The Kademlia Protocol Succinctly
With its novel XOR-based metric topology, Kademlia is the first peer-to-peer system to combine provable consistency and performance, latency-minimizing routing, and a symmetric, unidirectional topology. In The Kademlia Protocol Succinctly, author Marc Clifton leads readers through the positive aspects of Kademlia's decentralized specifications. He ...
Biotechnologies for Plant Mutation Breeding
This book offers 19 detailed protocols on the use of induced mutations in crop breeding and functional genomics studies, which cover topics including chemical and physical mutagenesis, phenotypic screening methods, traditional TILLING and TILLING by sequencing, doubled haploidy, targeted genome editing, and low-cost methods for the molecular charac...
Pre-Field Screening Protocols for Heat-Tolerant Mutants in Rice
This book presents simple, robust pre-field screening protocols that allow plant breeders to screen for enhanced tolerance to heat stress in rice. Two critical heat-sensitive stages in the lifecycle of the rice crop are targeted – the seedling and flowering stages – with screening based on simple phenotypic responses. The protocols are based on...
Protocols for Pre-Field Screening of Mutants for Salt Tolerance in Rice, Wheat and Barley
This book offers effective, low-cost and user-friendly protocols for the pre-field selection of salt-tolerant mutants in cereal crops. It presents simple methods for measuring soil salinity, including soil sampling and the analysis of water-soluble salts, and describes a detailed, but simple, screening test for salt tolerance in rice, wheat and bar...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Low-Cost Methods for Molecular Characterization of Mutant Plants
This book offers low-cost and rapid molecular assays for the characterization of mutant plant germplasm. Detailed protocols are provided for the desiccation of plant tissues; the extraction of high-quality DNA for downstream applications; the extraction of single-strand-specific nucleases for single nucleotide polymorphism; and small insertion/dele...
Rethinking the Internet of Things
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
Lightweight Systems for Realtime Monitoring
If you're looking to access and make sense of all your data in real time, there's a more cost-effective and efficient way than using expensive commercial tool suites. In this O'Reilly report, Sam Newman from ThoughtWorks describes several small, freely available open source tools and frameworks for freeing data locked up in silos and letting it flo...
One Hundred Years of Chemical Warfare: Research, Deployment, Consequences
Carried by a long-awaited wind, the chlorine cloud passed within a few minutes through the British and French trenches, leaving behind at least 1,000 dead and 4,000 injured. This chemical attack, which amounted to the first use of a weapon of mass destruction, marks a turning point in world history. The preparation as well as the execution of the g...
Guideline for Salinity Assessment, Mitigation and Adaptation Using Nuclear and Related Techniques
This book is an outcome of the collaboration between the Soil and Water Management & Crop Nutrition Section, Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture, Department of Nuclear Sciences and Applications, International Atomic Energy Agency (IAEA), Vienna, Austria, and the International Center for Biosaline Agricultur...
Asterisk: The Future of Telephony
This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control ...
802.11ac: A Survival Guide
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring. Author Matthew Gast - an industry expert who led the development of ...
Security Infrastructure Technology for Integrated Utilization of Big Data
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especia...
MERS Coronavirus
This volume provides various techniques and methodologies currently used in the study of MERS-CoV. Chapters are divided into four parts detailing evolution and entry of MERS-coronavirus, genetic alteration and structural determination of MERS-coronavirus proteins, quantitation of virus and anti-viral factors, and mouse models for MERS -coronavirus....
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
Objective-C Notes for Professionals
The Objective-C Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Great Policy Successes
With so much media and political criticism of their shortcomings and failures, it is easy to overlook the fact that many governments work pretty well much of the time. Great Policy Successes turns the spotlight on instances of public policy that are remarkably successful. It develops a framework for identifying and assessing policy successes, payin...
Swift Notes for Professionals
The Swift Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Satellite Earth Observations and Their Impact on Society and Policy
The result of a workshop bringing together an international advisory board of experts in science, satellite technologies, industry innovations, and public policy, this book addresses the current and future roles of satellite Earth observations in solving large-scale environmental problems. The book showcases the results of engaging distinct communi...
Collaborating Against Child Abuse
This edited collection explores the background and implementation of the Nordic Barnahus (or 'Children's House') model – recognised as one of the most important reforms related to children who are the victims of crime in the Nordic region. This book discusses both its potential to affect change and the challenges facing it. The model was introduc...
Data and Text Processing for Health and Life Sciences
This book is a step-by-step introduction on how shell scripting can help solve many of the data processing tasks that Health and Life specialists face everyday with minimal software dependencies. The examples presented in the book show how simple command line tools can be used and combined to retrieve data and text from web resources, to filter and...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Implementation of EU Readmission Agreements
By examining the implementation dynamics of EU Readmission Agreements (EURAs), this book addresses the practical reasons why irregular immigrants cannot be expelled. EURAs are one of the vital legal instruments framing EU external migration law with regard to the expulsion of irregular immigrants, yet their implementation has met with various obsta...
Access to Online Resources
The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and authorisation. It helps readers understand web based authentication and provides the fundamentals of IP addres...
Cloud Native Applications
Cloud computing is a game changer. Being able to automate and constantly adjust infrastructure is one important reason to use cloud computing for your clients. And developing and operating systems that are able to recover from failure automatically has never been easier. Cloud providers offer you the needed infrastructure for a very reasonable pric...
Statistical Population Genomics
This open access volume presents state-of-the-art inference methods in population genomics, focusing on data analysis based on rigorous statistical techniques. After introducing general concepts related to the biology of genomes and their evolution, the book covers state-of-the-art methods for the analysis of genomes in populations, including demog...
Handbook on Craniofacial Superimposition
This free book is the first comprehensive guide to a new soft computing technique which is used in complex forensic cases. The chapters include detailed technical and practical overviews, and discussions about the latest tools, open problems and ethical and legal issues involved. The book will be of interest to researchers and practitioners in fore...
Early Geometrical Thinking in the Environment of Patterns, Mosaics and Isometries
This book discusses the learning and teaching of geometry, with a special focus on kindergarten and primary education. It examines important new trends and developments in research and practice, and emphasizes theoretical, empirical and developmental issues. Further, it discusses various topics, including curriculum studies and implementation, spat...
Bioimage Data Analysis Workflows
This Open Access textbook provides students and researchers in the life sciences with essential practical information on how to quantitatively analyze data images. It refrains from focusing on theory, and instead uses practical examples and step-by step protocols to familiarize readers with the most commonly used image processing and analysis platf...
RESTful Web Services
You've built web sites that can be used by humans. But can you also build web sites that are usable by machines? That's where the future lies, and that's what RESTful Web Services shows you how to do. The World Wide Web is the most popular distributed application in history, and Web services and mashups have turned it into a powerful distributed co...
Linux Appliance Design
Modern appliances are complex machines with processors, operating systems, and application software. While there are books that will tell you how to run Linux on embedded hardware, and books on how to build a Linux application, Linux Appliance Design is the first book to demonstrate how to merge the two and create a Linux appliance. You'll see for ...

1 2