This book illustrates the benefits to be gained from digitally networked communication for health, education and transitioning economies in developing nations (Sierra Leone and Papua New Guinea) and developed nations. Growing powers of e-citizenship can help build sustainable futures. This small volume provides a collection of examples and ideas fr...
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
This guide is an introduction to developing microservices-based applications and managing them using containers. It discusses architectural design and implementation approaches using .NET Core and Docker containers. To make it easier to get started with containers and microservices, the guide focuses on a reference containerized and microservice-ba...
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students ...
Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this boo...
When you start building your first containerized application, you're excited about the capabilities and opportunities you encounter: it runs the same in dev and in prod, it's straightforward to put together a container image using Docker, and the distribution is taken care of by a container registry.
So, you're satisfied with how ...
How do social networking services earn money?What is the "second hand of the market" and how does it operate? Why does society need so many different kinds of goods? What does happiness economics not reveal about happiness?What is the link between talent, success and "stardom"? What is the business development model for the ent...
A PDF version of this book is available for free in open access via the OAPEN Library platform, www.oapen.org. This book examines the significance of networks among the firms operative in the contemporary Russian software industry in the St. Petersburg region....
This book discusses a core question in many fields of the social sciences, namely how to create, share and adopt new knowledge. It creates an original space for conversation between two lines of research that have developed largely in parallel for a long time: social network theory and the geography of knowledge. This book considers that relational...
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016.
The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classific...
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
This book is the final compendium of case studies emanated from the 4-year COST Action IC1406 "High-Performance Modelling and Simulation for Big Data Applications" (cHiPSet). Funded by the European Commission from 2015, cHiPSet has created a sustainable reference network linking applied research in High Performance Computing (HPC) and Mod...
Governments have known since the 1960s that smoking results in irreversible health damage. This book examines why governments have done so little to combat this when they have been aware of the problem and its solutions for decades. What are the strategies and decisions that make a difference, given that policy environments are often not conducive ...
This book, inspired by the ICME 13 Thematic Afternoon on "European Didactic Traditions", takes readers on a journey with mathematics education researchers, developers and educators in eighteen countries, who reflect on their experiences with Realistic Mathematics Education (RME), the domain-specific instruction theory for mathematics educ...
In everyday communication, Europe's citizens, business partners and politicians are inevitably confronted with language barriers. Language technology has the potential to overcome these barriers and to provide innovative interfaces to technologies and knowledge. This document presents a Strategic Research Agenda for Multilingual Europe 2020. T...
This book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book's arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abat...
Windows developers have always enjoyed the productivity boost you get with the .NET platform, tools like Entity Framework and ASP.NET, and the amazingly-powerful C# language. Now, .NET Core extends those same benefits to Linux-based systems, offering a true cross-platform solution for enterprise application development. The .NET Core tools, includi...
This book examines more than two centuries of societal development using novel historical and statistical approaches. It applies the well-being monitor developed by Statistics Netherlands that has been endorsed by a significant part of the international, statistical community. It features The Netherlands as a case study, which is an especially inte...
This open access book, inspired by the ICME 13 Thematic Afternoon on "European Didactic Traditions", consists of 17 chapters, in which educators from the Netherlands reflect on the teaching and learning of mathematics in their country and the role of the Dutch domain-specific instruction theory of Realistic Mathematics Education.Written b...
An Introduction to Computer Networks, a free and open general-purpose computer-networking free book, complete with diagrams and exercises. It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP. Particular attention is paid to congestion; other special topics include queuing, real-time traffic, network management, sec...
Read the tips and tricks that top developers from the .NET and SQL Server communities use to boost code and query performance in their applications.
50 tips from the .NET and SQL Server communities for boosting performance in your .NET application; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers pe...
Read the tips and tricks recommended by some of the smartest minds in the ASP.NET community.
25 tips from the ASP.NET community for boosting performance in your web applications; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers async/await, Web API, ORMs, interactions between your code and your data...
This book covers both classical and modern models in deep learning. The chapters of this book span three categories:
The basics of neural networks: Many traditional machine learning models can be understood as special cases of neural networks. An emphasis is placed in the first two chapters on understanding the relationship between traditional mac...
Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from...
This book helps you understand how PowerShell can be used to manage the networking aspects of your server and client computers....
The .NET Framework Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Terms like container and Docker, unknown to Microsoft programmers until now, have recently become essential in technical discussions about the development, distribution, and management of our applications. Containers can solve some of programmers' everyday problems, but a challenge with them is managing their lifecycles and the communication a...
Since Microsoft sent shockwaves through its developer community with the release of .NET Core in 2016, it's continued to improve and expand its open-source, cross-platform offerings. ASP.NET Core 2 is a key component of that progress, delivering modularity, better performance, and flexibility to web development. In ASP.NET Core 2 Succinctly, a...
In this offers a methodological response to recent efforts by scholars in rhetoric and composition/writing studies to account for patterns indicative of the discipline's maturation. Influenced by work on distant reading and thin description, this monograph attends to forms of knowledge newly available via computationally mined, aggregated data...
Akka.NET is an open-source actor model framework written exclusively for Microsoft.NET in C# and compatible with .NET Core. It simplifies the building of scalable, concurrent, high-throughput, and low-latency systems, making life for software developers a bit easier. Zoran Maksimovic's Akka.NET Succinctly will show readers what an actor model ...
The Internet Myth retraces and challenges the myth laying at the foundations of the network ideologies - the idea that networks, by themselves, are the main agents of social, economic, political and cultural change. By comparing and integrating different sources related to network histories, this book emphasizes how a dominant narrative has extensi...
Security in software development should be a first-order requirement, but it's often implemented in projects as an afterthought. With Application Security in .NET Succinctly, author Stan Drapkin provides a refresher of .NET security practices and fills common knowledge gaps for experienced developers and novices alike. Learn about hashes, mach...