This open access book summarizes the multi-disciplinary results of one of China's main primatological research projects on the endemic Tibetan macaque (Macaca thibetana), which had continued for over 30 years, but which had never been reported on systematically. Dedicated to this exceptional Old World monkey, this book makes the work of Chines...
This free book presents an overview and step-by-step explanation of process management. It starts with the individual participants' perspectives on their work in a process and its structuring and harmonization, and then moves on to its specification in a model and how it is embedded in the organizational and IT environment of the company. Last...
This book records the state of the art in research on mathematics-related affect. It discusses the concepts and theories of mathematics-related affect along the lines of three dimensions. The first dimension identifies three broad categories of affect: motivation, emotions, and beliefs. The book contains one chapter on motivation, including discuss...
This Open Access book, Responsible innovation provides benefits for society, for instance more sustainable products, more engagement with consumers and less anxiety about emerging technologies. As a governance tool it is mostly driven by research funders, including the European Commission, under the term "responsible research and innovation&qu...
This book provides a comprehensive toolbox of analysis techniques forionospheric multi-satellite missions. The immediate need for this volume was motivatedby the ongoing ESA Swarm satellite mission, but the tools that are described are generaland can be used for any future ionospheric multi-satellite mission with comparableinstrumentation.
In addi...
This open access book explores the histories and geographies of fishing in North Korea and the surrounding nations. With the ideological and environmental history of North Korea in mind, the book examines the complex interactions between local communities, fish themselves, wider ecosystems and the politics of Pyongyang through the lens of critical ...
This open access book provides an alternative theoretical framework of irregular migration that allows to overcome many of the contradictions and theoretical impasses displayed by the majority of approaches in current literature. The analytical framework allows moving from an interpretation biased by methodological nationalism, to a more general sy...
Modeling and simulation are powerful tools for explaining the world, making predictions, designing things that work, and making them work better. Learning to use these tools can be difficult; this book is my attempt to make the experience as enjoyable and productive as possible.
By reading this book - and working on the exercises - you will lear...
The idea of etnos came into being over a hundred years ago as a way of understanding the collective identities of people with a common language and shared traditions. In the twentieth century, the concept came to be associated with Soviet state-building, and it fell sharply out of favour. Yet outside the academy, etnos-style arguments not only pers...
In 1591, Giovanni Paolo Gallucci published his Della simmetria dei corpi humani, an Italian translation of Albrecht Dürer's Four Books on Human Proportion. While Dürer's treatise had been translated earlier in the sixteenth-century into French and Latin, it was Gallucci's Italian translation that endured in popularity as the most c...
The notion of a superior 'Germanic' or 'Nordic' race was a central theme in Nazi ideology. But it was also a commonly accepted idea in the early twentieth century, an actual scientific concept originating from anthropological research on the physical characteristics of Europeans. The Scandinavian Peninsula was considered to be t...
Dynamic Management Views (DMVs) are a significant and valuable addition to the DBA's troubleshooting armory, laying bare previously unavailable information regarding the under-the-covers activity of your database sessions and transactions.
Why, then, aren't all DBAs using them? Why do many DBAs continue to ignore them in favour of &quo...
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment.
Too often as deve...
The SQL Server 2016 In-Memory OLTP engine (a.k.a. Hekaton) is designed to exploit terabytes of available memory and high numbers of processing cores. It allows us to work with memory-optimized tables and indexes, and natively compiled stored procedures, in addition to the disk-based tables and indexes, and T-SQL stored procedures, that SQL Server h...
You've built web sites that can be used by humans. But can you also build web sites that are usable by machines? That's where the future lies, and that's what RESTful Web Services shows you how to do. The World Wide Web is the most popular distributed application in history, and Web services and mashups have turned it into a powerful...
This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control ...
The corporate market is now embracing free, "open source" software like never before, as evidenced by the recent success of the technologies underlying LAMP (Linux, Apache, MySQL, and PHP). Each is the result of a publicly collaborative process among numerous developers who volunteer their time and energy to create better software.
The...
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.
Author Matthew Gast - an industry expert who led the development of ...
Originally developed for mainframes but highly portable across platforms-from servers to desktops to handhelds-Rexx is an easy yet powerful scripting language that's widely used for rapid application development.
Covers Rexx interpreters for specialized functions-object-oriented, mainframe, and handheld.
There are 8 different free Rexx i...
JavaScript lies at the heart of almost every modern web application, from social apps like Twitter to browser-based game frameworks like Phaser and Babylon. Though simple for beginners to pick up and play with, JavaScript is a flexible, complex language that you can use to build full-scale applications.
This much anticipated and thoroughly revis...
Modern appliances are complex machines with processors, operating systems, and application software. While there are books that will tell you how to run Linux on embedded hardware, and books on how to build a Linux application, Linux Appliance Design is the first book to demonstrate how to merge the two and create a Linux appliance. You'll see...
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects ...
In this book, you will learn how digital signals are captured, represented, processed, communicated, and stored in computers. The specific topics we will cover include: physical properties of the source information (such as sound or images), devices for information capture (microphones, cameras), digitization, compression, digital signal representa...
There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap.
This book is for complete beginners who do not know anything about en...
The mission of the first edition of this book was to introduce the anykernel and rump kernels and motivate their existence. Additionally, we explored the characteristics of the technology through various experiments. The paramount, often criminally overlooked experiment was the one hiding in plain sight: is it possible to construct the system in a ...
The dramatic change in the price and accessibility of data demands a new focus on data analytic literacy. This book is intended for use by people who perform regular data analyses. It aims to give a brief summary of the key ideas, practices, and pitfalls of modern data analysis. One goal is to summarize in a succinct way the most common difficultie...
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief...
This book is about digital games, the people who play digital games, and how they play them. This poses a large problem: even when discussing one game, each instance of play is different. Combine this with the thousands of digital games, and the millions of players, and it is apparent that the number of individual instances of game play is unfathom...
This project was initiated in 2009 with the aim to spread knowledge about mobile technologies and encourage people to enter our community or deepen their existing knowledge.
More than twenty writers from the mobile community share their know-how in dealing with topics such as accessibility in mobile apps, UX design, mobile analytics, prototyping...
For thousands of years, people have been saying that the world is changing and will never again be the same. Yet the profound changes happening today are different, because they result from a specific technological development.
It is now possible, in principle, to remember everything that anyone says, writes, sings, draws, or photographs. Everythi...
Making Games with Python & Pygame covers the Pygame library with the source code for 11 games. Making Games was written as a sequel for the same age range as Invent with Python. Once you have an understanding of the basics of Python programming, you can now expand your abilities using the Pygame library to make games with graphics, animation, a...
Invent Your Own Computer Games with Python teaches you how to program in the Python language. Each chapter gives you the complete source code for a new game, and then teaches the programming concepts from the examples. Games include Guess the Number, Hangman, Tic Tac Toe, and Reversi. This book also has an introduction to making games with 2D graph...