Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Energy in Africa
This book presents a picture of the current energy challenges on the African continent (and the Sub-Saharan region in particular) and proposes pathways to an accelerated energy transition. Starting with an analysis of the status quo and the outlook for Africa's energy demand and energy access, it provides an account of the available resources,...
Pro TBB
This book is a modern guide for all C++ programmers to learn Threading Building Blocks (TBB). Written by TBB and parallel programming experts, this book reflects their collective decades of experience in developing and teaching parallel programming with TBB, offering their insights in an approachable manner. Throughout the book the authors present ...
Tobacco Control Policy in the Netherlands
Governments have known since the 1960s that smoking results in irreversible health damage. This book examines why governments have done so little to combat this when they have been aware of the problem and its solutions for decades. What are the strategies and decisions that make a difference, given that policy environments are often not conducive ...
Tales of Research Misconduct
This monograph contributes to the scientific misconduct debate from an oblique perspective, by analysing seven novels devoted to this issue, namely: Arrowsmith by Sinclair Lewis (1925), The affair by C.P. Snow (1960), Cantor's Dilemma by Carl Djerassi (1989), Perlmann's Silence by Pascal Mercier (1995), Intuition by Allegra Goodman (2006...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Information Infrastructures within European Health Care
This book consolidates experiences from across Europe on the design, development, implementation and evolution of inter-organisational information infrastructures for healthcare. It provides insights with practical relevance for those involved or interested in the planning and implementation of such infrastructures and includes 11 empirical cases o...
The Pathologisation of Homosexuality in Fascist Italy
This book investigates the pathologisation of homosexuality during the fascist regime in Italy through an analysis of the case of G., a man with "homosexual tendencies" interned in the Collegno mental health hospital in 1928. No systematic study exists on the possibility that Fascism used internment in an asylum as a tool of repression fo...
Fashion Figures
Missy Maker is a middle school girl who loves math and fashion. She sees math in everything she does. She tries to hide this from her friends, because she thinks it's too geeky. Missy hears that the school math club needs more members, but she's worried about what her friends will think if she joins, and she's already committed to jo...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Martin Waldseemüller's 'Carta marina' of 1516
This book presents the first detailed study of one of the most important masterpieces of Renaissance cartography, Martin Waldseemüller's Carta marina of 1516. By transcribing, translating into English, and detailing the sources of all of the descriptive texts on the map, as well as the sources of many of the images, the book makes the map ava...
White-Collar Crime in the Shadow Economy
This book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research of those who have uncovered various forms of white-collar crime. It argues that the offenders who are convicted represent only 'the tip of the iceberg' of a much greater problem: because white-collar crime is forced to comp...
Psychometric Framework for Modeling Parental Involvement and Reading Literacy
This volume offers insights from modelling measures of parental involvement and their relationship with student reading literacy across countries, exploring and incorporating cultural differences. This is a significant contribution to a field where cross-cultural comparisons from a triangulated perspective are sparse. For readers interested in expl...
Inquiry-Based Learning - Undergraduate Research
This book provides a systematic overview of experiences with Inquiry-Based Learning (IBL) and undergraduate research (UR) in German universities, covering both research universities (Universitäten) and universities of applied sciences (Fachhochschulen). Divided into three parts, the book starts with the principles and common practices of IBL/UR at...
Stem Cells in Neuroendocrinology
This volume starts with an elementary introduction covering stem cell methodologies used to produce specific types of neurons, possibilities for their therapeutic use, and warnings of technical problems. In addition the authors report successes in achieving the derivation of a specific type of neuron. The dopamine neuron offers an important example...
Early Childhood Policies and Systems in Eight Countries
This report provides an overview of policy strategies on early childhood education settings (from birth to primary schooling) in eight countries. Data were collected using a policy questionnaire addressed to and completed by the National Research Coordinator(s) (NRC) of Chile, the Czech Republic, Denmark, Estonia, Italy, Poland, the Russian Federat...
New Horizons for Asian Museums and Museology
This book presents up-to-date information about museums and museology in present-day Asia, focusing on Japan, Mongolia, Myanmar, and Thailand.Asian countries today have developed or are developing their own museology and museums, which are not simple copies of European or North American models. This book provides readers with carefully chosen examp...
