Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Application Security in .NET Succinctly
Security in software development should be a first-order requirement, but it's often implemented in projects as an afterthought. With Application Security in .NET Succinctly, author Stan Drapkin provides a refresher of .NET security practices and fills common knowledge gaps for experienced developers and novices alike. Learn about hashes, mach...
PowerShell Notes for Professionals
The PowerShell Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
The Art of Sustainable Performance
This open access book revisits common notions on how to select and recruit the right employees. It reveals that the secret of successful individuals and teams lies in a combination of talent and four important performance indicators, offering an innovative approach that companies can fruitfully adopt. Bas Kodden has studied key performance indicato...
C++ Hacker's Guide
An experienced programmer accumulates a set of tools, tricks, and techniques to make his or her programs better. C++ Hacker's Guide collects more than 120 of the best C++ veteran secrets and puts them in one accessible place. The techniques presented have all been used in actual programs, and more importantly, have made actual programs better....
Ruby Best Practices
How do you write truly elegant code with Ruby? Ruby Best Practices is for programmers who want to use Ruby as experienced Rubyists do. Written by the developer of the Ruby project Prawn, this concise book explains how to design beautiful APIs and domain-specific languages with Ruby, as well as how to work with functional programming ideas and techn...
Reform and Revolt in the City of Dreaming Spires
Books about Oxford have generally focused on the University rather than the city. This original book on the local politics of Oxford City from 1830 to 1980 is based on a comprehensive analysis of primary sources and tells the story of the city's progressive politics. The book traces this history from Chartism and electoral reform in the mid-ni...
Atomic Assurance
Do alliances curb efforts by states to develop nuclear weapons? Atomic Assurance looks at what makes alliances sufficiently credible to prevent nuclear proliferation; how alliances can break down and so encourage nuclear proliferation; and whether security guarantors like the United States can use alliance ties to end the nuclear efforts of their a...
Public Administration in Germany
This open book presents a topical, comprehensive and differentiated analysis of Germany's public administration and reforms. It provides an overview on key elements of German public administration at the federal, Länder and local levels of government as well as on current reform activities of the public sector. It examines the key institution...
European Higher Education Area: Challenges for a New Decade
This open book highlights the major outcomes of the fourth edition of the Future of Higher Education - Bologna Process Researchers Conference (January 2020), which has already established itself as a landmark in the European higher education environment. The conference provides a unique forum for dialogue between researchers, experts and policy mak...
Anti-Microbial Resistance in Global Perspective
This open book provides an accessible introduction to the mechanics of international development and global health text for policy-makers and students across a wide range of disciplines. Antimicrobial resistance is a major threat to the well-being of patients and health systems the world over. In fragile health systems so challenged, on a day-today...
The Power of Our Words
Do you know that an empowering word can spark ideas, open doors, change attitudes, and create solutions? Words can do all these things and much more. They have the potency to redefine personalities, lives, and entire communities. Just think of some of the things words are used for every day: - To communicate a message - To express a feeling -...
HackSpace Magazine: Issue 48
When you've graduated from breadboards and jumper wires it's time to tackle electronics the way the pros do it: by making your own PCBs! We'll take you from beginner to slightly more experienced beginner, with a guide to designing, debugging and manufacturing your own custom electronic creation. - Learn the secrets of the guitaris...
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
CI/CD with Docker and Kubernetes
Containers change how developers build, test, and deploy code. Adopting them takes time. Using them the wrong way can slow down your delivery process. But you don't have a team of engineers to dedicate to this like Spotify or Netflix do. Maybe you're a startup CTO with features to ship - you can't spend hundreds of hours on intern...
Mitteleuropa
Vienna, the capital of the Austro-Hungarian Empire, but in a world in which the First World War did not take place: a man disappears. Ludwig Pechstein, of the Pechstein Security and Investigations Agency, is asked to investigate, The trail leads to gruesome secret chemical warfare research programmes, a land commune in Switzerland, smugglers of ava...
Defense against the Black Arts
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
Code Club Book of Scratch
The first ever Code Club book is here! With it, you'll learn how to code using Scratch, the block-based programming language. In each chapter you'll find instructions to build cool games, animations, and interactive stories. Your friendly robot guide will aid you step-by-step through each project and give you handy tips along the way. ...
Linux Kernel Crash Book
Linux crash analysis - this is a subject that has lots of unanswered mail threads and plain text documents scattered all over the place, inaccessible to almost everyone, save the tiny percentage of super geeks. My personal and professional interest in the last three years has taken me down the path of Linux kernel secrets, all the way into assem...
Who Saved the Parthenon?
In this magisterial book, William St Clair unfolds the history of the Parthenon throughout the modern era to the present day, with special emphasis on the period before, during, and after the Greek War of Independence of 1821 - 32. Focusing particularly on the question of who saved the Parthenon from destruction during this conflict, with the help ...
From Containers to Kubernetes with Node.js
This book is designed as an introduction to containers and Kubernetes by way of Node.js. Containers are the basis for distributed, repeatable workflows with orchestrators such as Kubernetes, and they allow developers and operators to develop applications consistently across environments and deploy in a repeatable and predictable fashion. The exa...
A Complete Guide to Maggot Therapy
Since the revival of maggot therapy in Western wound care approximately thirty years ago, there has been no comprehensive synthesis of what is known about its clinical practice, supply chain management, and social dimensions. This edited volume fills the information vacuum and, importantly, makes the current state of knowledge freely accessible. It...
Managing Kubernetes Traffic with F5 NGINX
Microservices architectures introduce several benefits to the application development and delivery process. Microservices-based apps are easier to build, test, maintain, and scale. They also reduce downtime through better fault isolation. While container-based microservices apps have profoundly changed the way DevOps teams deploy applications, t...

1 2