Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly, ...
Dissonant Heritages and Memories in Contemporary Europe
This book discusses political, economic, social, and humanitarian challenges that influence both how people deal with their past and how they build their identities in contemporary Europe. Ongoing debates on migration, on local, national, inter- and transnational levels, prove that it is a divisive issue with regards to understanding European integ...
Electronics for Embedded Systems
This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bi...
Laravel 5 Official Documentation
A free ebook version of the Laravel 5.x Official Documentation...
How To Code in Python 3
Extremely versatile and popular among developers, Python is a good general-purpose language that can be used in a variety of applications. For those with an understanding of English, Python is a very humanreadable programming language, allowing for quick comprehension. Because Python supports multiple styles including scripting and object-oriented ...
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
MySQL Notes for Professionals
The MySQL Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Node.js Notes for Professionals
The Node.js Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Python Notes for Professionals
The Python Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
PHP Notes for Professionals
The PHP Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Ruby Notes for Professionals
The Ruby Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Fallibility at Work
'This is an exciting, groundbreaking book. With an astonishing array of examples and a brilliant eye for the essential, Øyvind Kvalnes takes the Socratic motto of knowing yourself to our everyday lives in the workplace. Applied philosophy at its best, the book will affect the way you do your work and live your life.'—Professor Esa Saarinen, Aalt...
Rewilding European Landscapes
Some European lands have been progressively alleviated of human pressures, particularly traditional agriculture in remote areas. This book proposes that this land abandonment can be seen as an opportunity to restore natural ecosystems via rewilding. We define rewilding as the passive management of ecological successions having in mind the long-term...
Entrepreneurial Cognition
This book investigates the inter-relationship between the mind and a potential opportunity to explore the psychology of entrepreneurship. Building on recent research, this book offers a broad scope investigation of the different aspects of what goes on in the mind of the (potential) entrepreneur as he or she considers the pursuit of a potential op...
Research On and Activities For Mathematically Gifted Students
This Topical Survey offers a brief overview of the current state of research on and activities for mathematically gifted students around the world. This is of interest to a broad readership, including educational researchers, research mathematicians, mathematics teachers, teacher educators, curriculum designers, doctoral students, and other stakeho...
European Somalis' Post-Migration Movements
Based on a qualitative study on migrants of Somali origin who have settled in Europe for at least a decade, this book offers a ground-breaking exploration of the idea of mobility, both empirically and theoretically. It draws a comprehensive typology of the varied "post-migration mobility practices" developed by these migrants from their c...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Debating Transformations of National Citizenship
This book discusses how national citizenship is being transformed by economic, social and political change. It focuses on the emergence of global markets where citizenship is for sale and on how new reproduction technologies impact citizenship by descent. It also discusses the return of banishment through denationalisation of terrorist suspects, an...
Dynamics of Long-Life Assets
The editors present essential methods and tools to support a holistic approach to the challenge of system upgrades and innovation in the context of high-value products and services. The approach presented here is based on three main pillars: an adaptation mechanism based on a broad understanding of system dependencies; efficient use of system knowl...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Fashion Figures
Missy Maker is a middle school girl who loves math and fashion. She sees math in everything she does. She tries to hide this from her friends, because she thinks it's too geeky. Missy hears that the school math club needs more members, but she's worried about what her friends will think if she joins, and she's already committed to joining the fashi...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Martin Waldseemüller's 'Carta marina' of 1516
This book presents the first detailed study of one of the most important masterpieces of Renaissance cartography, Martin Waldseemüller's Carta marina of 1516. By transcribing, translating into English, and detailing the sources of all of the descriptive texts on the map, as well as the sources of many of the images, the book makes the map availabl...
Error-Correction Coding and Decoding
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the boo...
Access to Online Resources
The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and authorisation. It helps readers understand web based authentication and provides the fundamentals of IP addres...
Optimizing HPC Applications with Intel Cluster Tools
Optimizing HPC Applications with Intel Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve...
The Future of the Law of the Sea
It explores the diverse phenomena which are challenging the international law of the sea today, using the unique perspective of a simultaneous analysis of the national, individual and common interests at stake. This perspective, which all the contributors bear in mind when treating their own topic, also constitutes a useful element in the effort to...
Using Blocks in Ruby
Unannounced and unmarked, blocks turn up all over Ruby programs. Their use ranges from some of Ruby's most basic structures, such as loops, to some of its most sophisticated tricks. Similar to closures or lambdas in other languages, blocks enable some of Ruby's vaunted efficiency. Blocks even allow other people to write some of the code you use. ...
The Chinese Economic Transformation
The Chinese Economic Transformation, the 19th volume in the China Update book series, provides an opportunity for young economists to share their views on various issues relating to the Chinese economic transformation. More than half of the contributors to this book are female scholars. Some of the contributors are rising stars in the studies of th...
Software Above the Level of a Single Device
When considering "the Internet of Things," it's easy to miss the bigger pattern: we are no longer just building software for individual devices, but creating networks of intelligence and action that make it possible to completely rethink how we organize work, play, and society itself. This report provides the complete text of Tim O'Reilly...
Agile Development for Serverless Platforms
You need more than great dev tools to release great software; you need an efficient pipeline that takes advantage of modern Agile development practices. Serverless platforms like AWS offer the basic building blocks you need to run code, store data, or process streaming information so you can focus on the features you want to provide, not get bogged...
Think Bayes
If you know how to program with Python and also know a little about probability, you're ready to tackle Bayesian statistics. With this book, you'll learn how to solve statistical problems with Python code instead of mathematical notation, and use discrete probability distributions instead of continuous mathematics. Once you get the math out of the ...

1 2 3