Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
The Definitive Guide to Graph Databases
For the right use case, relational databases are powerful tools. But today's users are asking for more than an RDBMS can handle. More features, more data, more speed and - most importantly - more connections. This ebook introduces you - the RDBMS developer - to a new technology that leverages data connections like never before: the graph...
Sustainable Food Systems
Faced with a global threat to food security, it is perfectly possible that society will respond, not by a dystopian disintegration, but rather by reasserting co-operative traditions. This book, by a leading expert in urban agriculture, offers a genuine solution to today's global food crisis. By contributing more to feeding themselves, cities c...
Program Arcade Games
Learn and use Python and PyGame to design and build cool arcade games. In Program Arcade Games: With Python and PyGame, 4th Edition, Dr. Paul Vincent Craven teaches you how to create fun and simple quiz games; integrate and start using graphics; animate graphics; integrate and use game controllers; add sound and bit-mapped graphics; and build grid-...
Library and Information Sciences
This book explores the development, trends and research of library and information sciences (LIS) in the digital age. Inside, readers will find research and case studies written by LIS experts, educators and theorists, most of whom have visited China, delivered presentations there and drafted their articles based on feedback they received. As a res...
Preparing for Life in a Digital Age
Ability to use information and communication technologies (ICT) is an imperative for effective participation in today's digital age. Schools worldwide are responding to the need to provide young people with that ability. But how effective are they in this regard? The IEA International Computer and Information Literacy Study (ICILS) responded t...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
Why Knowing What To Do Is Not Enough
This book sets out to explain the reasons for the gap between "knowing" and "doing" in view of self-reliance, which is more and more often expected of citizens. In today's society, people are expected to take responsibility for their own lives and be self-reliant. This is no easy feat. They must be on constant high alert in...
Dissonant Heritages and Memories in Contemporary Europe
This book discusses political, economic, social, and humanitarian challenges that influence both how people deal with their past and how they build their identities in contemporary Europe. Ongoing debates on migration, on local, national, inter- and transnational levels, prove that it is a divisive issue with regards to understanding European integ...
Designing Digital Work
"This book could well be the most comprehensive collection to date of integrated ideas on the elicitation, representation, integration and digitization of work processes and collaboration. The authors take a heavily human-centered approach while never losing sight of engineering aspects involved. Rooted in relevant theories, they present a set...
Innovations in Quantitative Risk Management
Quantitative models are omnipresent - but often controversially discussed - in todays risk management practice. New regulations, innovative financial products, and advances in valuation techniques provide a continuous flow of challenging problems for financial engineers and risk managers alike. Designing a sound stochastic model requires findin...
Inside Asylum Bureaucracy: Organizing Refugee Status Determination in Austria
This open access monograph provides sociological insight into governmental action on the administration of asylum in the European context. It offers an in-depth understanding of how decision-making officials encounter and respond to structural contradictions in the asylum procedure produced by diverging legal, political, and administrative objectiv...
Cyber-Physical Systems of Systems
Technical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating to achieve a well-defined objective – form the backbone of most of today's infrastructure. The energy grid, most transportation systems, the global banking industry, the water-supply system, the military equipm...
Geographies of the University
This open access volume raises awareness of the histories, geographies, and practices of universities and analyzes their role as key actors in today's global knowledge economy. Universities are centers of research, teaching, and expertise with significant economic, social, and cultural impacts at different geographical scales. Scholars from a ...
Optics in Our Time
Light and light based technologies have played an important role in transforming our lives via scientific contributions spanned over thousands of years. In this book we present a vast collection of articles on various aspects of light and its applications in the contemporary world at a popular or semi-popular level. These articles are written by th...
eIoT
This book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book's arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abat...
Understanding the Bigger Energy Picture
This book focuses on the global cycles of energy, water and carbon, which are not only the essentials of our main energy carriers, the fossil fuels, but are also the building blocks of life. The book offers an overview of the basic scientific facts and relationships that are needed to understand today's energy generation and use, how they rela...
