As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
The increasing capacity of digital networks and computing power, together with the resulting connectivity and availability of "big data", are impacting financial systems worldwide with rapidly advancing deep-learning algorithms and distributed ledger technologies. They transform the structure and performance of financial markets, the serv...
Even as spending on digital transformation continues to skyrocket, mainframes nevertheless have major advantages for global enterprises. These systems still process huge amounts of information and allow for highly secure transactions. In this practical book, author Tom Taulli shows software developers how to pursue a hybrid approach by integrating ...
This thoroughly revised guide demonstrates how the flexibility of the command line can help you become a more efficient and productive data scientist. You'll learn how to combine small yet powerful command-line tools to quickly obtain, scrub, explore, and model your data. To get you started, author Jeroen Janssens provides a Docker image packe...
HD movies and videos, gigabyte photo and music collections, extreme games ... today's digital content is bigger and better than ever. And now you (and many others!) are interacting with this content simultaneously on an expanding range of Wi-Fi devices, from smartphones, tablets, and laptops to consumer electronics and appliances. The Wi-Fi of...
Digital dissertations have been a part of academic research for years now, yet there are still many questions surrounding their processes. Are interactive dissertations significantly different from their paper-based counterparts? What are the effects of digital projects on doctoral education? How does one choose and defend a digital dissertation? T...
A broad introduction to algorithms for decision making under uncertainty, introducing the underlying mathematical problem formulations and the algorithms for solving them.
Automated decision-making systems or decision-support systems - used in applications that range from aircraft collision avoidance to breast cancer screening - must be designed...
Resilient Web Design, you might think that this is a handbook for designing robust websites. This is not a handbook. It's more like a history book.
But in the world of web design, we are mostly preoccupied with the here and now. When we think beyond our presentmoment, it is usually to contemplate the future - to imaginethe devices, features...
An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems.
The most visible use of computers and software is processing information for human consumption. The vast majority of computers in use, however, are much less visible. They run the engine, brakes, seatbelts,...
We've gathered up the best bits of wearable technology from the first two years of HackSpace magazine for this amazing book. Its 164 pages are packed with step-by-step tutorials and inspirational projects to help you add a unique look to your wardrobe! Ditch the circuit board, step away from the computer: it's time to use your tech skills...
As businesses move more toward cloud computing, one important factor for success is adopting multi-tenant software-defined networking (SDN) solutions in data centers. Hyper-V Network Virtualization (HNV) is a key enabler for a multi-tenant SDN solution and is essential for implementing a hybrid cloud environment where tenants can bring not only the...
As we develop the applications to meet current and future needs, it is only natural to use current best practices and techniques for our designs and implementations. In the quest to improve how we develop, we can access a true wealth of information which is available on design patterns, object-oriented analysis, low-level code techniques and langua...
In this rigorous and necessary book, Kristien Hens brings together bioethics and the philosophy of biology to argue that it is ethically necessary for scientific research to include a place for the philosopher. As well as ethical, their role is conceptual: they can improve the quality and coherence of scientific research by ensuring that particular...
It's not yet Christmas, but we come bearing glad tidings: the supply of Raspberry Pis available to hobbyists is starting to come back to normal. To celebrate, we're exploring 20 of the best hardware projects you can build with a Raspberry Pi - whether that's large or small, simple or complex, useful or not-so-useful.
- Keep your p...
Is Kubernetes ready for stateful workloads? This open source system has become the primary platform for deploying and managing cloud native applications. But because it was originally designed for stateless workloads, working with data on Kubernetes has been challenging. If you want to avoid the inefficiencies and duplicative costs of having separa...
This book is designed to accompany a graduate-level instructional design course: Game-Based and Adaptive Learning, but could also be used for undergraduate teacher education or instructional design courses.
The original texts and material for this book came from the development of a course for Brandeis University as part of their MS in Learner E...
Rich Hickey invented Clojure. This is a fork of the project to experiment with literate programming as a development and documentation technology.
Clojure is a break with the past traditions of Lisp. This literate fork is a break with the past traditions of code development. As such it is intended as an experiment, not a replacement or competiti...
Why do enterprises feel daunted when undertaking a large-scale cloud transformation? A move to the cloud usually offers substantial rewards. Once companies make this transition, they unlock new business opportunities that fundamentally change the way they work. With this report, members of the Google team will show you how to navigate the cultural ...
Contemporary Mathematics is designed to meet the scope and sequence requirements for a liberal arts mathematics course. This resource provides stand-alone sections with a focus on showing relevance in the features as well as the examples, exercises, and exposition. Contemporary Mathematics integrates technology applications, projects, and highlight...
This open education resource presents effective system modelling methods, including Lagrangian and bond graph, and the application of a relevant engineering software tool, 20-sim. The content is designed for engineering students and professionals in the field to support their understanding and application of these methods for modelling, simulation,...