This open access book reports on a pilot project aiming at collecting information on the socio-ecological risks that could arise in the event of an uncontrolled spread of genetically engineered organisms into the environment. The researchers will, for instance, be taking a closer look at genetically engineered oilseed rape, genetically engineered o...
Pro Git, 2nd Edition is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro.
Effective and well-implemented v...
This book analyzes the possibilities for effective global governance of science in Europe, India and China. Authors from the three regions join forces to explore how ethical concerns over new technologies can be incorporated into global science and technology policies. The first chapter introduces the topic, offering a global perspective on embeddi...
We are not free from environmental risks that accompany the development of human societies. Modern economic development has accelerated environmental pollution, caused loss of natural habitats, and modified landscapes. These environmental changes have impacted natural systems: water and heat circulation, nutrient cycling, and biodiversity. These ch...
This book presents a comparative look at the norms and attitudes related to youth violence. It aims to present a perspective outside of the typical Western context, through case studies comparing a developed / Western democracy (Germany), a country with a history of institutionalized violence (South Africa), and an emerging democracy that has exper...
This book draws on a broad study on violence against men, from both male and female partners in Norway, to contribute to the research on intimate partner violence. It identifies similarities in men's experiences and backgrounds, including in their perceptions of their own victimisation. Marianne Inez Lien and Jørgen Lorentzen argue that the t...
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times - a huge leap forward in byte-addressable capacity compar...
This book presents computer programming as a key method for solving mathematical problems. This second edition of the well-received book has been extensively revised: All code is now written in Python version 3.6 (no longer version 2.7). In addition, the two first chapters of the previous edition have been extended and split up into five new chapte...
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment.
Too often as deve...
You've built web sites that can be used by humans. But can you also build web sites that are usable by machines? That's where the future lies, and that's what RESTful Web Services shows you how to do. The World Wide Web is the most popular distributed application in history, and Web services and mashups have turned it into a powerful...
This text finally collects all the introductory aspects of beer brewing science into one place for undergraduate brewing science courses. This expansive and detailed work is written in conversational style, walking students through all the brewing basics from the origin and history of beer to the brewing process to post-brew packaging and quality c...
The U.S. Defense Advanced Research Projects Agency (DARPA) has played a remarkable role in the creation new transformative technologies, revolutionizing defense with drones and precision-guided munitions, and transforming civilian life with portable GPS receivers, voice-recognition software, self-driving cars, unmanned aerial vehicles, and, most fa...
A unified treatment of the most important results in the study of fractional graph concepts, this volume explores the various ways in which integer-valued concepts can be modified to derive nonintegral values. It begins with the general fractional theory of hypergraphs and presents in-depth coverage of fundamental and advanced topics. Subjects incl...
You can cache static assets - more than half the payload needed to respond to many web requests - and even application‑generated web pages (whether partial or complete). And you can use cache clusters and microcaching to increase the caching capability of your web applications while simplifying implementation and reducing operational complexity.
...
How to Think Like a Computer Scientist is an introductory programming book based on the OCaml language. It is a modified version of Think Python by Allen Downey. It is intended for newcomers to programming and also those who know some programming but want to learn programming in the function-oriented paradigm, or those who simply want to learn OCam...
It took me a pretty long time to really get Git. As I've continued to use Git more and more where I work, I've found myself trying to teach people what it is and why we use it over and over again, and the reality is that Git generally has a pretty steep learning curve compared to many other systems. I've seen case after case of devel...
In this book we discuss several numerical methods for solving ordinary differential equations. We emphasize the aspects that play an important role in practical problems. We confine ourselves to ordinary differential equations with the exception of the last chapter in which we discuss the heat equation, a parabolic partial differential equation. T...