Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Enterprise Cloud Strategy
Enterprise Cloud Strategy - Guidance for enterprises looking for proven methods to take their application portfolio to the cloud. What if you were able to achieve both efficiency and innovation in all business domains and applications across your entire portfolio? What if you could take advantage of the cloud and all of its resources and feature...
The DSC Book
Learn everything you need to know about Microsoft's Desired State Configuration, a management platform in Windows PowerShell. The DSC Book is designed to help you understand how DSC works, and how you can use it in a variety of scenarios....
Hadoop for Windows Succinctly
Author Dave Vickers provides a thorough guide to using Hadoop directly on Windows operating systems. From a conceptual overview to practical examples, Hadoop for Windows Succinctly is a valuable resource for developers....
PostgreSQL for Beginners
PostgreSQL for Beginners book is intended for those who only start getting acquainted with the world of PostgreSQL. It contains some basic information about this DBMS and its main features, history of its creation and development roadmap, step-by-step installation instructions and a getting started guide....
Making Servers Work
This book highlights practical sysadmin skills, common architectures that you'll encounter, and best practices that apply to automating and running systems at any scale, from one laptop or server to 1,000 or more. It is intended to help orient you within the discipline, and hopefully encourages you to learn more about system administration....
Linux commands Notes for Professionals
The Linux Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
The Little Go Book
The Little Go Book is a free introduction to Google's Go programming language. It's aimed at developers who might not be quite comfortable with the idea of pointers and static typing. It's longer than the other Little books, but hopefully still captures that little feeling....
SAT/SMT by Example
SAT/SMT solvers can be viewed as solvers of huge systems of equations. The difference is that SMT solvers takes systems in arbitrary format, while SAT solvers are limited to boolean equations in CNF 1 form. A lot of real world problems can be represented as problems of solving system of equations....
Microservices Best Practices for Java
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This book covers Microservices best practices fo...
The AI Ladder
The processes for gathering, organizing, analyzing, and ultimately infusing AI throughout your organization can be thought of as a ladder. A ladder helps you climb far higher than you could go on your own by turning an impossible leap into a series of steps. Knowing what the ladder looks like helps you evaluate your organization's readiness fo...
Doing Business 2020
The Doing Business 2020 study shows that developing economies are catching up with developed economies in ease of doing business. Still, the gap remains wide. An entrepreneur in a low-income economy typically spends around 50 percent of the country's per-capita income to launch a company, compared with just 4.2 percent for an entrepreneur i...
Xamarin.Forms Succinctly
The demand for mobile applications across Android, iOS, and Windows platforms often puts developers accustomed to .NET and C# in a bind. The gap between platform operating systems, programming languages, and devices is an immense obstacle. Ideally, these developers would be able use their existing skills and knowledge to build native mobile apps. X...
Natural Language Processing Succinctly
AI assistants represent a significant frontier for development. But the complexities of such systems pose a significant barrier for developers. In Natural Language Processing Succinctly, author Joseph Booth will guide readers through designing a simple system that can interpret and provide reasonable responses to written English text. With this fou...
Effective AWK Programming
When processing text files, the awk language is ideal for handling data extraction, reporting, and data-reformatting jobs. This practical guide serves as both a reference and tutorial for POSIX-standard awk and for the GNU implementation, called gawk. This book is useful for novices and awk experts alike. In this thoroughly revised 5th edition, ...
Achieving Viability for Public Service Media in Challenging Settings
In the face of challenges posed by a shifting digital media landscape, an array of international bodies continue to endorse public service media (PSM) as an essential component of democratisation. Yet how can PSM achieve viability in settings where models of media independence and credibility are unfamiliar or rejected by political leaders? The ...
Introduction to CNTK Succinctly
Microsoft CNTK (Cognitive Toolkit, formerly Computational Network Toolkit), an open source code framework, enables you to create feed-forward neural network time series prediction systems, convolutional neural network image classifiers, and other deep learning systems. In Introduction to CNTK Succinctly, author James McCaffrey offers instruction on...
