Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Mitteleuropa
Vienna, the capital of the Austro-Hungarian Empire, but in a world in which the First World War did not take place: a man disappears. Ludwig Pechstein, of the Pechstein Security and Investigations Agency, is asked to investigate, The trail leads to gruesome secret chemical warfare research programmes, a land commune in Switzerland, smugglers of ava...
Papua New Guinea
Papua New Guinea (PNG), a nation of now almost nine million people, continues to evolve and adapt. While there is no shortage of recent data and research on PNG, the two most recent social science volumes on the country were both written more than a decade ago. Since then, much has changed and much has been learnt. What has been missing is a volume...
Piracy in World History
In a modern global historical context, scholars have often regarded piracy as an essentially European concept which was inappropriately applied by the expanding European powers to the rest of the world, mainly for the purpose of furthering colonial forms of domination in the economic, political, military, legal and cultural spheres. By contrast, th...
Presto: The Definitive Guide
Perform fast interactive analytics against different data sources using the Presto high-performance, distributed SQL query engine. With this practical guide, you'll learn how to conduct analytics on data where it lives, whether it's Hive, Cassandra, a relational database, or a proprietary data store. Analysts, software engineers, and prod...
Open Workbook of Cryptology
Everyone needs a little cryptology. The problem with crypto is that it has a reputation of being very hard and mysterious, as well as very easy to get wrong. While there are aspects of crypto that are connected to quite modern and complex theories - such as number theory, an old and deep branch of mathematics; complexity theory, a new(er) and su...
Mastering the Lightning Network
The Lightning Network (LN) is a rapidly growing second-layer payment protocol that works on top of Bitcoin to provide near-instantaneous transactions between two parties. With this practical guide, authors Andreas M. Antonopoulos, Olaoluwa Osuntokun, and Rene Pickhardt explain how this advancement will enable the next level of scale for Bitcoin, in...
Microservices Reference Architecture
The move to microservices is a seismic shift in web application development and delivery. Because we believe moving to microservices is crucial to the success of our customers, we at NGINX have launched a dedicated program to develop NGINX software features and development practices in support of microservices. We also recognize that there are m...
Game Hacking Academy
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o...
API Traffic Management 101
The aim of this short book is to introduce the general themes, challenges, and opportunities in the world of managing API traffic. Most of the examples and recommendations come from my own experience (or that of colleagues) while working with customers, ranging from small local startups to global enterprises. This book is for those just getting ...
Continuous API Management
A lot of work is required to release an API, but the effort doesn't always pay off. Overplanning before an API matures is a wasted investment, while underplanning can lead to disaster. The second edition of this book provides maturity models for individual APIs and multi-API landscapes to help you invest the right human and company resources f...
Greening Europe
The third installment of the 'European Public Investment Outlook' series is an important and timely publication that draws together recent analyses to recommend significant increases in public investment in green ventures. Compelling data from key economists affiliated with international organizations like the International Monetary Fund,...
Container Networking
When you start building your first containerized application, you're excited about the capabilities and opportunities you encounter: it runs the same in dev and in prod, it's straightforward to put together a container image using Docker, and the distribution is taken care of by a container registry. So, you're satisfied with how ...
Blockchain For Dummies
Blockchain For Dummies, 2nd IBM Limited Edition, equips you with an understanding of what blockchain is, how it works, and how it can enhance your business and the industry in which it operates. You learn the fundamentals of blockchain and how this technology revolutionizes transactions and business networks. You also discover the important differe...

1 ... 7 8 9