Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...
Defense against the Black Arts
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
Dissonant Heritages and Memories in Contemporary Europe
This book discusses political, economic, social, and humanitarian challenges that influence both how people deal with their past and how they build their identities in contemporary Europe. Ongoing debates on migration, on local, national, inter- and transnational levels, prove that it is a divisive issue with regards to understanding European integ...
Electronics for Embedded Systems
This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bi...
Laravel 5 Official Documentation
A free ebook version of the Laravel 5.x Official Documentation...
How To Code in Python 3
Extremely versatile and popular among developers, Python is a good general-purpose language that can be used in a variety of applications. For those with an understanding of English, Python is a very humanreadable programming language, allowing for quick comprehension. Because Python supports multiple styles including scripting and object-oriented ...
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
MySQL Notes for Professionals
The MySQL Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Node.js Notes for Professionals
The Node.js Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Python Notes for Professionals
The Python Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
PHP Notes for Professionals
The PHP Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Ruby Notes for Professionals
The Ruby Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
VBA Notes for Professionals
The Visual Basic .NET Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Learning PHP
PHP is a widely-used open source programming language. It is especially suited for web development. The unique thing about PHP is that it serves both beginners as well as experienced developers. It has a low barrier to entry so it is easy to get started with, and at the same time, it provides advanced features offered in other programming languages...
Learning Node.js
Node.js is an event-based, non-blocking, asynchronous I/O framework that uses Google's V8 JavaScript engine. It is used for developing applications that make heavy use of the ability to run JavaScript both on the client, as well as on server side and therefore benefit from the re-usability of code and the lack of context switching. It is open-...
Learning SAS
SAS (Statistical Analysis System) is a statistical software suite for data management, advanced analytics, multivariate analysis, business intelligence, criminal investigation, and predictive analytics. It is an unofficial and free SAS book created for educational purposes. All the content is extracted from Stack Overflow Documentation, which is...
Yapo Saves The Day
Yapo loves to play soccer! But he does not like to pass the ball to his teammates. How will Yapo discover that winning is not only about scoring?...
Across the Sahara
This open book provides a multi-perspective approach to the caravan trade in the Sahara during the 19th century. Based on travelogues from European travelers, recently found Arab sources, historical maps and results from several expeditions, the book gives an overview of the historical periods of the caravan trade as well as detailed information ab...
Linux Command Line for You and Me
The command line is a text interface for your computer. It's a program that takes in commands, which it passes on to the computer's operating system to run. Linux command line for you and me is a open book for newcomers to command line environment....
How To Code in React.js
This open book is an introduction to React that works from the foundations upward. Each chapter takes you a little deeper into the React ecosystem, building on your previous knowledge. Along the way, you'll learn how to maintain internal state, pass information between parts of an application, and explore different options for styling your app...
Help! My Computer is Broken
Want to know how to fix common computer problems, without having to wade through technical jargon? Or are you the family on-call technical support person, and need a bit of help? Help! My Computer Is Broken takes the most common computer problems and tells you how to fix them. It's as simple as that! If you've ever wondered why your la...
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
Ancient Greek I
In this elementary textbook, Philip S. Peek draws on his twenty-five years of teaching experience to present the ancient Greek language in an imaginative and accessible way that promotes creativity, deep learning, and diversity. The course is built on three pillars: memory, analysis, and logic. Readers memorize the top 250 most frequently occurr...
Assemblers And Loaders
Covering the design and implementation of assemblers and loaders, this comprehensive book opens with an introduction to one-pass and two-pass assemblers. Important concepts such as absolute and relocatable object files are discussed, as are assembler features such as local labels and multiple location counters. The format, meaning and implementatio...
Fallibility at Work
'This is an exciting, groundbreaking book. With an astonishing array of examples and a brilliant eye for the essential, Øyvind Kvalnes takes the Socratic motto of knowing yourself to our everyday lives in the workplace. Applied philosophy at its best, the book will affect the way you do your work and live your life.'—Professor Esa Saar...
Rewilding European Landscapes
Some European lands have been progressively alleviated of human pressures, particularly traditional agriculture in remote areas. This book proposes that this land abandonment can be seen as an opportunity to restore natural ecosystems via rewilding. We define rewilding as the passive management of ecological successions having in mind the long-term...
Entrepreneurial Cognition
This book investigates the inter-relationship between the mind and a potential opportunity to explore the psychology of entrepreneurship. Building on recent research, this book offers a broad scope investigation of the different aspects of what goes on in the mind of the (potential) entrepreneur as he or she considers the pursuit of a potential op...
Research On and Activities For Mathematically Gifted Students
This Topical Survey offers a brief overview of the current state of research on and activities for mathematically gifted students around the world. This is of interest to a broad readership, including educational researchers, research mathematicians, mathematics teachers, teacher educators, curriculum designers, doctoral students, and other stakeho...
European Somalis' Post-Migration Movements
Based on a qualitative study on migrants of Somali origin who have settled in Europe for at least a decade, this book offers a ground-breaking exploration of the idea of mobility, both empirically and theoretically. It draws a comprehensive typology of the varied "post-migration mobility practices" developed by these migrants from their c...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Debating Transformations of National Citizenship
This book discusses how national citizenship is being transformed by economic, social and political change. It focuses on the emergence of global markets where citizenship is for sale and on how new reproduction technologies impact citizenship by descent. It also discusses the return of banishment through denationalisation of terrorist suspects, an...
Dynamics of Long-Life Assets
The editors present essential methods and tools to support a holistic approach to the challenge of system upgrades and innovation in the context of high-value products and services. The approach presented here is based on three main pillars: an adaptation mechanism based on a broad understanding of system dependencies; efficient use of system knowl...

1 2 3 ... 5