Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Business Process Flow Mapping Succinctly
In a company, when the business process is defined, employees feel confident in their roles. They understand expectations and can easily identify when something is amiss or requires escalation. In Business Process Flow Mapping Succinctly, Erica Quigley will show you the activities that should occur in order to completely define a business process s...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Evolve the Monolith to Microservices with Java and Node
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This book shows how to break out a traditiona...
Writing Native Mobile Apps in a Functional Language Succinctly
In Implementing a Custom Language Succinctly, Succinctly series author Vassili Kaplan demonstrated how to create a customized programming language. Now, he returns to showcase how you can use that language to build fully functional mobile apps. In Writing Native Mobile Apps in a Functional Language Succinctly, you will build off the skills you'...
Implementing a Custom Language Succinctly
Custom languages provide many benefits, but many people fear the complexity that comes with trying to deploy them. Author Vassili Kaplan sweeps away the obstacles and shows how custom languages are a tool within reach of any developer. With Implementing a Custom Language Succinctly, readers will discover just how much they can accomplish with the s...
AngularDart Succinctly
AngularDart is an open-source, web app framework created by Google that combines the power of Angular with the Dart programming language, focusing on productivity, performance, and stability. Google has used it to build and run many of its mission-critical web apps that generate much of its revenue. In AngularDart Succinctly, Ed Freitas will show r...
Real-Time ASP.NET Core 3 Apps with SignalR Succinctly
The ASP.NET Core SignalR library is open source and allows developers to simplify adding real-time web functionality to applications. This means that the server-side code can instantly push content to connected clients. In Real-Time ASP.NET Core 3 Apps with SignalR Succinctly, Dirk Strauss will show you how to use it to create a chat application wi...
Cross-Media Communications
This text is an introduction to the future of mass media and mass communications - cross-media communications. Cross-media is explained through the presentation and analysis of contemporary examples and project-based tutorials in cross-media development. The text introduces fundamental terms and concepts, and provides a solid overview of cross-medi...
Mining Social Media
Did fake Twitter accounts help sway a presidential election? What can Facebook and Reddit archives tell us about human behavior? In Mining Social Media, senior BuzzFeed reporter Lam Thuy Vo shows you how to use Python and key data analysis tools to find the stories buried in social media. Whether you're a professional journalist, an academi...
Deep Learning with JavaScript
Deep learning has transformed the fields of computer vision, image processing, and natural language applications. Thanks to TensorFlow.js, now JavaScript developers can build deep learning apps without relying on Python or R. Deep Learning with JavaScript shows developers how they can bring DL technology to the web. Written by the main authors of t...
Coding with Minecraft
You've mined for diamonds, crafted dozens of tools, and built all sorts of structures - but what if you could program robots to do all of that for you in a fraction of the time? In Coding with Minecraft, you'll create a virtual robot army with Lua, a programming language used by professional game developers. Step-by-step coding project...
Guide to NoSQL with Azure Cosmos DB
Cosmos DB is a NoSQL database service included in Azure that is continuously adding new features and has quickly become one of the most innovative services found in Azure, targeting mission-critical applications at a global scale. This book starts off by showing you the main features of Cosmos DB, their supported NoSQL data models and the foundatio...
We Are All Here to Stay
In 2007, 144 UN member states voted to adopt a Declaration on the Rights of Indigenous Peoples. Australia, Canada, New Zealand and the US were the only members to vote against it. Each eventually changed its position. This book explains why and examines what the Declaration could mean for sovereignty, citizenship and democracy in liberal societies ...
XcalableMP PGAS Programming Language
XcalableMP is a directive-based parallel programming language based on Fortran and C, supporting a Partitioned Global Address Space (PGAS) model for distributed memory parallel systems. This open book presents XcalableMP language from its programming model and basic concept to the experience and performance of applications described in XcalableMP.�...
Carbon Pricing in Japan
This open book evaluates, from an economic perspective, various measures introduced in Japan to prevent climate change. Although various countries have implemented such policies in response to the pressing issue of climate change, the effectiveness of those programs has not been sufficiently compared. In particular, policy evaluations in the Asian ...
Understanding Acoustics
This open book, like Rayleigh's classic Theory of Sound, focuses on experiments and on approximation techniques rather than mathematical rigor. The second edition has benefited from comments and corrections provided by many acousticians, in particular those who have used the first edition in undergraduate and graduate courses. For example, pha...
