents a series of activities to teach the basics of computer networks. While you will not learn all aspects of computer networking, we hope that it will serve as a good starting point. To network micro:bits, we use custom micro:bit radio to radio communication. When one hears the word radio, what comes to mind is the radio that blas...
Cloud Design Patterns
Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to pro...
Operating Systems and Middleware
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
Learning Zeromq
Even connecting a few programs across a few sockets is plain nasty when you start to handle real life situations. Trillions? The cost would be unimaginable. Connecting computers is so difficult that software and services to do this is a multi-billion dollar business. So today we're still connecting applications using raw UDP and TCP, proprietary pr...
Microsoft Office 365
Office 365 is Microsoft's smart and simple answer to cloud computing. Using the various programs in Office 365, you can do all the tasks you're used to doing in your favorite Office applications - write documents, create presentations, check email, manage your calendar, crunch numbers, and more - and then share what you create in real time on a tea...