Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Greedy Algorithms
Each chapter comprises a separate study on some optimization problem giving both an introductory look into the theory the problem comes from and some new developments invented by author(s). Usually some elementary knowledge is assumed, yet all the required facts are quoted mostly in examples, remarks or theorems....
Deploying NGINX as an API Gateway
In this eBook, we tell you how to take an existing NGINX Open Source or F5 NGINX Plus configuration and extend it to manage API traffic as well. When you use NGINX for API management, you tap into the high performance, reliability, robust community support, and expert professional support (for NGINX Plus customers) that NGINX is famous for. With...
Application Delivery and Load Balancing in Microsoft Azure
With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute t...
Defense against the Black Arts
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
Exploring Lift
Lift is designed to make powerful techniques easily accessible, while keeping the overall framework simple and flexible. Lift makes it fun to develop because it lets you focus on the interesting parts of coding. For those of you have experience with other web frameworks such as Struts, Tapestry, Rails, et cetera, you must be asking yourself, &qu...
Computer Networks
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students ...
Data Science at the Command Line
This thoroughly revised guide demonstrates how the flexibility of the command line can help you become a more efficient and productive data scientist. You'll learn how to combine small yet powerful command-line tools to quickly obtain, scrub, explore, and model your data. To get you started, author Jeroen Janssens provides a Docker image packe...
Spring Data Programming Cookbook
Spring Data's mission is to provide a familiar and consistent, Spring-based programming model for data access while still retaining the special traits of the underlying data store. It makes it easy to use data access technologies, relational and non-relational databases, map-reduce frameworks, and cloud-based data services. This is an umbre...
Introduction to Financial Mathematics
Introduction to Financial Mathematics: Concepts and Computational Methods serves as a primer in financial mathematics with a focus on conceptual understanding of models and problem solving. It includes the mathematical background needed for risk management, such as probability theory, optimization, and the like. The goal of the book is to expose th...
Custom PC: Issue 225
In Issue 225 we show you how to build a stunning water-cooled PC with hard tubing, taking you through the whole process from start to finish. Not only do we show you what gear to buy, but we also show you how to measure it up, cut and bend your tubing and fit it all together. You just need to add your own choice of Intel 12th-gen CPU, GPU, memor...
Next-Gen 802.11ac Wi-Fi For Dummies
HD movies and videos, gigabyte photo and music collections, extreme games ... today's digital content is bigger and better than ever. And now you (and many others!) are interacting with this content simultaneously on an expanding range of Wi-Fi devices, from smartphones, tablets, and laptops to consumer electronics and appliances. The Wi-Fi of...
Competitive Programmer's Handbook
The purpose of this book is to give you a thorough introduction to competitive programming. It is assumed that you already know the basics of programming, but no previous background in competitive programming is needed. The book is especially intended for students who want to learn algorithms and possibly participate in the International Olympi...
Climate Crisis Economics
Climate Crisis Economics draws on economics, political economy, scientific literature, and data to gauge the extent to which our various communities - political, economic, business - are making the essential leap to a new narrative and policy approach that will accelerate us towards the necessary transition to a decarbonized economy and sustainable...
Linux Kernel Crash Book
Linux crash analysis - this is a subject that has lots of unanswered mail threads and plain text documents scattered all over the place, inaccessible to almost everyone, save the tiny percentage of super geeks. My personal and professional interest in the last three years has taken me down the path of Linux kernel secrets, all the way into assem...
Resilient Web Design
Resilient Web Design, you might think that this is a handbook for designing robust websites. This is not a handbook. It's more like a history book. But in the world of web design, we are mostly preoccupied with the here and now. When we think beyond our presentmoment, it is usually to contemplate the future - to imaginethe devices, features...
Introduction to Autonomous Robots
This book provides an algorithmic perspective to autonomous robotics to students with a sophomore-level of linear algebra and probability theory. Robotics is an emerging field at the intersection of mechanical engineering, electrical engineering, and computer science. With computers becoming more powerful, making robots smart is getting more and mo...
Introduction to Embedded Systems
An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems. The most visible use of computers and software is processing information for human consumption. The vast majority of computers in use, however, are much less visible. They run the engine, brakes, seatbelts,...
