Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
William Sharp and
William Sharp (1855-1905) conducted one of the most audacious literary deceptions of his or any time. A Scottish poet, novelist, biographer, and editor, he began in 1893 to write critically and commercially successful books under the name Fiona Macleod who became far more than a pseudonym. Enlisting his sister to provide the Macleod handwriting, he...
History of International Relations
Existing textbooks on international relations treat history in a cursory fashion and perpetuate a Euro-centric perspective. This textbook pioneers a new approach by historicizing the material traditionally taught in International Relations courses, and by explicitly focusing on non-European cases, debates and issues. The volume is divided into thre...
Wearable Tech Projects
We've gathered up the best bits of wearable technology from the first two years of HackSpace magazine for this amazing book. Its 164 pages are packed with step-by-step tutorials and inspirational projects to help you add a unique look to your wardrobe! Ditch the circuit board, step away from the computer: it's time to use your tech skills...
Load Balancing in the Cloud
Use of redundant servers has long been a solution for meeting sudden spikes in demand, machine failures, and outages. Cloud services greatly reduce the cost and hassle of provisioning redundant equipment and load balancers and give you the ability to deal with separate network, application, and client-side loads. But today there are many options to...
Financial Management for Small Businesses
This book is for those whose financial management focus is on small businesses. For you, we adapt the traditional financial management themes emphasized in corporate financial management courses to meet the needs of small businesses. Many financial managers of small businesses come from farms or agribusinesses. Others are interested in working f...
Game Hacking Academy
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o...
Designing Event-Driven Systems
Many forces affect software today: larger datasets, geographical disparities, complex company structures, and the growing need to be fast and nimble in the face of change. Proven approaches such as service-oriented and event-driven architectures are joined by newer techniques such as microservices, reactive architectures, DevOps, and stream process...
Azure Bot Service Succinctly
The power of artificial intelligence may be intimidating, but Microsoft provides the Bot Framework Composer to simplify the process of building conversational AI bots. Conversational bots are especially useful in serving different segments of a business, like customer support, sales, and administration. In this ebook, author Ed Freitas gets you up ...

1 ... 4 5 6