The subject of this book is automated learning, or, as we will more often call it, Machine Learning (ML). That is, we wish to program computers so that they can "learn" from input available to them. Roughly speaking, learning is the process of converting experience into expertise or knowledge. The input to a learning algorithm is training...
In the decade and a half since Napster first emerged, forever changing the face of digital culture, the claim that "internet pirates killed the music industry" has become so ubiquitous that it is treated as common knowledge. Piracy is a scourge on legitimate businesses and hard-working artists, we are told, a "cybercrime" simila...
A cultural change in the Renaissance freed talented European writers to compose letters rivalling the finest that survived from ancient Rome. This book traces the lives and outlooks of distinguished Britons as revealed in their correspondence. The subjects range from the fierce satirist Jonathan Swift to the long-lived, all-observing Horace Walpole...
This book shows us that the way to master complexity is through insight rather than precision. Precision can overwhelm us with information, whereas insight connects seemingly disparate pieces of information into a simple picture. Unlike computers, humans depend on insight. Based on the author's fifteen years of teaching at MIT, Cambridge Unive...
From IT projects that have trampled all over the guiding principles of successful development, to tips on training your manager to the required standard, each of Phil's tales is shot through with a wild seam of anarchic humour. And yet, in each case, the humor is just a sugar coating for a pill of sage advice, wrought from years of rough-and-t...
Brexit will have significant consequences for the country, for Europe, and for global order. And yet much discussion of Brexit in the UK has focused on the causes of the vote and on its consequences for the future of British politics. This volume examines the consequences of Brexit for the future of Europe and the European Union, adopting an explic...
The book is a set of tutorials and examples. It uses the Common Lisp language and some of the libraries we'll be using for the examples and tutorials include:
- The hunchentoot web server
- The Restas web framework
- The SEXML library for outputting XML and HTML
- Closure-template for HTML templating
- Postmodern for PostgreSQL access, an...
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
Given the increasing attention to managing, publishing, and preserving research datasets as scholarly assets, what competencies in working with research data will graduate students in STEM disciplines need to be successful in their fields? And what role can librarians play in helping students attain these competencies? In addressing these questions...
Office 365 is Microsoft's smart and simple answer to cloud computing. Using the various programs in Office 365, you can do all the tasks you're used to doing in your favorite Office applications - write documents, create presentations, check email, manage your calendar, crunch numbers, and more - and then share what you create in real tim...
The demand for skilled data science practitioners in industry, academia, and government is rapidly growing. This book introduces concepts and skills that can help you tackle real-world data analysis challenges. It covers concepts from probability, statistical inference, linear regression and machine learning. It also helps you develop skills such a...
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...
This open access book provides an extensive review of ethical and regulatory issues related to human infection challenge studies, with a particular focus on the expansion of this type of research into endemic settings and/or low- and middle-income countries (LMICs). Human challenge studies (HCS) involve the intentional infection of research partici...
Introduction to the Modeling and Analysis of Complex Systems introduces students to mathematical/computational modeling and analysis developed in the emerging interdisciplinary field of Complex Systems Science. Complex systems are systems made of a large number of microscopic components interacting with each other in nontrivial ways. Many real-worl...
Three of CouchDB's creators show you how to use this document-oriented database as a standalone application framework or with high-volume, distributed applications. With its simple model for storing, processing, and accessing data, CouchDB is ideal for web applications that handle huge amounts of loosely structured data. That alone would stret...
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply.
Andrew Hoffman, a senior security engineer at Salesforce, intro...
In 1760, the French playwright Charles Palissot de Montenoy wrote Les Philosophes - a scandalous farcical comedy about a group of opportunistic self-styled philosophers. Les Philosophes emerged in the charged historical context of the pamphlet wars surrounding the publication of Diderot and d'Alembert's Encyclopédie, and delivered an obl...