Methods for Analysing and Reporting EQ-5D Data
This open access book is the first published guide about how to analyse data produced by the EQ-5D, one of the most widely used Patient Reported Outcomes questionnaires world wide. The authors provide practical, clear and comprehensive guidance in five concise chapters. Following an overview of the EQ-5D and its analysis, we describe how the questi...
Ernst Denert Award for Software Engineering 2019
This open book provides an overview of the dissertations of the five nominees for the Ernst Denert Award for Software Engineering in 2019. The prize, kindly sponsored by the Gerlind & Ernst Denert Stiftung, is awarded for excellent work within the discipline of Software Engineering, which includes methods, tools and procedures for better an...
Simplified Signs, Volume 2
Simplified Signs presents a system of manual sign communication intended for special populations who have had limited success mastering spoken or full sign languages. It is the culmination of over twenty years of research and development by the authors. The Simplified Sign System has been developed and tested for ease of sign comprehension, memoriz...
The Official Raspberry Pi Handbook 2021
To help you get the most of out of your Raspberry Pi computer, this official Handbook features 200 pages of essential information, inspiring projects, practical tutorials, and definitive reviews. - Learn how to set up your Raspberry Pi and start using it; - Discover the new Raspberry Pi 400 and High Quality Camera; - Be inspired by incredible ...
Model Theory
The purpose of the book is to give a thorough introduction to the methods of model theory for first order logic. Model theory is the branch of logic that deals with mathematical structures and the formal languages they interpret. First order logic is the most important formal language and its model theory is a rich and interesting subject with sign...
The Official Raspberry Pi Handbook 2022
Get even more from Raspberry Pi with the brand-new official Handbook! Over 200 pages of Raspberry Pi packed with inspirational projects, essential tutorials & guides, practical tips and definitive reviews! Inside The Official Raspberry Pi Handbook 2022: - QuickStart guide to setting up your Raspberry Pi computer; - Updated with Raspberry P...
Beginning Excel 2019
This open book was written for a community college introductory course in spreadsheets utilizing Microsoft Excel. While the figures shown utilize Excel 2019, the textbook was written to be applicable to other versions of Excel as well. The book introduces new users to the basics of spreadsheets and is appropriate for students in any major who have ...
SQL Server Source Control Basics
Few software developers would build an application without using source control, but its adoption for databases has been slower. Yet without source control to maintain the scripts necessary to create our database objects, load lookup data, and take other actions, we cannot guarantee a reliable and repeatable database deployment process, let alone c...
SQL Server Execution Plans, 3rd Edition
Every Database Administrator, developer, report writer, and anyone else who writes T-SQL to access SQL Server data, must understand how to read and interpret execution plans. My book leads you right from the basics of capturing plans, through how to interrupt them in their various forms, graphical or XML, and then how to use the information you fin...
Presto: The Definitive Guide
Perform fast interactive analytics against different data sources using the Presto high-performance, distributed SQL query engine. With this practical guide, you'll learn how to conduct analytics on data where it lives, whether it's Hive, Cassandra, a relational database, or a proprietary data store. Analysts, software engineers, and prod...
Debugging with GDB
The GNU Debugger allows you to see what is going on "inside" a program while it executes - or what a program was doing at the moment it crashed. GDB supports C, C++, Java, Fortran and Assembly among other languages; it is also designed to work closely with the GNU Compiler Collection (GCC). The GNU Debugger Program has four special featur...
Game Based and Adaptive Learning Strategies
This book is designed to accompany a graduate-level instructional design course: Game-Based and Adaptive Learning, but could also be used for undergraduate teacher education or instructional design courses. The original texts and material for this book came from the development of a course for Brandeis University as part of their MS in Learner E...
Svelte Succinctly
Svelte departs from the virtual DOM approach by compiling the code you write into native-browser JavaScript when you build your application. The result is minimal and highly optimized pure JavaScript that the browser executes with no heavy runtime. In Svelte Succinctly, Ed Freitas will show readers how to install Svelte and give them a condensed ov...
Contemporary Mathematics
Contemporary Mathematics is designed to meet the scope and sequence requirements for a liberal arts mathematics course. This resource provides stand-alone sections with a focus on showing relevance in the features as well as the examples, exercises, and exposition. Contemporary Mathematics integrates technology applications, projects, and highlight...
Engineering Systems Dynamics, Modelling, Simulation, and Design
This open education resource presents effective system modelling methods, including Lagrangian and bond graph, and the application of a relevant engineering software tool, 20-sim. The content is designed for engineering students and professionals in the field to support their understanding and application of these methods for modelling, simulation,...
Target Suitability and the Crime Drop
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved security, as...

1 2 3 4 ... 20