Fully updated for Raspberry Pi 400, Raspberry Pi 4, and the latest software, this 252-page official Raspberry Pi book is crammed with projects and beginner's guides containing all the information you need to get started using your new computer!
Learn how to set up your Raspberry Pi, install an operating system, and start using it. Follow st...
When you explore a new technology landscape, the journey can take you to places you never expected. Take O'Reilly's CTO, Andrew Odewahn. While working on ideas for a new publishing platform, Andrew kept notes as he probed the depth and breadth of what we call the "distributed development stack" (DDS).
As patterns emerged, and...
For the right use case, relational databases are powerful tools.
But today's users are asking for more than an RDBMS can handle. More features, more data, more speed and - most importantly - more connections.
This ebook introduces you - the RDBMS developer - to a new technology that leverages data connections like never before: the graph...
This book presents direct and concise explanations and examples to many LaTeX syntax and structures, allowing students and researchers to quickly understand the basics that are required for writing and preparing book manuscripts, journal articles, reports, presentation slides and academic theses and dissertations for publication.
Unlike much of th...
If you're looking to gain an introduction into the world of user experience (UX) design - or maybe even freshen up your knowledge of the field - then this UX design book is the ideal place to start.
You'll cover a wide range of topics over nine highly readable chapters, with each one acting as a mini crash course. By the end, you'...
An experienced programmer accumulates a set of tools, tricks, and techniques to make his or her programs better. C++ Hacker's Guide collects more than 120 of the best C++ veteran secrets and puts them in one accessible place. The techniques presented have all been used in actual programs, and more importantly, have made actual programs better....
Linux, a Unix-compatible operating system that runs on personal computers and larger servers, is valued above all for its networking strengths. The Linux Network Administrator's Guide spells out all the information needed for joining a network, whether it's a simple UUCP connection or a full LAN with a Linux system serving as a firewall, ...
This ebook provides step-by-step instructions on replacing Cisco ACE with Nginx and off-the-shelf servers. Nginx helps you cut costs and modernize.
Cisco entered the hardware load balancer market with an add-on "Application Control Engine" (ACE) module for its Catalyst 6500-series switches, the Cisco ACE30. Soon after they released the...
This open book discusses how the involvement of citizens into scientific endeavors is expected to contribute to solve the big challenges of our time, such as climate change and the loss of biodiversity, growing inequalities within and between societies, and the sustainability turn. The field of citizen science has been growing in recent decades. Ma...
Blazor, A Beginners Guide is intended for developers with some .NET experience. If you're coming from a non-.NET development background, you may learn some .NET basics along the way, but supplemental material around C# and .NET would be of great help to you.
The book begins with the author's own perspective on WebAssembly, why it'...
Perform fast interactive analytics against different data sources using the Presto high-performance, distributed SQL query engine. With this practical guide, you'll learn how to conduct analytics on data where it lives, whether it's Hive, Cassandra, a relational database, or a proprietary data store. Analysts, software engineers, and prod...
Back in the mid 90s, Beej got tired of all his friends asking him how to do this stuff with networking programming in C, so he put pen to paper on the early World Wide Web and wrote down everything he knew just to get them off his back. Since then, the Guide has expanded significantly, with plenty of examples, and covers IPv6. Inside you'll fi...
This book is an essential guide to the medical treatment of thrombosis and presents core principles of anticoagulant therapeutics as well as drug recommendations. Written by recognized experts in the field, this concise, accessible handbook provides a unique and valuable resource in the cardiovascular field, both for those currently in training, an...
This quick-reference handbook offers a concise and practical review of key aspects of the treatment of ST-segment elevation myocardial infarction (STEMI) in the era of primary percutaneous coronary intervention (PPCI). In the context of STEMI, PPCI is the preferred mode of emergency revascularization. Access to PPCI is rapidly increasing and is now...
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy.
The authors, a uniquely skilled team of...
This book is a methodical treatise on narration in different types of media. A theoretical rather than a historical study, Transmedial Narration is relevant for an understanding of narration in all times, including our own. By reconstructing the theoretical framework of transmedial narration, this book enables the inclusion of all kinds of communic...
Compartment syndrome is a complex physiologic process with significant potential harm, and though an important clinical problem, the basic science and research surrounding this entity remains poorly understood. This unique open access book fills the gap in the knowledge of compartment syndrome, re-evaluating the current state of the art on this con...
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migrati...
This book offers updated and revised information on vessel health and preservation (VHP), a model concept first published in poster form in 2008 and in JVA in 2012, which has received a great deal of attention, especially in the US, UK and Australia. The book presents a model and a new way of thinking applied to vascular access and administration o...
Intel Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It...
Designed as an easy-to-use, practical guide to tumors of the eye, lids, and orbit, this book comprehensively addresses surgical treatment and management of diseases related to ophthalmic oncology. Surgical Ophthalmic Oncology: A Collaborative Open Access Reference is an ideal reference for general ophthalmologists, surgeons, fellows and trainees ar...
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.
Simply put, this book is designed to empower and excite the programming community to go out and do co...
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and authorisation. It helps readers understand web based authentication and provides the fundamentals of IP addres...
It constitutes a unique source of knowledge and guidance for all healthcare workers who care for patients with sepsis and septic shock in resource-limited settings. More than eighty percent of the worldwide deaths related to sepsis occur in resource-limited settings in low and middle-income countries. Current international sepsis guidelines cannot ...
Present information in stunning new ways by transforming CSS elements in two- and three-dimensional space. Whether you're rotating a photo, doing some interesting perspective tricks, or creating an interface that lets you reveal information on an element's backside, this practical guide shows you how to use them to great effect....
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times - a huge leap forward in byte-addressable capacity compar...
COVID-19 (coronavirus) - An illustrated guide for kids with questions....
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.
Author Matthew Gast - an industry expert who led the development of ...
The dramatic change in the price and accessibility of data demands a new focus on data analytic literacy. This book is intended for use by people who perform regular data analyses. It aims to give a brief summary of the key ideas, practices, and pitfalls of modern data analysis. One goal is to summarize in a succinct way the most common difficultie...
This project was initiated in 2009 with the aim to spread knowledge about mobile technologies and encourage people to enter our community or deepen their existing knowledge.
More than twenty writers from the mobile community share their know-how in dealing with topics such as accessibility in mobile apps, UX design, mobile analytics, prototyping...
Online privacy for journalists will guide professionals (and could and should guide anyone) about safeguarding their communications, browsing, and data, from any unwanted "big brother" or intruder. It is published now as the world is reshaping, and there's a real threat, even in the western world, for the free press. All proceeds fro...