This new and expanded edition is intended to help candidates prepare for entrance examinations in mathematics and scientific subjects, including STEP (Sixth Term Examination Paper). STEP is an examination used by Cambridge Colleges for conditional offers in mathematics. They are also used by some other UK universities and many mathematics departmen...
This open book provides an overview of the recent advances in representation learning theory, algorithms and applications for natural language processing (NLP). It is divided into three parts. Part I presents the representation learning techniques for multiple language entries, including words, phrases, sentences and documents. Part II then introdu...
Little did Isaac Newton, Charles Darwin and other 'gentlemen scientists' know, when they were making their scientific discoveries, that some centuries later they would inspire a new field of scientific practice and innovation, called citizen science. The current growth and availability of citizen science projects and relevant applications...
Types are the central organizing principle of the theory of programming languages. Language features are manifestations of type structure. The syntax of a language is governed by the constructs that define its types, and its semantics is determined by the interactions among those constructs. The soundness of a language design - the absence of ill-d...
This book started out as about 30 pages of notes for students in my introductory programming class at Mount St. Mary's University. Most of these students have no prior programming experience, and that has affected my approach. I leave out a lot of technical details and sometimes I oversimplify things. Some of these details are filled in later ...
This original edited volume takes William Blake's aphorism as a basis to explore how British Romantic literature creates its own sense of time. It considers Romantic poetry as embedded in and reflecting on the march of time, regarding it not merely as a reaction to the course of events between the late-eighteenth and mid-nineteenth centuries, ...
This book looks at some of the central issues in the philosophy of computer science. It is not designed to answer all (or even any) of the philosophical questions that can be raised about the nature of computing, computers, and computer science. Rather, it is designed to "bring you up to speed" on a conversation about these issues - to gi...
The issue "Mathematical Logic and Its Applications 2020" contains articles related to the following three directions:
I. Descriptive Set Theory (3 articles). Solutions for long-standing problems, including those of A. Tarski and H. Friedman, are presented.
II. Exact combinatorial optimization algorithms, in which the complexity rela...
The growth of social media over the last decade has revolutionized the way individuals interact and industries conduct business. Individuals produce data at an unprecedented rate by interacting, sharing, and consuming content through social media. Understanding and processing this new type of data to glean actionable patterns presents challenges an...
This open book is for the beginning level of both architecture and interior design students who learn computer graphic communication software. The author developed multiple tutorials to teach three computer graphic applications, AutoCAD, Revit, and Enscape. AutoCAD is an essential computer drafting software which is 2D drawing software. Revit is a ...
Climate change negotiations have failed the world. Despite more than thirty years of high-level, global talks on climate change, we are still seeing carbon emissions rise dramatically. This edited volume, comprising leading and emerging scholars and climate activists from around the world, takes a critical look at what has gone wrong and what is to...
Get even more from Raspberry Pi with the brand-new official Handbook! Over 200 pages of Raspberry Pi packed with inspirational projects, essential tutorials & guides, practical tips and definitive reviews!
Inside The Official Raspberry Pi Handbook 2022:
- QuickStart guide to setting up your Raspberry Pi computer;
- Updated with Raspberry P...
This book integrates the vital areas of object-orientation, functional programming, design patterns, and language design. The most important concepts from functional programming are captured with six design patterns: FUNCTION OBJECTS (Black-box behaviour parameterisation) LAZY OBJECTS (Evaluation-by-need semantics) VALUE OBJECTS (Immutable values) ...
Open Softwear is a book about fashion and technology. More precisely it is a book about Arduino boards, conductive fabric, resistive thread, soft buttons, LEDs, and some other things.
Authors got the chance to come together to write down their conclusions in the form of an illustrated book aiming at students and professionals trying to enter the...
The nineteenth century witnessed a series of revolutions in the production and circulation of images. From lithographs and engraved reproductions of paintings to daguerreotypes, stereoscopic views, and mass-produced sculptures, works of visual art became available in a wider range of media than ever before. But the circulation and reproduction of a...