Android on x86
Android on x86: an Introduction to Optimizing for Intel® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel's x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x...
S-BPM in the Production Industry
This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. Their potential is explored in detail, while the limits of engineering a company from a communication-centred perspective are also discussed. After a general introduction and an overview of the book in chapter 1, chapter 2 ...
Special Topics in Information Technology
This book presents nine outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. Information Technology has always been highly interdisciplinary, as many aspects have to be considered in IT systems. The doctoral studies program in IT at Politecnico...
Optimizing HPC Applications with Intel Cluster Tools
Optimizing HPC Applications with Intel Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve...
Harnessing the Power of the Criminal Corpse
This book is the culmination of many years of research on what happened to the bodies of executed criminals in the past. Focusing on the eighteenth and nineteenth centuries, it looks at the consequences of the 1752 Murder Act. These criminal bodies had a crucial role in the history of medicine, and the history of crime, and great symbolic resonance...
Using Blocks in Ruby
Unannounced and unmarked, blocks turn up all over Ruby programs. Their use ranges from some of Ruby's most basic structures, such as loops, to some of its most sophisticated tricks. Similar to closures or lambdas in other languages, blocks enable some of Ruby's vaunted efficiency. Blocks even allow other people to write some of the code y...
Business Models for the Data Economy
You're sitting on a pile of interesting data. How do you transform that into money? It's easy to focus on the contents of the data itself, and to succumb to the (rather unimaginative) idea of simply collecting and reselling it in raw form. While that's certainly profitable right now, you'd do well to explore other opportunities ...
Field Guide to the Distributed Development Stack
When you explore a new technology landscape, the journey can take you to places you never expected. Take O'Reilly's CTO, Andrew Odewahn. While working on ideas for a new publishing platform, Andrew kept notes as he probed the depth and breadth of what we call the "distributed development stack" (DDS). As patterns emerged, and...
Programming Persistent Memory
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times - a huge leap forward in byte-addressable capacity compar...
A Memory of Ice
In the southern summer of 1972/73, the Glomar Challenger was the first vessel of the international Deep Sea Drilling Project to venture into the seas surrounding Antarctica, confronting severe weather and ever-present icebergs. A Memory of Ice presents the science and the excitement of that voyage in a manner readable for non-scientists. Woven i...
Cow Care in Hindu Animal Ethics
This book provides both a broad perspective and a focused examination of cow care as a subject of widespread ethical concern in India, and increasingly in other parts of the world. In the face of what has persisted as a highly charged political issue over cow protection in India, intellectual space must be made to bring the wealth of Indian traditi...
Software & Hardware Collide
Over the last few years, members of the O'Reilly community have increasingly turned their attention to hardware. It's getting much easier to design, prototype, build and market hardware, and it's getting easier to integrate software and hardware into fluid packages of intelligence, beauty, and intuitive design. Hardware and software ...
Software Above the Level of a Single Device
When considering "the Internet of Things," it's easy to miss the bigger pattern: we are no longer just building software for individual devices, but creating networks of intelligence and action that make it possible to completely rethink how we organize work, play, and society itself. This report provides the complete text of Tim O&#...
5 Unsung Tools of DevOps
To quote Arthur Conan Doyle, "It has long been an axiom of mine that the little things are infinitely the most important." While I usually associate that quote with the toppings I want on my sundae, it rings true for the holistic view of DevOps. Configuration Management is critical, and you should have a system in place to handle the b...
Cloud Native Applications
Cloud computing is a game changer. Being able to automate and constantly adjust infrastructure is one important reason to use cloud computing for your clients. And developing and operating systems that are able to recover from failure automatically has never been easier. Cloud providers offer you the needed infrastructure for a very reasonable pric...
Think Bayes
If you know how to program with Python and also know a little about probability, you're ready to tackle Bayesian statistics. With this book, you'll learn how to solve statistical problems with Python code instead of mathematical notation, and use discrete probability distributions instead of continuous mathematics. Once you get the math o...

1 ... 4 5 6 7 8 ... 16