Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Mitteleuropa
Vienna, the capital of the Austro-Hungarian Empire, but in a world in which the First World War did not take place: a man disappears. Ludwig Pechstein, of the Pechstein Security and Investigations Agency, is asked to investigate, The trail leads to gruesome secret chemical warfare research programmes, a land commune in Switzerland, smugglers of ava...
Symfony
The Symfony Framework is well-known for being really flexible and is used to build micro-sites, enterprise applications that handle billions of connections and even as the basis for other frameworks. Since its release in July 2011, the community has learned a lot about what's possible and how to do things best. These community resources - l...
Algebra
This open book is an introduction to algebra for undergraduates who are interested in careers which require a strong background in mathematics. It will benefit students studying computer science and physical sciences, who plan to teach mathematics in schools, or to work in industry or finance. The book assumes that the reader has a solid background...
Notes on Randomized Algorithms
Lecture notes for the Yale Computer Science course CPSC 469/569 Randomized Algorithms. Suitable for use as a supplementary text for an introductory graduate or advanced undergraduate course on randomized algorithms. Discusses tools from probability theory, including random variables and expectations, union bound arguments, concentration bounds, app...
Teaching in the University
Teaching in the University: Learning from Graduate Students and Early Career Faculty provides insight and strategies for successful teaching, advising, and mentoring postsecondary students. In particular, the authors offer support and encouragement for implementing student-centered teaching practices relevant to college classrooms. This book is des...
Computer Networks
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students ...
Competitive Programmer's Handbook
The purpose of this book is to give you a thorough introduction to competitive programming. It is assumed that you already know the basics of programming, but no previous background in competitive programming is needed. The book is especially intended for students who want to learn algorithms and possibly participate in the International Olympi...
Debugging with GDB
The GNU Debugger allows you to see what is going on "inside" a program while it executes - or what a program was doing at the moment it crashed. GDB supports C, C++, Java, Fortran and Assembly among other languages; it is also designed to work closely with the GNU Compiler Collection (GCC). The GNU Debugger Program has four special featur...
The Svelte Handbook
Svelte is an exciting Web framework that offers a fresh new take on how to build Web applications. If you are already experienced in React, Vue, Angular or other frontend frameworks you might be pleasantly surprised by Svelte. My first impression with Svelte was that it all feels so much more like plain JavaScript than working with other fram...
Beej's Guide to C Programming
This is an intro to C for folks who already know how to program in another language. The first half of the book is written in a tutorial style, while the second half is a reference section complete with examples (inspired by the incomparable Turbo C Bible). The goal is to keep this up-to-date with the latest C standards. This guide assumes that ...
Beej's Guide to Network Programming
Back in the mid 90s, Beej got tired of all his friends asking him how to do this stuff with networking programming in C, so he put pen to paper on the early World Wide Web and wrote down everything he knew just to get them off his back. Since then, the Guide has expanded significantly, with plenty of examples, and covers IPv6. Inside you'll fi...
Guaranteed Verification of Dynamic Systems
This work introduces a new specification and verification approach for dynamic systems. The introduced approach is able to provide type II error free results by definition, i.e. there are no hidden faults in the verification result. The approach is based on Kaucher interval arithmetic to enclose the measurement in a bounded error sense. The develop...
Anonymous Point Collection
This book is a comprehensive, formal treatment of anonymous point collection. The proposed definition does not only provide a strong notion of security and privacy, but also covers features which are important for practical use. An efficient realization is presented and proven to fulfill the proposed definition. The resulting building block is the ...
Open Workbook of Cryptology
Everyone needs a little cryptology. The problem with crypto is that it has a reputation of being very hard and mysterious, as well as very easy to get wrong. While there are aspects of crypto that are connected to quite modern and complex theories - such as number theory, an old and deep branch of mathematics; complexity theory, a new(er) and su...
Algorithmic Aspects of Machine Learning
This course is organized around algorithmic issues that arise in machine learning. Modern machine learning systems are often built on top of algorithms that do not have provable guarantees, and it is the subject of debate when and why they work. In this class, we focus on designing algorithms whose performance we can rigorously analyze for fundamen...
Resilient Web Design
Resilient Web Design, you might think that this is a handbook for designing robust websites. This is not a handbook. It's more like a history book. But in the world of web design, we are mostly preoccupied with the here and now. When we think beyond our presentmoment, it is usually to contemplate the future - to imaginethe devices, features...
A Treatise on Systems (volume 1)
Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this boo...
A Treatise on Systems (volume 2)
This 2d volume describes the systematic application of Promise Theory to systems, representing a significant step forward in describing functional systems with both dynamics and semantics. By combining quantitative and qualitative descriptions in a single framework, Promise Theory provides the first impartial language for multiscale system phenomen...
Geometry with an Introduction to Cosmic Topology
Geometry with an Introduction to Cosmic Topology approaches geometry through the lens of questions that have ignited the imagination of stargazers since antiquity. What is the shape of the universe? Does the universe have an edge? Is it infinitely big? This text develops non-Euclidean geometry and geometry on surfaces at a level appropriate for ...
Image Processing for Engineers
This is an image processing textbook with a difference. Instead of just a picture gallery of before-and-after images, we provide (on the accompanying website) MATLAB programs (.m files) and images (.mat files) for each of the examples. These allow the reader to experiment with various parameters, such as noise strength, and see their effect on the ...
Practical Node.js
Learn how to build a wide range of scalable real-world web applications using a professional development toolkit. If you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages.With this book, you'll work with a varied collection of standards and framework...
Game Hacking Academy
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o...
The Julia Express
Julia is a high-level, dynamic programming language. Its features are well suited for numerical analysis and computational science. Julia works with other languages (C, Python, R, Rust, C++, SQL, JavaScript, ...) The Purpose of this open book is to introduce programmers to the Julia programming by example. This is a simplified exposition of the l...
Java Everywhere Again with DukeScript
For many years, Java Swing enabled developers to write applications that could run on any operating system. That all came to an end with the arrival of smart phones, tablets, and embedded computers. In the enterprise, the desktop dominated for many years. In the meantime, however, almost every IT project includes plans for a future where the app...
Learn Ruby on Rails: Book One
This book contains the background that's missing from other tutorials. Here you'll learn key concepts so you'll have a solid foundation for continued study. Whether you choose to continue with another book in this series, a video course, or a code school, everything will make sense when you start here. You can read this book anywh...
Learn Ruby on Rails: Book Two
In this book, you'll build a working web application so you'll gain hands-on experience. Along the way, you'll practice techniques used by professional Rails developers. And I'll help you understand why Rails is a popular choice for web development. Read Book One to get the big picture that's missing from other tutorials...
Erlang Handbook
Erlang is the result of a project at Ericsson's Computer Science Laboratory to improve the programming of telecommunication applications. A critical requirement was supporting the characteristics of such applications, that include: massive concurrency, fault-tolerance, isolation, dynamic code upgrading at runtime, transactions. Throughout t...
Clojure In Small Pieces
Rich Hickey invented Clojure. This is a fork of the project to experiment with literate programming as a development and documentation technology. Clojure is a break with the past traditions of Lisp. This literate fork is a break with the past traditions of code development. As such it is intended as an experiment, not a replacement or competiti...

1 ... 4 5 6