Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Urban Planning Against Poverty
This free book revisits the theoretical foundations of urban planning and the application of these concepts and methods in the context of Southern countries by examining several case studies from different regions of the world. For instance, the case of Koudougou, a medium-sized city in one of the poorest countries in the world, Burkina Faso, with ...
Tensor Network Contractions
Tensor network is a fundamental mathematical tool with a huge range of applications in physics, such as condensed matter physics, statistic physics, high energy physics, and quantum information sciences. This open access book aims to explain the tensor network contraction approaches in a systematic way, from the basic definitions to the important a...
Understanding Willing Participants, Volume 2
Horrified by the Holocaust, social psychologist Stanley Milgram wondered if he could recreate the Holocaust in the laboratory setting. Unabated for more than half a century, his (in)famous results have continued to intrigue scholars. Based on unpublished archival data from Milgram's personal collection, volume one of this two-volume set introd...
Advances in Energy System Optimization
The papers presented in this open access book address diverse challenges in decarbonizing energy systems, ranging from operational to investment planning problems, from market economics to technical and environmental considerations, from distribution grids to transmission grids, and from theoretical considerations to data provision concerns and app...
Think Data Structures
If you're a student studying computer science or a software developer preparing for technical interviews, this practical book will help you learn and review some of the most important ideas in software engineering - data structures and algorithms - in a way that's clearer, more concise, and more engaging than other materials. By emphas...
CS Unplugged
Computers are everywhere. We all need to learn how to use them, and many of us use them every day. But how do they work? How do they think? And how can people write software that is fast and easy to use? Computer science is a fascinating subject that explores these very questions. The easy and fun activities in this book, designed for studentren of...
Feeding the City
Every day in Mumbai 5,000 dabbawalas (literally translated as "those who carry boxes") distribute a staggering 200,000 home-cooked lunchboxes to the city's workers and students. Giving employment and status to thousands of largely illiterate villagers from Mumbai's hinterland, this co-operative has been in operation since the la...
Principles of Microeconomics
Principles of Microeconomics is an adaptation of the textbook, Microeconomics: Markets, Methods, and Models by D. Curtis and I. Irvine, which provides concise yet complete coverage of introductory microeconomic theory, application and policy in a Canadian and global environment. This adaptation employs methods that use equations sparingly and do...
Sustainable Supply Chains
This book is primarily intended to serve as a research-based textbook on sustainable supply chains for graduate programs in Business, Management, Industrial Engineering, and Industrial Ecology, but it should also be of interest for researchers in the broader sustainable supply chain space, whether from the operations management and industrial engin...
Energy and the Wealth of Nations
In this updated edition of a groundbreaking text, concepts such as energy return on investment (EROI) provide powerful insights into the real balance sheets that drive our "petroleum economy." Hall and Klitgaard explore the relation between energy and the wealth explosion of the 20th century, and the interaction of internal limits to grow...
Evidence-Based Critical Care
This book approaches the study of critical care with teaching in mind. In medicine "teachable moments" usually occur in clinical context, where the engagement in a real case exemplifies principles of diagnosis or therapy. In order to replicate the teaching method, selected cases are presented within each chapter offering the reader an opp...
Multimedia Big Data Computing for IoT Applications
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (...
Statistics and Analysis of Scientific Data
The revised 2nd edition of this book provides the reader with a solid foundation in probability theory and statistics as applied to the physical sciences, engineering and related fields. It covers a broad range of numerical and analytical methods that are essential for the correct analysis of scientific data, including probability theory, distribut...
Building Energy Modeling with OpenStudio
This book teaches the fundamentals of building energy modeling and analysis using open source example applications built with the US DOE's OpenStudio modeling platform and EnergyPlus simulation engine. Designed by researchers at US National Laboratories to support a new generation of high performance buildings, EnergyPlus and OpenStudio are re...
Algorithms
Algorithms are the lifeblood of computer science. They are the machines that proofs build and the music that programs play. Their history is as old as mathematics itself. This book is a wide-ranging, idiosyncratic treatise on the design and analysis of algorithms, covering several fundamental techniques, with an emphasis on intuition and the proble...
