A First Course in Linear Algebra, originally by K. Kuttler, as a first course for the general students who have an understanding of basic high school algebra and intend to be users of linear algebra methods in their profession, from business & economics to science students.
All major topics of linear algebra are available in detail, as well ...
This book presents strategies for analyzing qualitative and mixed methods data with MAXQDA software, and provides guidance on implementing a variety of research methods and approaches, e.g. grounded theory, discourse analysis and qualitative content analysis, using the software. In addition, it explains specific topics, such as transcription, build...
This book reviews the principles of infection control and the guidelines and standards of care in multiple countries, discussing them within the context of the practice of dentistry. The aim is to enable dental practitioners to ensure that the appropriate measures are adopted for each patient contact, thereby minimizing the risk of transmission of ...
This 3rd edition of the highly successful book, acclaimed for its comprehensiveness, accuracy, and excellent illustrations and photographs now comes with updated coverage plus numerous didactical improvements:The number of figures has notably increased, with about one third of them now presented in color. More photographs and schematics make it eas...
This manual, written by world opinion leaders in the field, is designed to provide readily accessible, step-by-step guidance on all aspects of the management of mass casualty incidents. Readers will find a wealth of helpful practical suggestions as well as information on the latest relevant scientific advances and their implications. Globally, mass...
This book is the first to present a rich selection of over 30 real-world cases of how leading organizations conduct Business Process Management (BPM). The cases stem from a diverse set of industry sectors and countries on different continents, reporting on best practices and lessons learned. The book showcases how BPM can contribute to both exploit...
This guide is an introduction to developing microservices-based applications and managing them using containers. It discusses architectural design and implementation approaches using .NET Core and Docker containers. To make it easier to get started with containers and microservices, the guide focuses on a reference containerized and microservice-ba...
This book provides end-to-end guidance on the Docker application development lifecycle with Microsoft tools and services while providing an introduction to Docker development concepts for readers who might be new to the Docker ecosystem. This way, anyone can understand the global picture and start planning development projects based on Docker and M...
Windows Server has powered a generation of organizations, from small businesses to large enterprises. No matter what your role in IT, you can be guaranteed you that have touched Windows Server at some point in your career or at very least you have seen it from afar! This book introduces you to Windows Server 2016, which is the next version of Windo...
Enterprise Cloud Strategy - Guidance for enterprises looking for proven methods to take their application portfolio to the cloud.
What if you were able to achieve both efficiency and innovation in all business domains and applications across your entire portfolio? What if you could take advantage of the cloud and all of its resources and feature...
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and...
The figures are eye-opening: more than 1.6 billion works on 9 million websites are licensed under Creative Commons (CC). These materials constitute an extraordinarily rich repository for teaching, learning, sharing, and creative reuse. Knowing your way around CC will help you make the most of the Open Access (OA) and open educational resources (OER...
Online teaching can quickly become overwhelming. Finding ways to offer detailed and quality support, learning, and feedback, but through efficient and time-saving methods, will mean higher quality learning for less instructional time. For example, save all the course announcements, as they can be reused time and again. Create files of all tutorials...
Collaboration is often seen as a palliative for the many wicked problems challenging our communities. These problems affect some of the most vulnerable and unempowered people in our community. They also carry significant implications for policy processes, programs of service and, ultimately, the budgets and resourcing of national and sub-national g...
This open book offers a unique and practically oriented study of organisational and national conditions for implementing Responsible Research Innovation (RRI) policies and practices. It gives the reader a thorough understanding of the different aspects of RRI, and of barriers and drivers of implementation of RRI related policies. It shows how diffe...
This open volume provides readers with an open access protocol collection and wide-ranging recommendations for preclinical renal MRI used in translational research. The chapters in this book are interdisciplinary in nature and bridge the gaps between physics, physiology, and medicine. They are designed to enhance training in renal MRI sciences and ...
This open access book is the first published guide about how to analyse data produced by the EQ-5D, one of the most widely used Patient Reported Outcomes questionnaires world wide. The authors provide practical, clear and comprehensive guidance in five concise chapters. Following an overview of the EQ-5D and its analysis, we describe how the questi...
This open book provides a valuable restatement of the current law of armed conflict regarding hostilities in a diverse range of contexts: outer space, cyber operations, remote and autonomous weapons, undersea systems and devices, submarine cables, civilians participating in unmanned operations, military objectives by nature, civilian airliners, des...
Java 3D Programming steps programmers through the important design and implementation phases of developing a successful Java 3D application. The book provides invaluable guidance on whether to use Java 3D, user interface design, geometry creation, scene manipulation and final optimizations. The book does not attempt to exhaustively cover the API or...
In a world where information has never been so accessible, and answers are available at the touch of a fingertip, we are hungrier for the facts than ever before - something the Covid-19 crisis has brought to light. And yet, paywalls put in place by multi-billion dollar publishing houses are still preventing millions from accessing quality, scientif...
Since the revival of maggot therapy in Western wound care approximately thirty years ago, there has been no comprehensive synthesis of what is known about its clinical practice, supply chain management, and social dimensions. This edited volume fills the information vacuum and, importantly, makes the current state of knowledge freely accessible. It...
Part of a series of specialized guides on System Center - this book shares real-world expertise for using Configuration Manager capabilities to deliver more effective IT services. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key deployment and management scenarios.
Th...
A lot of work is required to release an API, but the effort doesn't always pay off. Overplanning before an API matures is a wasted investment, while underplanning can lead to disaster. The second edition of this book provides maturity models for individual APIs and multi-API landscapes to help you invest the right human and company resources f...