Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Ethics and Civil Drones
This book disseminates some of the results of the European H2020 AiRT Project (Technology transfer of RPAs for the creative industry). In particular, it presents findings related to mitigating safety and security concerns when civil drones are piloted by the service sector (mainly, the creative industry). European policies regarding drones generall...
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
This book presents Nils Petter Gleditsch, a staff member of the Peace Research Institute of Oslo (PRIO) since 1964, a former editor of the Journal for Peace Research (1983-2010), a former president of the International Studies Association (2008-2009) and the recipient of several academic awards as a pioneer in the scientific analysis of war and pea...
Eating, Drinking: Surviving
This publication addresses the global challenges of food and water security in a rapidly changing and complex world. The essays highlight the links between bio-physical and socio-cultural processes, making connections between local and global scales, and focusing on the everyday practices of eating and drinking, essential for human survival. Writte...
Hacking the Xbox
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects ...
Why Should I Care? Mobile Security for The Rest of Us
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief...
Legal Dynamics of EU External Relations
This book offers a concise yet comprehensive review of the principles of EU external relations law. By carefully examining the role of the Union on the global scene, it provides a systematic overview of the relevant rules and competences, reflecting on the legal developments in their political and societal context. In addition to up-to-date analyse...
Building Secure and Reliable Systems
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best prac...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
Introducing Vigilant Audiences
This ground-breaking collection of essays examines the scope and consequences of digital vigilantism - a phenomenon emerging on a global scale, which sees digital audiences using social platforms to shape social and political life. Longstanding forms of moral scrutiny and justice seeking are disseminated through our contemporary media landscape, an...
Atomic Assurance
Do alliances curb efforts by states to develop nuclear weapons? Atomic Assurance looks at what makes alliances sufficiently credible to prevent nuclear proliferation; how alliances can break down and so encourage nuclear proliferation; and whether security guarantors like the United States can use alliance ties to end the nuclear efforts of their a...
NGINX Unit Cookbook
Alongside its popular web server, NGINX provides a dynamic application server that supports configuration through a RESTful JSON API. The open source NGINX Unit server deploys configuration changes without service disruptions and runs apps built with multiple languages and frameworks. This updated cookbook shows developers, DevOps personnel, networ...
Learn Azure in a Month of Lunches
More than 100 Azure services offer everything you need to build and run your applications with all the performance, redundancy, security, and scale that the cloud has to offer. But knowing where to begin with all these services can seem overwhelming. Learn Azure in a Month of Lunches, 2nd Edition, is a tutorial on writing, deploying, and running...
Mastering Ethereum
Ethereum represents the gateway to a worldwide, decentralized computing paradigm. This platform enables you to run decentralized applications (DApps) and smart contracts that have no central points of failure or control, integrate with a payment network, and operate on an open blockchain. With this practical guide, Andreas M. Antonopoulos and Gavin...
International Symposium on Mathematics, Quantum Theory, and Cryptography
This open book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical s...
Migration and Social Protection in Europe and Beyond (Volume 2)
This 2nd open book in a series of three volumes examines the repertoire of policies and programmes led by EU Member States to engage with their nationals residing abroad. Focusing on sending states' engagement in the area of social protection, this book shows how a series of emigration-related policies that go beyond the realm of social securi...
Introducing Microsoft SQL Server 2016
Build your database management knowledge with the technical open book, Introducing SQL Server 2016. Get an overview of the SQL Server 2016 features - from in-memory performance and enhanced security to end-to-end mobile business intelligence and advanced analytics. Learn about faster queries, improved security, higher availability, and state-of-...
Blazor for ASP NET Web Forms Developers
Blazor is a new web framework that changes what is possible when building web apps with .NET. Blazor is a client-side web UI framework based on C# instead of JavaScript. With Blazor you can write your client-side logic and UI components in C#, compile them into normal .NET assemblies, and then run them directly in the browser using a new open web s...
Azure Virtual Desktop Succinctly
Put simply, Azure Virtual Desktop is a way to serve Windows resources over the internet. You can deliver an entire desktop or specific applications, and your users can access them anywhere, on any device. In Azure Virtual Desktop Succinctly, author Marco Moioli provides a thorough overview of the service, covering how it can enhance your organizati...
Application Delivery and Load Balancing in Microsoft Azure
With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute t...
Computer Networks
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students ...
NGINX Cookbook
NGINX is one of the most widely used web servers available today, in part because of itscapabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical recipes help you set up and use either the open source...
Managing Kubernetes Traffic with F5 NGINX
Microservices architectures introduce several benefits to the application development and delivery process. Microservices-based apps are easier to build, test, maintain, and scale. They also reduce downtime through better fault isolation. While container-based microservices apps have profoundly changed the way DevOps teams deploy applications, t...
Japan's Arduous Rejuvenation as a Global Power
This book assesses the profound impact of Japan's aspirations to become a great power on Japanese security, democracy and foreign relations. Rather than viewing the process of normalization and rejuvenation as two decades of remilitarization in face of rapidly changing strategic environment and domestic political circumstances, this volume co...
Computer and Information Sciences
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016. The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classific...
Asylum Determination in Europe
Drawing on new research material from ten European countries, Asylum Determination in Europe: Ethnographic Perspectives brings together a range of detailed accounts of the legal and bureaucratic processes by which asylum claims are decided.The book includes a legal overview of European asylum determination procedures, followed by sections on the di...
The Hindu Kush Himalaya Assessment
This open access volume is the first comprehensive assessment of the Hindu Kush Himalaya (HKH) region. It comprises important scientific research on the social, economic, and environmental pillars of sustainable mountain development and will serve as a basis for evidence-based decision-making to safeguard the environment and advance people's w...
The Climate-Smart Agriculture Papers
This volume shares new data relating to Climate-Smart Agriculture (CSA), with emphasis on experiences in Eastern and Southern Africa. The book is a collection of research by authors from over 30 institutions, spanning the public and private sectors, with specific knowledge on agricultural development in the region discussed. The material is assembl...
Sago Palm
This book addresses a wide variety of events and technologies concerning the sago palm, ranging from its botanical characteristics, culture and use to social conditions in the places where it is grown, in order to provide a record of research findings and to benefit society. It discusses various subjects, including the sago palm and related species...
Limits to the European Union's Normative Power in a Post-conflict Society
By shedding light on EULEX - the EU mission to Kosovo – this book investigates the EU's peacebuilding activities in that country, in the light of the normative power theory in the post-conflict setting and peacebuilding theory. Ten years after the massive engagement of the EU in the country torn by war, the authors critically assess the effe...
Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
What are the challenges and action points for agricultural sustainability in Sub-Saharan Africa? This collection of papers offers technical analyses, policy recommendations and an overview of success stories to date. Each carefully selected paper provides valuable insights for improved policy making and defines relevant strategic priorities on Afri...
Russia's Turn to the East
This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly – have changed since the onset of the Ukraine crisis and Russia's annexation of Crimea. Following the 2014 annexation and the subsequent enactment of a sanctions regime against the country, the Kremlin has emphasized the e...

1 2 3 4 ... 9