Anyone can be a scientist, and this issue we'll show you how. Whether you're interested in space, traffic, the oceans, or something else, there's a citizen science project for you. The world has never been more connected - so let's use that connectivity to make our planet better!
- We talk to a real-like scientist about the e...
Climate change negotiations have failed the world. Despite more than thirty years of high-level, global talks on climate change, we are still seeing carbon emissions rise dramatically. This edited volume, comprising leading and emerging scholars and climate activists from around the world, takes a critical look at what has gone wrong and what is to...
Building Democracy for All is an interactive, multimodal, multicultural, open e-book for teaching and learning key topics in United States Government and Civic Life. It focuses on the importance of community engagement and social responsibility among middle and high school students core themes in the Massachusetts 8th Grade History & Social Sci...
It took me a pretty long time to really get Git. As I've continued to use Git more and more where I work, I've found myself trying to teach people what it is and why we use it over and over again, and the reality is that Git generally has a pretty steep learning curve compared to many other systems. I've seen case after case of devel...
Mastering Dyalog APL is a complete guide to the use of Dyalog, beginning with a thorough introduction to the APL programming language. Following this, the tutorial describes a large number of common coding techniques and discusses a variety of interfaces, including file handling and COM/OLE. Bernard Legrand provides a comprehensive introduction to ...
This open book aims to provide novice programmers solid foundation of basic knowledge regardless of the programming language. This book covers the fundamentals of programming that have not changed significantly over the last 10 years. Educational content was developed by an authoritative author team led by Svetlin Nakov from the Software University...
In a world where information has never been so accessible, and answers are available at the touch of a fingertip, we are hungrier for the facts than ever before - something the Covid-19 crisis has brought to light. And yet, paywalls put in place by multi-billion dollar publishing houses are still preventing millions from accessing quality, scientif...
When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media - music, videos, games, and software - before their official sale date and then racing against one another to rele...
Containers change how developers build, test, and deploy code. Adopting them takes time. Using them the wrong way can slow down your delivery process.
But you don't have a team of engineers to dedicate to this like Spotify or Netflix do. Maybe you're a startup CTO with features to ship - you can't spend hundreds of hours on intern...
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it.
This updated second edition guides you through...
This book examines the evolution of the relationship between taxpayers and their states in Sweden, Italy, the United Kingdom, the United States, and Romania, and asks why tax compliance is so much higher in some countries than others. The book shows that successful states have built strong administrative capacities, tax citizens fairly and equitabl...
Each chapter comprises a separate study on some optimization problem giving both an introductory look into the theory the problem comes from and some new developments invented by author(s). Usually some elementary knowledge is assumed, yet all the required facts are quoted mostly in examples, remarks or theorems....
Drawing on Indigenous peoples' struggles against settler colonialism, Theft Is Property! reconstructs the concept of dispossession as a means of explaining how shifting configurations of law, property, race, and rights have functioned as modes of governance, both historically and in the present. Through close analysis of arguments by Indigenou...
Few software developers would build an application without using source control, but its adoption for databases has been slower. Yet without source control to maintain the scripts necessary to create our database objects, load lookup data, and take other actions, we cannot guarantee a reliable and repeatable database deployment process, let alone c...
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
Every Database Administrator, developer, report writer, and anyone else who writes T-SQL to access SQL Server data, must understand how to read and interpret execution plans. My book leads you right from the basics of capturing plans, through how to interrupt them in their various forms, graphical or XML, and then how to use the information you fin...
You read about it every day: How can we create a sustainable, reliable and affordable energy supply? Does a local water supply play a role in this? Why don't we drive hydrogen cars that are powered by the sun and rain? The availability of cheap green energy is increasing. . We have solar and wind power, and even energy derived from ambient hea...
The Apache HTTP Server, colloquially called Apache, is the world's most used web server software. Originally based on the NCSA HTTPd server, development of Apache began in early 1995 after work on the NCSA code stalled. Apache played a key role in the initial growth of the World Wide Web, quickly overtaking NCSA HTTPd as the dominant HTTP serv...
Back in the mid 90s, Beej got tired of all his friends asking him how to do this stuff with networking programming in C, so he put pen to paper on the early World Wide Web and wrote down everything he knew just to get them off his back. Since then, the Guide has expanded significantly, with plenty of examples, and covers IPv6. Inside you'll fi...
Discover how to set up Raspberry Pi to play classic games in the brand new version of our retro gaming guide. In this 164-page book, you'll learn how to build a portable games machine, assemble a full-sized arcade cabinet, and emulate classic computers and consoles. Our step-by-step guides make each build easy! Plus you'll even learn to p...
The way a user might perceive and use data and the optimal way a computer system might store it are often very different. In this Database Design Succinctly, learn how to model the user's information into data in a computer database system in such a way as to allow the system to produce useful results for the end user. Joseph D. Booth will cov...
Linux crash analysis - this is a subject that has lots of unanswered mail threads and plain text documents scattered all over the place, inaccessible to almost everyone, save the tiny percentage of super geeks.
My personal and professional interest in the last three years has taken me down the path of Linux kernel secrets, all the way into assem...
A broad introduction to algorithms for decision making under uncertainty, introducing the underlying mathematical problem formulations and the algorithms for solving them.
Automated decision-making systems or decision-support systems - used in applications that range from aircraft collision avoidance to breast cancer screening - must be designed...
This book is a comprehensive, formal treatment of anonymous point collection. The proposed definition does not only provide a strong notion of security and privacy, but also covers features which are important for practical use. An efficient realization is presented and proven to fulfill the proposed definition. The resulting building block is the ...
This course is organized around algorithmic issues that arise in machine learning. Modern machine learning systems are often built on top of algorithms that do not have provable guarantees, and it is the subject of debate when and why they work. In this class, we focus on designing algorithms whose performance we can rigorously analyze for fundamen...
Existing textbooks on international relations treat history in a cursory fashion and perpetuate a Euro-centric perspective. This textbook pioneers a new approach by historicizing the material traditionally taught in International Relations courses, and by explicitly focusing on non-European cases, debates and issues. The volume is divided into thre...
This book is for those whose financial management focus is on small businesses. For you, we adapt the traditional financial management themes emphasized in corporate financial management courses to meet the needs of small businesses.
Many financial managers of small businesses come from farms or agribusinesses. Others are interested in working f...
The world has become more complicated with the introduction and development of new technologies and methods, and novel risks such as Covid-19 pandemic. Competition has been tougher than it used to be. Organizations strive to keep up with the changes in the internal and external environment. In the light of unprecedented changes, project managers mu...
Sight reading music can be a daunting endeavor for aspiring, and even experienced, musicians. Foundational Sight Singing was created to provide a systematic approach to learn to read, hear and perform music. The ordered presentation of both melodies and rhythms in this text helps students develop accuracy and fluency in sight singing which is a fun...
When you start building your first containerized application, you're excited about the capabilities and opportunities you encounter: it runs the same in dev and in prod, it's straightforward to put together a container image using Docker, and the distribution is taken care of by a container registry.
So, you're satisfied with how ...
Now that software development is shifting primarily toward mobile and cloud computing, the venerable C++ programming language is returning to the dominant position it held during the object-oriented boom of the 1990s. In this O'Reilly report, you'll learn why C++ is once again the preferred choice across several diverse industries, after ...
Is Kubernetes ready for stateful workloads? This open source system has become the primary platform for deploying and managing cloud native applications. But because it was originally designed for stateless workloads, working with data on Kubernetes has been challenging. If you want to avoid the inefficiencies and duplicative costs of having separa...