The Future of the Law of the Sea
It explores the diverse phenomena which are challenging the international law of the sea today, using the unique perspective of a simultaneous analysis of the national, individual and common interests at stake. This perspective, which all the contributors bear in mind when treating their own topic, also constitutes a useful element in the effort to...
Graph Algorithms
Learn how graph algorithms can help you leverage relationships within your data to develop intelligent solutions and enhance your machine learning models. With this practical guide, developers and data scientists will discover how graph analytics deliver value, whether they're used for building dynamic network models or forecasting real-world ...
Conviviality at the Crossroads
Conviviality has lately become a catchword not only in academia but also among political activists. This open access book discusses conviviality in relation to the adjoining concepts cosmopolitanism and creolisation. The urgency of today's global predicament is not only an argument for the revival of all three concepts, but also a reason to br...
Vermin, Victims and Disease
"Dr Cassidy draws pertinent general conclusions about generating policy and mediating the role of the expert in today's science-sceptic and increasingly polarised society... It is both a useful and original contribution, specifically to the history of zoonotic disease policy, and policy history more generally."—Helen Bynum, Author ...
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape Ourselves
Selfies, blogs and lifelogging devices help us understand ourselves, building on long histories of written, visual and quantitative modes of self-representations. This book uses examples to explore the balance between using technology to see ourselves and allowing our machines to tell us who we are....
The Cold War in the Classroom
This book explores how the socially disputed period of the Cold War is remembered in today's history classroom. Applying a diverse set of methodological strategies, the authors map the dividing lines in and between memory cultures across the globe, paying special attention to the impact the crisis-driven age of our present has on images of the...
Obsessed by a Dream
This Open Access biography chronicles the life and achievements of the Norwegian engineer and physicist Rolf Widerøe. Readers who meet him in the pages of this book will wonder why he isn't better known.The first of Widerøe's many pioneering contributions in the field of accelerator physics was the betatron. He later went on to build th...
RESTful Web Services
You've built web sites that can be used by humans. But can you also build web sites that are usable by machines? That's where the future lies, and that's what RESTful Web Services shows you how to do. The World Wide Web is the most popular distributed application in history, and Web services and mashups have turned it into a powerful...
Hacking the Xbox
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects ...
Why Should I Care? Mobile Security for The Rest of Us
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief...
Why Do We Quote?
Quoting is all around us. But do we really know what it means? How do people actually quote today, and how did our present systems come about? This book brings together a down-to-earth account of contemporary quoting with an examination of the comparative and historical background that lies behind it and the characteristic way that quoting links pa...
Microsoft Platform and Tools for Mobile App Development
Understanding and creating a mobile app development strategy is an important process for today's development decision-makers opening up new business opportunities or empowering employees to be more productive with new capabilities. Microsoft defines an end-to-end platform for the agile creation of mobile apps that can target any platform (iOS,...
Mapping Global Theatre Histories
This book provides a global, chronological mapping of significant areas of theatre, sketched from its deepest history in the evolution of our brain's 'inner theatre' to ancient, medieval, modern, and postmodern developments. It considers prehistoric cave art and built temples, African trance dances, ancient Egyptian and Middle-Easter...
Prevention and Control of Infections in Hospitals
This volume offers extensive information on preventive and infection surveillance procedures, routines and policies adapted to the optimal infection control level needed to tackle today's microbes in hospital practice. It especially focuses on preventive measures for serious hospital infections. Each chapter includes a practical section that a...
Research Methods for Social Justice and Equity in Education
This book presents an integrative approach to thinking about research methods for social justice. In today's education landscape, there is a growing interest in scholar-activism and ways of doing research that advances educational equity. This text provides a foundational overview of important theoretical and philosophical issues specific to t...
Modern Web Development on the JAMstack
Learn how to run your web projects - everything from simple sites to complex applications - without a single server. It's possible with the JAMstack, a modern web development architecture for deploying fast, highly-scalable sites and applications that don't require traditional origin infrastructure. This practical report explains how the ...

1 2