Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Mathematical Logic and Its Applications 2020
The issue "Mathematical Logic and Its Applications 2020" contains articles related to the following three directions: I. Descriptive Set Theory (3 articles). Solutions for long-standing problems, including those of A. Tarski and H. Friedman, are presented. II. Exact combinatorial optimization algorithms, in which the complexity rela...
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
Open softwear
Open Softwear is a book about fashion and technology. More precisely it is a book about Arduino boards, conductive fabric, resistive thread, soft buttons, LEDs, and some other things. Authors got the chance to come together to write down their conclusions in the form of an illustrated book aiming at students and professionals trying to enter the...
Azure Virtual Desktop Succinctly
Put simply, Azure Virtual Desktop is a way to serve Windows resources over the internet. You can deliver an entire desktop or specific applications, and your users can access them anywhere, on any device. In Azure Virtual Desktop Succinctly, author Marco Moioli provides a thorough overview of the service, covering how it can enhance your organizati...
The Enterprise Path to Service Mesh Architectures
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This updated report answers common questions regarding service mesh architectures ...
Defense against the Black Arts
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
Algebra
This open book is an introduction to algebra for undergraduates who are interested in careers which require a strong background in mathematics. It will benefit students studying computer science and physical sciences, who plan to teach mathematics in schools, or to work in industry or finance. The book assumes that the reader has a solid background...
Performing Deception
In Performing Deception, Brian Rappert reconstructs the practice of entertainment magic by analysing it through the lens of perception, deception and learning, as he goes about studying conjuring himself. Through this novel meditation on reasoning and skill, Rappert elevates magic from the undertaking of mere trickery to an art that offers the b...
Open Workbook of Cryptology
Everyone needs a little cryptology. The problem with crypto is that it has a reputation of being very hard and mysterious, as well as very easy to get wrong. While there are aspects of crypto that are connected to quite modern and complex theories - such as number theory, an old and deep branch of mathematics; complexity theory, a new(er) and su...
The Power of Music
Building on her earlier work, The Power of Music: A Research Synthesis of the Impact of Actively Making Music on the Intellectual, Social and Personal Development of Children and Young People, this volume by Susan Hallam and Evangelos Himonides is an important new resource in the field of music education, practice, and psychology. A well signposted...
Network Virtualization and Cloud Computing
As businesses move more toward cloud computing, one important factor for success is adopting multi-tenant software-defined networking (SDN) solutions in data centers. Hyper-V Network Virtualization (HNV) is a key enabler for a multi-tenant SDN solution and is essential for implementing a hybrid cloud environment where tenants can bring not only the...
Engineering Mechanics: Statics
Introduction to engineering mechanics: statics, for those who love to learn. Concepts include: particles and rigid body equilibrium equations, distributed loads, shear and moment diagrams, trusses, method of joints and sections, & inertia. This is the first of two courses to describe how objects move and the forces that cause motion. This co...
Under the Hood of .NET Memory Management
This book starts with an introduction to the core concepts of .NET memory management and garbage collection, and then quickly layers on additional details and intricacies. Once you're up to speed, you can dive into the guided troubleshooting tour, and tips for engineering your application to maximise performance. And to finish off, take a look...

1 ... 8 9 10