Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Narrating China's Governance
This open access book captures and elaborates on the skill of storytelling as one of the distinct leadership features of Xi Jinping, the General Secretary of the Communist Party of China and the President of the People's Republic of China. It gathers the stories included in Xi's speeches on various occasions, where they conveyed the essen...
CS Unplugged
Computers are everywhere. We all need to learn how to use them, and many of us use them every day. But how do they work? How do they think? And how can people write software that is fast and easy to use? Computer science is a fascinating subject that explores these very questions. The easy and fun activities in this book, designed for studentren of...
Hacking Secret Ciphers with Python
There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap. This book is for complete beginners who do not know anything about en...
Blown to Bits
For thousands of years, people have been saying that the world is changing and will never again be the same. Yet the profound changes happening today are different, because they result from a specific technological development. It is now possible, in principle, to remember everything that anyone says, writes, sings, draws, or photographs. Everythi...
25 Secrets for Faster ASP.NET Applications
Read the tips and tricks recommended by some of the smartest minds in the ASP.NET community. 25 tips from the ASP.NET community for boosting performance in your web applications; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers async/await, Web API, ORMs, interactions between your code and your data...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
American Labour's Cold War Abroad
During the Cold War, American labour organizations were at the centre of the battle for the hearts and minds of working people. At a time when trade unions were a substantial force in both American and European politics, the fiercely anti-communist American Federation of Labor - Congress of Industrial Organizations (AFL - CIO), set a strong example...
You Don't Know JS Yet: Scope and Closures
Are you looking for a better way to deeply learn the fundamentals of JavaScript? Look no further!The foundation of all programs is the organization of its variables and functions into different nested scopes. Yet, most developers haven't deeply contemplated how and why these decisions are made and the impacts on code maintainability.The worldw...
Niche Wars
Australia invoked the ANZUS Alliance following the Al Qaeda attacks in the United States on 11 September 2001. But unlike the calls to arms at the onset of the world wars, Australia decided to make only carefully calibrated force contributions in support of the US-led coalition campaigns in Afghanistan and Iraq. Why is this so? Niche Wars examin...
Cloud Native DevOps with Kubernetes
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
From Bilateral Arbitral Tribunals and Investment Courts to a Multilateral Investment Court
This book considers the potential setup for a future Multilateral Investment Court (MIC). The option of an MIC was first discussed by the EU Commission in 2016 and has since been made an official element of the EU Common Commercial Policy. In 2017, UNCITRAL also decided to discuss the possibility of an MIC, and on 20 March 2018, the Council of the ...
Anti-Vivisection and the Profession of Medicine in Britain
This book explores the social history of the anti-vivisection movement in Britain from its nineteenth-century beginnings until the 1960s. It discusses the ethical principles that inspired the movement and the socio-political background that explains its rise and fall. Opposition to vivisection began when medical practitioners complained it was cont...
The Impact of Food Bioactives on Health
This book describes in vitro and ex vivo models that can be employed to investigate effects of digested food products on the GIT, or specific components thereof. Many such models exist and include, for example, those used to study digestion and fermentation in the small and large intestine, to investigate absorption (e.g. Ussing chamber, epithelial...
Emerging States and Economies
This book asks why and how some of the developing countries have "emerged" under a set of similar global conditions, what led individual countries to choose the particular paths that led to their "emergence," and what challenges confront them. If we are to understand the nature of major risks and uncertainties in the world, we m...
United Nations Peace Operations in a Changing Global Order
This open access volume explores how UN peace operations are adapting to four trends in the changing global order: (1) the rebalancing of relations between states of the global North and the global South; (2) the rise of regional organisations as providers of peace; (3) the rise of violent extremism and fundamentalist non-state actors; and (4) incr...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Between Psychology and Philosophy
This book discusses a variety of important but unprecedented ways in which psychology can be useful to philosophy. The early chapters illustrate this theme via comparisons between Chinese and Western philosophy. It is argued that the Chinese notion of a heart-mind is superior to the Western concept of mind, but then, more even-handedly, the relativ...
Eloquent JavaScript
JavaScript lies at the heart of almost every modern web application, from social apps like Twitter to browser-based game frameworks like Phaser and Babylon. Though simple for beginners to pick up and play with, JavaScript is a flexible, complex language that you can use to build full-scale applications. This much anticipated and thoroughly revis...
Hacking the Xbox
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects ...
Invent Your Own Computer Games with Python
Invent Your Own Computer Games with Python teaches you how to program in the Python language. Each chapter gives you the complete source code for a new game, and then teaches the programming concepts from the examples. Games include Guess the Number, Hangman, Tic Tac Toe, and Reversi. This book also has an introduction to making games with 2D graph...
Storytelling in Northern Zambia
Storytelling plays an important part in the vibrant cultural life of Zambia and in many other communities across Africa. This innovative book provides a collection and analysis of oral narrative traditions as practiced by five Bemba-speaking ethnic groups in Zambia. The integration of newly digitalised audio and video recordings into the text enabl...
50 Ways to Avoid Find and Fix ASP.NET Performance Issues
Read the tips and tricks that top developers from the .NET and SQL Server communities use to boost code and query performance in their applications. 50 tips from the .NET and SQL Server communities for boosting performance in your .NET application; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers pe...
Empathetic Space on Screen
In this book we learn that there is a clear but complex relationship between setting and character on screen. Certain settings stand out above others—think of the iconic gooey dripping tunnels that Ripley stumbles through in Aliens, Norman’s bird-decorated parlour in Psycho or the dark Gotham of certain Batman movies. But what makes these parti...
Windows 10 IT Pro Essentials: Support Secrets
That group includes full-time professional trainers, of course, but it also includes IT pros and those brave souls who staff the help desk in corporations. Most of all, it includes the incredibly large population of people who have earned a reputation for being "the person who knows Windows." With that knowledge comes a seemingly endle...
Kubernetes for Full-Stack Developers
Whether you're just curious, getting started with Kubernetes, or have experience with it, this curriculum will help you learn more about Kubernetes and running containerized applications. You'll learn about core Kubernetes concepts and use them to deploy and scale applications in practical tutorials. By the end of this curriculum you'...
Using .NET Core, Docker, and Kubernetes Succinctly
Terms like container and Docker, unknown to Microsoft programmers until now, have recently become essential in technical discussions about the development, distribution, and management of our applications. Containers can solve some of programmers' everyday problems, but a challenge with them is managing their lifecycles and the communication a...
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
Kubernetes Succinctly
With excellent orchestration and routing capabilities, Kubernetes is an enterprise-grade platform for building microservices applications. Kubernetes is evolving as the de facto container management tool used by organizations and cloud vendors all over the world. Kubernetes Succinctly by Rahul Rai and Tarun Pabbi is your guide to learning Kubernete...
Mind Hacking
Have you ever wished you could reprogram your brain, just as a hacker would a computer? In this 3-step guide to improving your mental habits, learn to take charge of your mind and banish negative thoughts, habits, and anxiety - in just 21 days! A seasoned author, comedian, and entrepreneur, Sir John Hargrave once suffered from unhealthy addictio...
The Petrie Museum of Egyptian Archaeology
The Petrie Museum of Egyptian Archaeology first opened its doors in 1915, and since then has attracted visitors from all over the world as well as providing valuable teaching resources. Named after its founder, the pioneering archaeologist Flinders Petrie, the Museum holds more than 80,000 objects and is one of the largest and finest collections o...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...

1 2