Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Building Secure and Reliable Systems
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best prac...
Case Studies in Infrastructure Change Management
The Infrastructure Change Management (ICM) program at Google drives migrations, deprecations, and other large-scale infrastructure changes. Case studies in this book explore how infrastructure change projects are managed at Google. From these case studies, we'll provide insight into lessons learned from these different approaches, and provide ...
Business Process Flow Mapping Succinctly
In a company, when the business process is defined, employees feel confident in their roles. They understand expectations and can easily identify when something is amiss or requires escalation. In Business Process Flow Mapping Succinctly, Erica Quigley will show you the activities that should occur in order to completely define a business process s...
Enterprise Cloud Strategy
Enterprise Cloud Strategy - Guidance for enterprises looking for proven methods to take their application portfolio to the cloud. What if you were able to achieve both efficiency and innovation in all business domains and applications across your entire portfolio? What if you could take advantage of the cloud and all of its resources and feature...
Agency: Moral Identity and Free Will
There is agency in all we do: thinking, doing, or making. We invent a tune, play, or use it to celebrate an occasion. Or we make a conceptual leap and ask more abstract questions about the conditions for agency. They include autonomy and self-appraisal, each contested by arguments immersing us in circumstances we don't control. But can it be t...
Understanding Machine Learning
The subject of this book is automated learning, or, as we will more often call it, Machine Learning (ML). That is, we wish to program computers so that they can "learn" from input available to them. Roughly speaking, learning is the process of converting experience into expertise or knowledge. The input to a learning algorithm is training...
Data Visualization in Society
Today we are witnessing an increased use of data visualization in society. Across domains such as work, education and the news, various forms of graphs, charts and maps are used to explain, convince and tell stories. In an era in which more and more data are produced and circulated digitally, and digital tools make visualization production increasi...
Project Management Skills for All Careers
Project Management Skills for All Careers offers a framework for managing projects in any career area. The concepts can be applied no matter where you work. As a matter of fact, many of our dislocated workers are trained to become certified in Project Management. Project management skills are essential and invaluable for anyone who initiates or is ...
Information ­technology ­project managers' ­competencies
The purpose of this book is to shed light on the performance and personal competencies of information technology (IT) project managers in South Africa. Predictive models are built to determine what project managers consider the crucial competencies they should possess to deliver an IT project successfully. This investigation takes place in the cont...
Grey Area
Coffeeshops are the most famous example of Dutch tolerance. But in fact, these cannabis distributors are highly regulated. Coffeeshops are permitted to break the law, but not the rules. On the premises, there cannot be minors, hard drugs or more than 500 grams. Nor can a coffeeshop advertise, cause nuisance or sell over five grams to a person in a ...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
Production Ergonomics
Production ergonomics - the science and practice of designing industrial workplaces to optimize human well-being and system performance - is a complex challenge for a designer. Humans are a valuable and flexible resource in any system of creation, and as long as they stay healthy, alert and motivated, they perform well and also become more competen...
Global Corruption
This book has been specifically created to make it easier for professors to offer a law school course on global corruption. It is issued under a creative commons license and can be used for free in whole or in part for non-commercial purposes. The first chapter sets out the general context of global corruption: its nature and extent, and some views...
Accelerators in Silicon Valley
Silicon Valley is the world's most successful innovation region. Apple, Google, Facebook, Instagram, Twitter, WhatsApp, Uber, and Airbnb changed our way of living. Silicon Valley has built a brilliant ecosystem that supports startups. Its entrepreneurial mindset fosters risk-taking, thinking big, and sharing. A fast growing number of accele...
The Public Domain Song Anthology
The Public Domain Song Anthology by David Berger and Chuck Israels is a collection of 348 popular songs with modern and traditional harmonization for both study and performance. This open educational resource was curated by two leading jazz repertory experts and consists of songs in the US public domain. This anthology is the first of its kind and ...
Estimating Illicit Financial Flows
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...
Epidemics and the Health of African Nations
Researchers and practitioners from within the continent explore why Africa is so vulnerable to disease, and show how this vulnerability is closely linked to political and economic factors. They demonstrate how these same factors determine the way epidemics are treated. Authors extract lessons from case studies in different parts of Africa; chall...
