Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Legal Dynamics of EU External Relations
This book offers a concise yet comprehensive review of the principles of EU external relations law. By carefully examining the role of the Union on the global scene, it provides a systematic overview of the relevant rules and competences, reflecting on the legal developments in their political and societal context. In addition to up-to-date analyse...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Libelf by Example
This tutorial introduces libelf, a library for reading and writing object code in the Extensible Linking Format (ELF) file format. - Getting started with libelf: obtaining a handle to an ELF object, establishing a working ELF version, and handling errors reported by libelf. - How ELF data structures are laid out in-memory and on disk, the notions...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...
Operating Systems and Middleware
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
Introducing Vigilant Audiences
This ground-breaking collection of essays examines the scope and consequences of digital vigilantism - a phenomenon emerging on a global scale, which sees digital audiences using social platforms to shape social and political life. Longstanding forms of moral scrutiny and justice seeking are disseminated through our contemporary media landscape, an...
When Can Oil Economies Be Deemed Sustainable?
This open book questions the stereotype depicting all Gulf (GCC) economies as not sustainable, and starts a critical discussion of what these economies and polities should do to guarantee themselves a relatively stable future. Volatile international oil markets and the acceleration of the energy transition has challenged the notion that oil revenu...
The Challenges of Religious Literacy
This open book presents religious literacy as the main explanatory factor when dealing with certain ethnic groups that attract stereotypes which gloss over other personal factors such as age, class, gender and cultural differences. It discusses freedom of religion, and the Christian revival movement. It examines religious literacy and religious div...
American Labour's Cold War Abroad
During the Cold War, American labour organizations were at the centre of the battle for the hearts and minds of working people. At a time when trade unions were a substantial force in both American and European politics, the fiercely anti-communist American Federation of Labor - Congress of Industrial Organizations (AFL - CIO), set a strong example...
The Missing Link
Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery. While it is easy to describe conceptually, implementation is accompanied by an overwhelming variety of languages, platforms, templates, frameworks, guidelines, and ...
Jenkins: The Definitive Guide
Streamline software development with Jenkins, the popular Java-based open source tool that has revolutionized the way teams think about Continuous Integration (CI). This complete guide shows you how to automate your build, integration, release, and deployment processes with Jenkins - and demonstrates how CI can save you time, money, and many headac...
Atomic Assurance
Do alliances curb efforts by states to develop nuclear weapons? Atomic Assurance looks at what makes alliances sufficiently credible to prevent nuclear proliferation; how alliances can break down and so encourage nuclear proliferation; and whether security guarantors like the United States can use alliance ties to end the nuclear efforts of their a...
NGINX Unit Cookbook
Alongside its popular web server, NGINX provides a dynamic application server that supports configuration through a RESTful JSON API. The open source NGINX Unit server deploys configuration changes without service disruptions and runs apps built with multiple languages and frameworks. This updated cookbook shows developers, DevOps personnel, networ...
Learn Azure in a Month of Lunches
More than 100 Azure services offer everything you need to build and run your applications with all the performance, redundancy, security, and scale that the cloud has to offer. But knowing where to begin with all these services can seem overwhelming. Learn Azure in a Month of Lunches, 2nd Edition, is a tutorial on writing, deploying, and running...
Mastering Ethereum
Ethereum represents the gateway to a worldwide, decentralized computing paradigm. This platform enables you to run decentralized applications (DApps) and smart contracts that have no central points of failure or control, integrate with a payment network, and operate on an open blockchain. With this practical guide, Andreas M. Antonopoulos and Gavin...
How To Build a Website With CSS and HTML
This project-based eBook will introduce you to Cascading Style Sheets (CSS), a stylesheet language used to control the presentation of websites, by building a personal website using our demonstration site as a model. Though our demonstration site features Sammy the Shark, you can switch out Sammy's information with your own if you wish to pers...
Niche Wars
Australia invoked the ANZUS Alliance following the Al Qaeda attacks in the United States on 11 September 2001. But unlike the calls to arms at the onset of the world wars, Australia decided to make only carefully calibrated force contributions in support of the US-led coalition campaigns in Afghanistan and Iraq. Why is this so? Niche Wars examin...
Public Administration in Germany
This open book presents a topical, comprehensive and differentiated analysis of Germany's public administration and reforms. It provides an overview on key elements of German public administration at the federal, Länder and local levels of government as well as on current reform activities of the public sector. It examines the key institution...
The Future of Service Post-COVID-19 Pandemic, Volume 1
This open book is geared towards providing insights and stimulating new thinking about the changing nature of services, service work and workers, and service experiences during and after the COVID-19 pandemic in 2020, particularly focusing on digital service technology. This book serves as a useful resource for business practitioners and academics ...
International Symposium on Mathematics, Quantum Theory, and Cryptography
This open book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical s...
Migration and Social Protection in Europe and Beyond (Volume 2)
This 2nd open book in a series of three volumes examines the repertoire of policies and programmes led by EU Member States to engage with their nationals residing abroad. Focusing on sending states' engagement in the area of social protection, this book shows how a series of emigration-related policies that go beyond the realm of social securi...
Cultural Competence and the Higher Education Sector
This open book explores cultural competence in the higher education sector from multi-disciplinary and inter-disciplinary perspectives. It addresses cultural competence in terms of leadership and the role of the higher education sector in cultural competence policy and practice. Drawing on lessons learned, current research and emerging evidence, th...
Introducing Microsoft SQL Server 2016
Build your database management knowledge with the technical open book, Introducing SQL Server 2016. Get an overview of the SQL Server 2016 features - from in-memory performance and enhanced security to end-to-end mobile business intelligence and advanced analytics. Learn about faster queries, improved security, higher availability, and state-of-...
Building Modern Web Applications With Spring Boot and Vaadin
This guide is a practical introduction to web application development with Spring Boot and Vaadin. It covers the entire development process, from setup to deployment, following a step-by-step approach. You can replicate each section at your own pace as you follow along. The content is suitable for anyone familiar with Java who wants to build ...
Blazor for ASP NET Web Forms Developers
Blazor is a new web framework that changes what is possible when building web apps with .NET. Blazor is a client-side web UI framework based on C# instead of JavaScript. With Blazor you can write your client-side logic and UI components in C#, compile them into normal .NET assemblies, and then run them directly in the browser using a new open web s...
Hacking Portugal
As technology and software become more and more important to Portuguese society, it is time for Portugal to take them more seriously, and become a real player in that world. This book discusses several ideas to make Portugal a place where programming, TDD, Open Source, learning how to code, hacking (aka bug-bounty style), and DevOps receive the con...
Learning, Marginalization, and Improving the Quality of Education in Low-income Countries
Improving learning evidence and outcomes for those most in need in developing countries is at the heart of the United Nations' Sustainable Development Goal on Education (SDG4). This timely volume brings together contributions on current empirical research and analysis of emerging trends that focus on improving the quality of education through ...
Azure Virtual Desktop Succinctly
Put simply, Azure Virtual Desktop is a way to serve Windows resources over the internet. You can deliver an entire desktop or specific applications, and your users can access them anywhere, on any device. In Azure Virtual Desktop Succinctly, author Marco Moioli provides a thorough overview of the service, covering how it can enhance your organizati...
Cloud Native DevOps with Kubernetes
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through...
Application Delivery and Load Balancing in Microsoft Azure
With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute t...
Computer Networks
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students ...

1 2 3 4 5 ... 34