Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Why Icebergs Float
From paintings and food to illness and icebergs, science is happening everywhere. Rather than follow the path of a syllabus or textbook, Andrew Morris takes examples from the science we see every day and uses them as entry points to explain a number of fundamental scientific concepts - from understanding colour to the nature of hormones - in ways t...
Brexit and Beyond
Brexit will have significant consequences for the country, for Europe, and for global order. And yet much discussion of Brexit in the UK has focused on the causes of the vote and on its consequences for the future of British politics. This volume examines the consequences of Brexit for the future of Europe and the European Union, adopting an explic...
PHP: The Right Way
There's a lot of outdated information on the Web that leads new PHP users astray, propagating bad practices and insecure code. PHP: The Right Way is an easy-to-read, quick reference for PHP popular coding standards, links to authoritative tutorials around the Web and what the contributors consider to be best practices at the present time. T...
Responsible Innovation
This book is based on the MOOC Responsible Innovation offered by the TU Delft. It provides a framework to reflect on the ethics and risks of new technologies. How can we make sure that innovations do justice to social and ethical values? How can we minimize (unknown) risks? The book explains: - The concept and importance of responsible innovati...
Cloud Design Patterns
Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to pro...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...
PowerShell Notes for Professionals
The PowerShell Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....

1 ... 30 31 32 33 34 ... 39