A modern web-marketing book that outlines a multi-modal system for growing a website with SEO, Google AdWords/Facebook Ads, Conversion Optimisation, Copywriting/Classic Persuasion/Behavioural Psychology, Google Analytics, Statistical Significance, Email Marketing, and Remarketing. When I launched my first web application it started off with zero tr...
This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bi...
This book focuses on the fundamentals of plant physiology for undergraduate and graduate students. It consists of 34 chapters divided into five major units. Unit I discusses the unique mechanisms of water and ion transport, while Unit II describes the various metabolic events essential for plant development that result from plants’ ability to cap...
This book is aimed at computer science undergraduates late in sophomore or early in junior year, supplying a comprehensive background in qualitative and quantitative data analysis, probability, random variables, and statistical methods, including machine learning.With careful treatment of topics that fill the curricular needs for the course, Probab...
Reinforcement learning, one of the most active research areas in artificial intelligence, is a computational approach to learning whereby an agent tries to maximize the total amount of reward it receives while interacting with a complex, uncertain environment. In Reinforcement Learning, Richard Sutton and Andrew Barto provide a clear and simple acc...
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels.
Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language.
Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Fifty years have passed since the first Earth Day, on 22 April 1970. This accessible, incisive and timely collection of essays brings together a diverse set of expert voices to examine how the Earth's environment has changed over this past half century, and what lies in store for our planet over the coming fifty years.
Earth 2020: An Inside...
Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which software developers construct...
Learn how to use R to turn raw data into insight, knowledge, and understanding. This book introduces you to R, RStudio, and the tidyverse, a collection of R packages designed to work together to make data science fast, fluent, and fun. Suitable for readers with no previous programming experience, R for Data Science is designed to get you doing data...
Modern science communication has emerged in the twentieth century as a field of study, a body of practice and a profession - and it is a practice with deep historical roots. We have seen the birth of interactive science centres, the first university actions in teaching and conducting research, and a sharp growth in employment of science communicato...
In 2007, 144 UN member states voted to adopt a Declaration on the Rights of Indigenous Peoples. Australia, Canada, New Zealand and the US were the only members to vote against it. Each eventually changed its position. This book explains why and examines what the Declaration could mean for sovereignty, citizenship and democracy in liberal societies ...
In this concise yet comprehensive open book, future inventors are introduced to the key concepts of Cyber-Physical Systems (CPS). Using modeling as a way to develop deeper understanding of the computational and physical components of these systems, one can express new designs in a way that facilitates their simulation, visualization, and analysis. ...
This open book maps a crucial but neglected chapter in the history of psychiatry: how was melancholia transformed in the nineteenth century from traditional melancholy madness into a modern biomedical mood disorder, paving the way for the emergence of clinical depression as a psychiatric illness in the twentieth century? At a time when the prevalen...
This open access book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer Applications, EuroHaptics 2020, held in Leiden, The Netherlands, in September 2020.
The 60 papers presented in this volume were carefully reviewed and selected from 111 submissions. The were organized in topica...
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.*
The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: Io...
Express is a Node.js Web Framework. Node.js is an amazing tool for building networking services and applications. Express builds on top of its features to provide easy to use functionality that satisfy the needs of the Web Server use case.
The Express Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. The author find t...
Whether you want to build robots, smart devices, or any other electronically controlled projects, this is the book you need. We take you through how to program and connect an Arduino microcontroller board, then explore some great projects to make with it.
- Build a four-legged walking robot;
- Create a Tetris-inspired clock;
- Grow your own ve...
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
In Horos, Thea Potter explores the complex relationship between classical philosophy and the 'horos', a stone that Athenians erected to mark the boundaries of their marketplace, their gravestones, their roads and their private property. Potter weaves this history into a meditation on the ancient philosophical concept of horos, the foundat...
This is an intro to C for folks who already know how to program in another language. The first half of the book is written in a tutorial style, while the second half is a reference section complete with examples (inspired by the incomparable Turbo C Bible). The goal is to keep this up-to-date with the latest C standards.
This guide assumes that ...
Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this boo...
Building on her earlier work, The Power of Music: A Research Synthesis of the Impact of Actively Making Music on the Intellectual, Social and Personal Development of Children and Young People, this volume by Susan Hallam and Evangelos Himonides is an important new resource in the field of music education, practice, and psychology. A well signposted...
An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems.
The most visible use of computers and software is processing information for human consumption. The vast majority of computers in use, however, are much less visible. They run the engine, brakes, seatbelts,...
Introduction to Neuroscience is designed for undergraduate students enrolled in introductory neuroscience courses. This book specifically targets students enrolled in Introduction to Neuroscience 1 and Introduction to Neuroscience 2 at Michigan State University and primarily contains topics covered in those courses.
This first edition will guide...
Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app's UI, and C++/Qt for the application logic. No prior know...
This collection examines how higher education responds to the demands of the automation economy and the fourth industrial revolution. Considering significant trends in how people are learning, coupled with the ways in which different higher education institutions and education stakeholders are implementing adaptations, it looks at new programs ...
As America's most populous state goes, so goes the nation. And within that state, the 38 counties comprising South Texas - a highly populated, largely Hispanic area characterized by high uninsured rates and low numbers of health care providers - are emblematic of nationwide crises in public health.
The South Texas Health Status Review: A Heal...
What is the impact of information and communication technologies (ICTs) on the human condition? In order to address this question, in 2012 the European Commission organized a research project entitled The Onlife Initiative: concept reengineering for rethinking societal concerns in the digital transition. This volume collects the work of the Onlife ...
A PDF version of this book is available for free in open access via the OAPEN Library platform, www.oapen.org. This book examines the significance of networks among the firms operative in the contemporary Russian software industry in the St. Petersburg region....
This manuscript discusses the potentials of the approaches as mentioned below to monitor the AIVs in WMW. Molecular diagnostic platforms enable for accurate detection of the AIVs in the feces of infected birds. Similar technologies can be used to determine the bird species through DNA barcoding, enabling non-invasive research on the epidemiology of...
This book provides a comprehensive overview of the application of the newest laser and microscope/ophthalmoscope technology in the field of high resolution imaging in microscopy and ophthalmology. Starting by describing High-Resolution 3D Light Microscopy with STED and RESOLFT, the book goes on to cover retinal and anterior segment imaging and imag...