Representations of Transnational Human Trafficking
This open access edited collection examines representations of human trafficking in media ranging from British and Serbian newspapers, British and Scandinavian crime novels, and a documentary series, and questions the extent to which these portrayals reflect the realities of trafficking. It tackles the problematic tendency to under-report particula...
Proceedings of the International Conference on Social Modeling and Simulation, plus Econophysics Colloquium 2014
The proceedings of the international conference "SMSEC2014", a joint conference of the first "Social Modeling and Simulations" and the 10th "Econophysics Colloquium", held in Kobe in November 2014 with 174 participants, are gathered herein. Cutting edge scientific researches on various social phenomena are reviewed. Ne...
Istio Succinctly
Istio is one of the most popular solutions for service meshes in cloud-native infrastructures, and it is most often deployed on Kubernetes clusters. In Istio Succinctly, authors Rahul Rai and Tarun Pabbi provide a practical guide to getting started with Istio, from setting up a Kubernetes cluster, to managing its traffic management, security, obser...
An Introduction to Computer Networks
An Introduction to Computer Networks, a free and open general-purpose computer-networking free book, complete with diagrams and exercises. It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP. Particular attention is paid to congestion; other special topics include queuing, real-time traffic, network management, sec...
Entreprenerd: Marketing <for> Programmers
A modern web-marketing book that outlines a multi-modal system for growing a website with SEO, Google AdWords/Facebook Ads, Conversion Optimisation, Copywriting/Classic Persuasion/Behavioural Psychology, Google Analytics, Statistical Significance, Email Marketing, and Remarketing. When I launched my first web application it started off with zero tr...
A Case Study in Community-Driven Software Adoption
Within an SRE organization, teams usually develop very different automation tools and processes for accomplishing similar tasks. Some of this can be explained by the software they support: different systems require different reliability solutions. But many SRE tasks are essentially the same across all software: compiling, building, deploying, canar...
Learn Azure in a Month of Lunches
More than 100 Azure services offer everything you need to build and run your applications with all the performance, redundancy, security, and scale that the cloud has to offer. But knowing where to begin with all these services can seem overwhelming. Learn Azure in a Month of Lunches, 2nd Edition, is a tutorial on writing, deploying, and running...
Asian Century… on a Knife-edge
This book delves into the widely held belief that the 21st century will be the "Asian Century" by examining the Asia's rapid economic development in the post-war era and the challenges it faces in forging ahead of world leaders in the West.The impact of the current turbulent global political climate on Asia is critically analyzed, employi...
Intelligent Human Computer Interaction
This book constitutes the thoroughly refereed proceedings of the 9th International Conference on Intelligent Human Computer Interaction, IHCI 2017, held in Evry, France, in December 2017. The 15 papers presented together with three invited papers were carefully reviewed and selected from 25 submissions. The conference is forum for the presentation...
Computer and Information Sciences
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016. The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classific...
Contested Childhoods: Growing up in Migrancy
This book explores specific migration, governance, and identity processes currently involving children and ideas of childhood. Migrancy as a social space allows majority populations to question the capabilities of migrants, and is a space in which an increasing number of children are growing up. In this space, families, nation-states, civil society...
Security in Computer and Information Sciences
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
Exploring Resilience
Resilience has become an important topic on the safety research agenda and in organizational practice. Most empirical work on resilience has been descriptive, identifying characteristics of work and organizing activity which allow organizations to cope with unexpected situations. Fewer studies have developed testable models and theories that can be...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Autonomous Driving
This book takes a look at fully automated, autonomous vehicles and discusses many open questions: How can autonomous vehicles be integrated into the current transportation system with diverse users and human drivers? Where do automated vehicles fall under current legal frameworks? What risks are associated with automation and how will society respo...
Autonomous Control for a Reliable Internet of Services
This free book was prepared as a Final Publication of the COST Action IC1304 "Autonomous Control for a Reliable Internet of Services (ACROSS)". The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-grad...
Internet of Things
First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers...
Rethinking the Internet of Things
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
Reality Lost
This book looks at how a democracy can devolve into a post-factual state.The media is being flooded by populist narratives, fake news, conspiracy theories and make-believe. Misinformation is turning into a challenge for all of us, whether politicians, journalists, or citizens. In the age of information, attention is a prime asset and may be convert...
Proceedings of the Scientific-Practical Conference
It relates to the III Annual Conference hosted by the Russian Federal Ministry of Education and Science in December 2016. This event has summarized, analyzed and discussed the interim results, academic outputs and scientific achievements of the Russian Federal Targeted Programme for Research and Development in priority areas of development of the R...
Industrial Internet
Consumer networks have revolutionized the way companies understand and reach their customers, making possible intricate measurement and accurate prediction at every step of every transaction. The same revolution is underway in our infrastructure, where new generations of sensor-laden power plants, cars and medical devices will generate vast quantit...
5 Unsung Tools of DevOps
To quote Arthur Conan Doyle, "It has long been an axiom of mine that the little things are infinitely the most important." While I usually associate that quote with the toppings I want on my sundae, it rings true for the holistic view of DevOps. Configuration Management is critical, and you should have a system in place to handle the b...
Think Complexity
Complexity science uses computation to explore the physical and social sciences. In Think Complexity, you'll use graphs, cellular automata, and agent-based models to study topics in physics, biology, and economics. Whether you're an intermediate-level Python programmer or a student of computational modeling, you'll delve into examples of complex...
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
Creating a Production Launch Plan
In this book, we describe the components of a launch plan at Google and offer practical methods you might apply to reduce production launch risks for your own products. We include lessons we have learned about what works well for launching Google products, including large products, new features for existing products, and even small products. The le...
CSS Animation 101
This book is for people who build for the web and want to add animation to their designs and sites. A bit of basic CSS knowledge is needed but I won't assume any knowledge of transitions or animations. We'll start with the basics, and through a mix of theory and practical examples, learn all about transitions and animation....
Building a Virtualized Network Solution
Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from...
App Modernization on Azure Succinctly
What's the right way to move existing applications to the cloud to better use its power while enabling new features? In App Modernization on Azure Succinctly, Lorenzo Barbieri will help you understand how to modernize existing apps without completely rewriting them. This ebook will guide you through moving your app to the cloud, refactoring, rearch...
Engineering Reliable Mobile Applications
Imagine a situation where your services report healthy and serving but you receive multiple user reports of poor availability. How are these users accessing your service? Most likely, they are using your service through a client application, such as a mobile application on their phone. SRE traditionally has only supported systems and services run i...
Modern Web Development on the JAMstack
Learn how to run your web projects - everything from simple sites to complex applications - without a single server. It's possible with the JAMstack, a modern web development architecture for deploying fast, highly-scalable sites and applications that don't require traditional origin infrastructure. This practical report explains how the JAMstack d...
Making Servers Work
This book highlights practical sysadmin skills, common architectures that you'll encounter, and best practices that apply to automating and running systems at any scale, from one laptop or server to 1,000 or more. It is intended to help orient you within the discipline, and hopefully encourages you to learn more about system administration....
Musical Cities
Musical Cities represents an innovative approach to scholarly research and dissemination. A digital and interactive 'book', it explores the rhythms of our cities, and the role they play in our everyday urban lives, through the use of sound and music. Sara Adhitya first discusses why we should listen to urban rhythms in order to design more livea...

1 2