The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.
Author Matthew Gast - an industry expert who led the development of ...
The mission of the first edition of this book was to introduce the anykernel and rump kernels and motivate their existence. Additionally, we explored the characteristics of the technology through various experiments. The paramount, often criminally overlooked experiment was the one hiding in plain sight: is it possible to construct the system in a ...
This module is focused on the study of Free Software in relation with the private sector and the economic implications of its use and development models. We analyse the software industry from an economic perspective: how it was affected by the raise of free software and what is its potential for the future. On the other hand, we study how to use Fr...
Organized, authored, and edited over the course of five months by a class of eighteen Virginia Tech undergraduate students, Welcome to the Beatles represents their collective contribution to the larger scholarship on the most important band in rock history. The chapters build upon the work of noted author and historian Mark Lewisohn and take into a...
Calculus: Early Transcendentals, originally by D. Guichard, has been redesigned by the Lyryx editorial team. Substantial portions of the content, examples, and diagrams have been redeveloped, with additional contributions provided by experienced and practicing instructors. This approachable textbook provides a comprehensive understanding of the nec...
Web scraping or crawling is the art of fetching data from a third party website by downloading and parsing the HTML code to extract the data you want. It can be hard. From bad HTML code to heavy Javascript use and anti-bot techniques, it is often tricky. Lots of companies use it to obtain knowledge concerning competitor prices, news aggregation, ma...
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere...
This open access book reports on a pilot project aiming at collecting information on the socio-ecological risks that could arise in the event of an uncontrolled spread of genetically engineered organisms into the environment. The researchers will, for instance, be taking a closer look at genetically engineered oilseed rape, genetically engineered o...
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is sh...
This book is a uniquely pedagogical while still comprehensive state-of-the-art description of LCA-methodology and its broad range of applications. The five parts of the book conveniently provide: I) the history and context of Life Cycle Assessment (LCA) with its central role as quantitative and scientifically-based tool supporting society’s trans...
This fourth Edition presents new examples on submodules, derived type i/o, object oriented programming, abstract interfaces and procedure pointers, C interop, sorting and searching, statistics and converting to more modern versions of Fortran.Key FeaturesHighlights the core language features of modern Fortran including data typing, array processing...
This book presents theory and practice in the context of automatic control education. It presents the relevant theory in the first eight chapters,applying them later on to the control of several real plants. Each plant is studied following a uniform procedure: a) the plant’s functionis described, b) a mathematical model is obtained, c) plant cons...
The spread of the Internet into all areas of business activities has put a particular focus on business models. The digitalization of business processes is the driver of changes in company strategies and management practices alike. This textbook provides a structured and conceptual approach, allowing students and other readers to understand the com...
The 6th edition of Structural Dynamics: Theory and Computation is the complete and comprehensive text in the field. It presents modern methods of analysis and techniques adaptable to computer programming clearly and easily. The book is ideal as a text for advanced undergraduates or graduate students taking a first course in structural dynamics. It ...
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
The 4th edition of this class-tested, multi-disciplinary introduction to solid state engineering adds dozens of revised and updated sections and problems, as well as three new chapters on solar energy harvesting, thermal and photothermal energy harvesting, and photo-thermovoltaics. Combining concepts from physics, chemistry, electrical engineering,...
This book provides students and practicing engineers with a comprehensive guide to off-grid electrification: from microgrids and energy kiosks to solar home systems and solar lanterns. As the off-grid electrification industry grows, universities are starting and expanding courses and programs in humanitarian engineering and appropriate technology. ...
In this updated edition of a groundbreaking text, concepts such as energy return on investment (EROI) provide powerful insights into the real balance sheets that drive our "petroleum economy." Hall and Klitgaard explore the relation between energy and the wealth explosion of the 20th century, and the interaction of internal limits to grow...
This book presents direct and concise explanations and examples to many LaTeX syntax and structures, allowing students and researchers to quickly understand the basics that are required for writing and preparing book manuscripts, journal articles, reports, presentation slides and academic theses and dissertations for publication.
Unlike much of th...
The Infrastructure Change Management (ICM) program at Google drives migrations, deprecations, and other large-scale infrastructure changes. Case studies in this book explore how infrastructure change projects are managed at Google. From these case studies, we'll provide insight into lessons learned from these different approaches, and provide ...
This book on artificial intelligence in education (AIEd) with two aims in mind. The first was to explain to a non-specialist, interested reader what AIEd is: its goals, how it is built, and how it works. After all, only by securing a certain degree of understanding can we move beyond the science-fiction imagery of AI, and the associated fears. The ...
"DevOps" is creating a lot of anxiety amongst the IT professionals of the world. It's also causing a bit of a boom for technology marketing people, who in turn are making the whole concept confusing for businesses and professionals alike.
This is an effort to set the record straight for someone who might be feeling a little vague ...
Within an SRE organization, teams usually develop very different automation tools and processes for accomplishing similar tasks. Some of this can be explained by the software they support: different systems require different reliability solutions. But many SRE tasks are essentially the same across all software: compiling, building, deploying, canar...
Learn how to run your web projects - everything from simple sites to complex applications - without a single server. It's possible with the JAMstack, a modern web development architecture for deploying fast, highly-scalable sites and applications that don't require traditional origin infrastructure. This practical report explains how the ...
Karl Seguin is a developer with experience across various fields and technologies. He's an expert .NET and Ruby developer. He's a semi-active contributor to OSS projects, a technical writer and an occasional speaker. With respect to MongoDB, he was a core contributor to the C# MongoDB library NoRM, wrote the interactive tutorial mongly as...
In the decade and a half since Napster first emerged, forever changing the face of digital culture, the claim that "internet pirates killed the music industry" has become so ubiquitous that it is treated as common knowledge. Piracy is a scourge on legitimate businesses and hard-working artists, we are told, a "cybercrime" simila...
Microsoft CNTK (Cognitive Toolkit, formerly Computational Network Toolkit), an open source code framework, enables you to create feed-forward neural network time series prediction systems, convolutional neural network image classifiers, and other deep learning systems. In Introduction to CNTK Succinctly, author James McCaffrey offers instruction on...
If you're looking to gain an introduction into the world of user experience (UX) design - or maybe even freshen up your knowledge of the field - then this UX design book is the ideal place to start.
You'll cover a wide range of topics over nine highly readable chapters, with each one acting as a mini crash course. By the end, you'...
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries.
Many countries around the world block or filter Internet content, denying access to information that they deem too sensitive for ordinary citizens - most often about politics, b...
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
Most contemporary digital studies are interested in distant-reading paradigms for large-scale literary history. This book asks what happens when such telescopic techniques function as a microscope instead. The first monograph to bring a range of computational methods to bear on a single novel in a sustained fashion, it focuses on the award-winning ...