Building a Virtualized Network Solution
Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Public Speaking for Geeks Succinctly
Conferences, meet-ups, and user groups are an enormous part of both cultivating a developer community and continuing education in the industry. The stars of such events aren't the free food or the giveaways - they're the speakers, the ones who effectively and efficiently communicate something of value to attendees. In Public Speaking for ...
Programming Computer Vision with Python
If you want a basic understanding of computer vision's underlying theory and algorithms, this hands-on introduction is the ideal place to start. You'll learn techniques for object recognition, 3D reconstruction, stereo imaging, augmented reality, and other computer vision applications as you follow clear examples written in Python. Pro...
Cloud Design Patterns
Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to pro...
Robotic Process Automation Succinctly
Around the world, organizations are facing the challenge of becoming more efficient by increasing productivity with their existing resources - or sometimes even less. Robotic process automation (RPA) is a technology that can augment the productivity of human workers by liberating them from tedious and repetitive tasks that can be performed faster a...
Protecting SQL Server Data
In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, vie...
Open Data Structures
Offered as an introduction to the field of data structures and algorithms, Open Data Structures covers the implementation and analysis of data structures for sequences (lists), queues, priority queues, unordered dictionaries, ordered dictionaries, and graphs. Focusing on a mathematically rigorous approach that is fast, practical, and efficient, Mor...
Virtual Learning Design and Delivery
Online teaching can quickly become overwhelming. Finding ways to offer detailed and quality support, learning, and feedback, but through efficient and time-saving methods, will mean higher quality learning for less instructional time. For example, save all the course announcements, as they can be reused time and again. Create files of all tutorials...
Financial Numerical Recipes in C++
This book is a a discussion of the calculation of specific formulas in finance. The field of finance has seen a rapid development in recent years, with increasing mathematical sophistication. While the formalization of the field can be traced back to the work of Markowitz (1952) on investors mean-variance decisions and Modigliani and Miller (1958) ...
C++ Hacker's Guide
An experienced programmer accumulates a set of tools, tricks, and techniques to make his or her programs better. C++ Hacker's Guide collects more than 120 of the best C++ veteran secrets and puts them in one accessible place. The techniques presented have all been used in actual programs, and more importantly, have made actual programs better....
Managing Projects with GNU Make
The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic Managing Projects with GNU make, readers will learn why ...
Teaching Multiplication with Lesson Study
This open book is intended to assist teachers, teacher trainers, curriculum designers, editors and authors of textbooks in developing strategies to teach the multiplication of natural numbers based on the experience of the Lesson Study in Japan. This approach to mathematics education dates back to the 1870s and reconciles the emphasis on problem so...
Brain and Human Body Modeling 2020
This open book describes modern applications of computational human modeling in an effort to advance neurology, cancer treatment, and radio-frequency studies including regulatory, safety, and wireless communication fields. Readers working on any application that may expose human subjects to electromagnetic radiation will benefit from this book'...
Next Generation Supply Chains
This open book explores supply chains strategies to help companies face challenges such as societal emergency, digitalization, climate changes and scarcity of resources. The book identifies industrial scenarios for the next decade based on the analysis of trends at social, economic, environmental technological and political level, and examines how ...
Model-Based Engineering of Collaborative Embedded Systems
This open book presents the results of the "Collaborative Embedded Systems" (CrESt) project, aimed at adapting and complementing the methodology underlying modeling techniques developed to cope with the challenges of the dynamic structures of collaborative embedded systems (CESs) based on the SPES development methodology. In order to ma...
Textbook of Patient Safety and Clinical Risk Management
Implementing safety practices in healthcare saves lives and improves the quality of care: it is therefore vital to apply good clinical practices, such as the WHO surgical checklist, to adopt the most appropriate measures for the prevention of assistance-related risks, and to identify the potential ones using tools such as reporting & learni...

1 2 3