This book is a great collection of ideas, tricks, and skills that could be useful for Hackers. It's a unique extraction reference, summarizes a lot of research and experience in order to achieve your w00t in the shortest and smartest way. Rubyfu is where you'll find plug-n-hack code. Rubyfu is a book to use not only to read, it's whe...
The complexity of software development requires coordination and collaboration between all teams involved to guarantee that the client - whether a customer or another team in-house - is satisfied. DevOps is one strategy for achieving successful development, testing, and deployment, and Microsoft Azure provides a collection of tools and services tha...
In 2007, 144 UN member states voted to adopt a Declaration on the Rights of Indigenous Peoples. Australia, Canada, New Zealand and the US were the only members to vote against it. Each eventually changed its position. This book explains why and examines what the Declaration could mean for sovereignty, citizenship and democracy in liberal societies ...
This open proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It contains selected papers from the fifth international Conference ML4CPS - Machine Learning for Cyber Physical Systems, which was held in Berlin, March 12-13, 2020. Cyber Physical Systems are characterized by their ability to ada...
This open volume surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together insights from world-leading experts from three continents, the volume identifies the most pressing strategic challenges, frames theoretical concepts, and describes new strategies.
The use and utility of deterrence in...
Node.js is built on top of the Google Chrome V8 JavaScript engine, and it's mainly used to create web servers - but it's not limited to that.
The Node.js Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. The author find this approach gives a well-rounded overview....
This book provides an algorithmic perspective to autonomous robotics to students with a sophomore-level of linear algebra and probability theory. Robotics is an emerging field at the intersection of mechanical engineering, electrical engineering, and computer science. With computers becoming more powerful, making robots smart is getting more and mo...
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o...
For many years, Java Swing enabled developers to write applications that could run on any operating system. That all came to an end with the arrival of smart phones, tablets, and embedded computers.
In the enterprise, the desktop dominated for many years. In the meantime, however, almost every IT project includes plans for a future where the app...
In order to represent real life situations mathematically, we often use symbols to represent unknown quantities. We call these symbols variables. Each mathematical subject requires knowledge of manipulating expressions and equations to solve for a variable. Careers such as automobile accident investigators, quality control engineers, and insurance ...
Understanding the music industry as it exists today requires an understanding of how it developed over time. Today's music industry would most certainly not be the one anybody would design from scratch. It has many inefficiencies and quirks that reflect the economic pressures and musical concerns of bygone ages.
The history of music is clos...