How To Build a Website with HTML
If you are interested in learning how to build and design websites, Hyper Text Markup Language (HTML) is a great place to start. This project-based tutorial series will introduce you to HTML and its methods by building a personal website using our demonstration site (below) as a model. Once you learn the basics, you will know how change the website...
Computer Graphics from Scratch
Computer graphics programming books are often math-heavy and intimidating for newcomers. Not this one. Computer Graphics from Scratch takes a simpler approach by keeping the math to a minimum and focusing on only one aspect of computer graphics, 3D rendering. You'll build two complete, fully functional renderers: a raytracer, which simulate...
Introduction to Archaeology
This workbook was designed for the Introduction to Archaeology (ANTH 2339) class in the Department of Sociology and Anthropology, University of Texas at Arlington. It was created to provide exercises that supplement and expand on topics and issues raised in lecture. For each major topic, students complete exercises that serve a range of functions; ...
Network Virtualization and Cloud Computing
As businesses move more toward cloud computing, one important factor for success is adopting multi-tenant software-defined networking (SDN) solutions in data centers. Hyper-V Network Virtualization (HNV) is a key enabler for a multi-tenant SDN solution and is essential for implementing a hybrid cloud environment where tenants can bring not only the...
.NET Performance Testing and Optimization
As we develop the applications to meet current and future needs, it is only natural to use current best practices and techniques for our designs and implementations. In the quest to improve how we develop, we can access a true wealth of information which is available on design patterns, object-oriented analysis, low-level code techniques and langua...
Configuration Manager Field Experience
Part of a series of specialized guides on System Center - this book shares real-world expertise for using Configuration Manager capabilities to deliver more effective IT services. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key deployment and management scenarios. Th...
Managing Kubernetes Traffic with F5 NGINX
Microservices architectures introduce several benefits to the application development and delivery process. Microservices-based apps are easier to build, test, maintain, and scale. They also reduce downtime through better fault isolation. While container-based microservices apps have profoundly changed the way DevOps teams deploy applications, t...
Deep Learning for Coders with Fastai and PyTorch
Deep learning is often viewed as the exclusive domain of math PhDs and big tech companies. But as this hands-on guide demonstrates, programmers comfortable with Python can achieve impressive results in deep learning with little math background, small amounts of data, and minimal code. How? With fastai, the first library to provide a consistent inte...
Game Hacking Academy
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o...
Project Management
The world has become more complicated with the introduction and development of new technologies and methods, and novel risks such as Covid-19 pandemic. Competition has been tougher than it used to be. Organizations strive to keep up with the changes in the internal and external environment. In the light of unprecedented changes, project managers mu...
The Data Journalism Handbook
When you combine the sheer scale and range of digital information now available with a journalist's "nose for news" and her ability to tell a compelling story, a new world of possibility opens up. With The Data Journalism Handbook, you'll explore the potential, limits, and applied uses of this new and fascinating field. This ...
Chance Encounters
In this rigorous and necessary book, Kristien Hens brings together bioethics and the philosophy of biology to argue that it is ethically necessary for scientific research to include a place for the philosopher. As well as ethical, their role is conceptual: they can improve the quality and coherence of scientific research by ensuring that particular...
Learn Ruby on Rails: Book Two
In this book, you'll build a working web application so you'll gain hands-on experience. Along the way, you'll practice techniques used by professional Rails developers. And I'll help you understand why Rails is a popular choice for web development. Read Book One to get the big picture that's missing from other tutorials...
HackSpace Magazine: Issue 62
It's not yet Christmas, but we come bearing glad tidings: the supply of Raspberry Pis available to hobbyists is starting to come back to normal. To celebrate, we're exploring 20 of the best hardware projects you can build with a Raspberry Pi - whether that's large or small, simple or complex, useful or not-so-useful. - Keep your p...
Designing Event-Driven Systems
Many forces affect software today: larger datasets, geographical disparities, complex company structures, and the growing need to be fast and nimble in the face of change. Proven approaches such as service-oriented and event-driven architectures are joined by newer techniques such as microservices, reactive architectures, DevOps, and stream process...

1 ... 25 26 27 28