Xamarin.Forms for macOS Succinctly
The demand for mobile applications across Android, iOS, and Windows platforms often puts developers accustomed to .NET and C# in a bind. The gap between platform operating systems, programming languages, and devices is an immense obstacle. Ideally, these developers would be able use their existing skills and knowledge to build native mobile apps. X...
Open Education
This insightful collection of essays explores the ways in which open education can democratise access to education for all. It is a rich resource that offers both research and case studies to relate the application of open technologies and approaches in education settings around the world. Global in perspective, this book argues strongly for the...
Access Controlled
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
Confessions of an IT Manager
From IT projects that have trampled all over the guiding principles of successful development, to tips on training your manager to the required standard, each of Phil's tales is shot through with a wild seam of anarchic humour. And yet, in each case, the humor is just a sugar coating for a pill of sage advice, wrought from years of rough-and-t...
The Internet Myth
The Internet Myth retraces and challenges the myth laying at the foundations of the network ideologies - the idea that networks, by themselves, are the main agents of social, economic, political and cultural change. By comparing and integrating different sources related to network histories, this book emphasizes how a dominant narrative has extensi...
A Conversation about Healthy Eating
What constitutes a healthy diet? Mainstream media and advertisers would like you to think that the answer to this question is complicated and controversial. But science, fortunately, tells us otherwise. A Conversation about Healthy Eating brings together all the relevant science about healthy eating in one place, and it's exactly that - a c...
Just Enough Linux
If you've toyed with Linux and never really caught on to what's happening or have used a graphical interface without really touching the command line this book is for you. The idea is to get you started on the process of using some of the commands available in Linux so that you: Feel comfortable running commands; You understand a littl...
Responsible Innovation
This book is based on the MOOC Responsible Innovation offered by the TU Delft. It provides a framework to reflect on the ethics and risks of new technologies. How can we make sure that innovations do justice to social and ethical values? How can we minimize (unknown) risks? The book explains: - The concept and importance of responsible innovati...
Game Design Research
Design research, or design studies as it is also called, has been gaining momentum as a field of academic inquiry since the beginning of 20th century. Originally, design research focused on design methods and processes but it has moved to cover more varied research questions related to design. Current research topics include, for example, how to st...
Rhetorical Code Studies
Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which software developers construct...
10 PRINT CHR$(205.5+RND(1)); : GOTO 10
This book takes a single line of code - the extremely concise BASIC program for the Commodore 64 inscribed in the title - and uses it as a lens through which to consider the phenomenon of creative computing and the way computer programs exist in culture. The authors of this collaboratively written book treat code not as merely functional but as a t...
Engines of Order
Software has become a key component of contemporary life and algorithmic techniques that rank, classify, or recommend anything that fits into digital form are everywhere. This book approaches the field of information ordering conceptually as well as historically. Building on the philosophy of Gilbert Simondon and the cultural techniques tradition, ...
Lisp Hackers
This book is a collection of short interviews with 14 prominent individuals from different parts of the world, from Australia to Canada, and of different occupations, from low-level programmers to physicists and musicians, asking them a more-or-less similar set of questions on the following topics: their general attitude to programming, attitude to...
Learning Zeromq
Even connecting a few programs across a few sockets is plain nasty when you start to handle real life situations. Trillions? The cost would be unimaginable. Connecting computers is so difficult that software and services to do this is a multi-billion dollar business. So today we're still connecting applications using raw UDP and TCP, proprieta...
The DARPA Model for Transformative Technologies
The U.S. Defense Advanced Research Projects Agency (DARPA) has played a remarkable role in the creation new transformative technologies, revolutionizing defense with drones and precision-guided munitions, and transforming civilian life with portable GPS receivers, voice-recognition software, self-driving cars, unmanned aerial vehicles, and, most fa...

1 ... 17 18 19 20 21 ... 23