Minimally Invasive Glaucoma Surgery
This book covers all aspects of minimally invasive glaucoma surgery (MIGS) and provides detailed information on each MIGS device, including its mechanism of action; patient selection; implantation techniques; post-operative management; and a review of the existing literature. Step-by-step descriptions are provided for the surgical technique used in...
Human Challenge Studies in Endemic Settings
This open access book provides an extensive review of ethical and regulatory issues related to human infection challenge studies, with a particular focus on the expansion of this type of research into endemic settings and/or low- and middle-income countries (LMICs). Human challenge studies (HCS) involve the intentional infection of research partici...
Orthogeriatrics
This new open access edition supported by the Fragility Fracture Network aims at giving the widest possible dissemination on fragility fracture (especially hip fracture) management and notably in countries where this expertise is sorely needed. It has been extensively revised and updated by the experts of this network to provide a unique and reliab...
Digital Dilemmas
Social media is at the core of digital transformations in organizations. Facebook, Twitter, LinkedIn, and other social media platforms widen the scope for rapid and effective communication with stakeholders. They also create a range of new and challenging ethical dilemmas.This open access book categorizes the dilemmas organizations across a range o...
Financial Numerical Recipes in C++
This book is a a discussion of the calculation of specific formulas in finance. The field of finance has seen a rapid development in recent years, with increasing mathematical sophistication. While the formalization of the field can be traced back to the work of Markowitz (1952) on investors mean-variance decisions and Modigliani and Miller (1958) ...
The Big Data Agenda
This book highlights that the capacity for gathering, analysing, and utilising vast amounts of digital (user) data raises significant ethical issues. Annika Richterich provides a systematic contemporary overview of the field of critical data studies that reflects on practices of digital data collection and analysis. The book assesses in detail one ...
When Right Makes Might
Why do great powers accommodate the rise of some challengers but contain and confront others, even at the risk of war? When Right Makes Might proposes that the ways in which a rising power legitimizes its expansionist aims significantly shapes great power responses. Stacie E. Goddard theorizes that when faced with a new challenger, great powers wil...
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, intro...
Collaboration for Impact
Collaboration is often seen as a palliative for the many wicked problems challenging our communities. These problems affect some of the most vulnerable and unempowered people in our community. They also carry significant implications for policy processes, programs of service and, ultimately, the budgets and resourcing of national and sub-national g...
Skills in Rheumatology
This open book presents practical approaches to managing patients affected by various rheumatological diseases, allowing readers to gain a better understanding of the various clinical expressions and problems experienced by these patients. Discussing rheumatology from an organ systems perspective, it highlights the importance of detailed musculoske...
Quality Management and Accreditation in Hematopoietic Stem Cell Transplantation and Cellular Therapy
This open book provides a concise yet comprehensive overview on how to build a quality management program for hematopoietic stem cell transplantation (HSCT) and cellular therapy. The text reviews all the essential steps and elements necessary for establishing a quality management program and achieving accreditation in HSCT and cellular therapy. Spe...
Safety for Particle Accelerators
The use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe operation of accelerator facilities that cannot be addressed using only best practice from occupational safety in conventional industry. This book introduces readers to different occupational safety issues at accelerator facili...
Invasive Species in Forests and Rangelands of the United States
This open book describes the serious threat of invasive species to native ecosystems. Invasive species have caused and will continue to cause enormous ecological and economic damage with ever increasing world trade. This multi-disciplinary book, written by over 100 national experts, presents the latest research on a wide range of natural science an...
Robotics, AI, and Humanity
This open book examines recent advances in how artificial intelligence (AI) and robotics have elicited widespread debate over their benefits and drawbacks for humanity. The emergent technologies have for instance implications within medicine and health care, employment, transport, manufacturing, agriculture, and armed conflict. While there has been...
Defending Checks and Balances in EU Member States
This open book deals with Article 7 TEU measures, court proceedings, financial sanctions and the EU Rule of Law Framework to protect EU values with a particular focus on checks and balances in EU Member States. It analyses substantive standards, powers, procedures as well as the consequences and implications of the various instruments. It combines ...

1 ... 6 7 8 9