This open access edited collection examines representations of human trafficking in media ranging from British and Serbian newspapers, British and Scandinavian crime novels, and a documentary series, and questions the extent to which these portrayals reflect the realities of trafficking. It tackles the problematic tendency to under-report particula...
The aim of this short book is to introduce the general themes, challenges, and opportunities in the world of managing API traffic. Most of the examples and recommendations come from my own experience (or that of colleagues) while working with customers, ranging from small local startups to global enterprises.
This book is for those just getting ...
The proceedings of the international conference "SMSEC2014", a joint conference of the first "Social Modeling and Simulations" and the 10th "Econophysics Colloquium", held in Kobe in November 2014 with 174 participants, are gathered herein. Cutting edge scientific researches on various social phenomena are reviewed. Ne...
Istio is one of the most popular solutions for service meshes in cloud-native infrastructures, and it is most often deployed on Kubernetes clusters. In Istio Succinctly, authors Rahul Rai and Tarun Pabbi provide a practical guide to getting started with Istio, from setting up a Kubernetes cluster, to managing its traffic management, security, obser...
With Kubernetes came many new concepts, particularly around networking and traffic management. Alongside these new concepts were entirely new classes of tools, designed for ephemeral, containerized, and distributed application deployments. In particular, Ingress controllers and service meshes did not exist prior to the Kubernetes era. Nor were Laye...
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
Microservices architectures introduce several benefits to the application development and delivery process. Microservices-based apps are easier to build, test, maintain, and scale. They also reduce downtime through better fault isolation.
While container-based microservices apps have profoundly changed the way DevOps teams deploy applications, t...
An Introduction to Computer Networks, a free and open general-purpose computer-networking free book, complete with diagrams and exercises. It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP. Particular attention is paid to congestion; other special topics include queuing, real-time traffic, network management, sec...
A modern web-marketing book that outlines a multi-modal system for growing a website with SEO, Google AdWords/Facebook Ads, Conversion Optimisation, Copywriting/Classic Persuasion/Behavioural Psychology, Google Analytics, Statistical Significance, Email Marketing, and Remarketing. When I launched my first web application it started off with zero tr...
Within an SRE organization, teams usually develop very different automation tools and processes for accomplishing similar tasks. Some of this can be explained by the software they support: different systems require different reliability solutions. But many SRE tasks are essentially the same across all software: compiling, building, deploying, canar...
More than 100 Azure services offer everything you need to build and run your applications with all the performance, redundancy, security, and scale that the cloud has to offer. But knowing where to begin with all these services can seem overwhelming.
Learn Azure in a Month of Lunches, 2nd Edition, is a tutorial on writing, deploying, and running...
The method of Do-It-Yourself (DIY) has been around for a long time, and in majority of the cases this has been associated with home renovation and make overs. But, in the past decade this mindset of DIY has shifted to the online world. It has now become the norm for anyone to create their own website without seeking the help of a website profession...
Raspberry Pi Pico is a new low-cost, high-performance microcontroller board with flexible digital interfaces. Microcontrollers are computers stripped back to their bare essentials. You don't use monitors or keyboards, but program them to take their input from, and send their output to the input/output pins. Using these programmable connections...
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This updated report answers common questions regarding service mesh architectures ...
In this eBook, we tell you how to take an existing NGINX Open Source or F5 NGINX Plus configuration and extend it to manage API traffic as well. When you use NGINX for API management, you tap into the high performance, reliability, robust community support, and expert professional support (for NGINX Plus customers) that NGINX is famous for.
With...
With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute t...
NGINX is one of the most widely used web servers available today, in part because of itscapabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical recipes help you set up and use either the open source...
Use of redundant servers has long been a solution for meeting sudden spikes in demand, machine failures, and outages. Cloud services greatly reduce the cost and hassle of provisioning redundant equipment and load balancers and give you the ability to deal with separate network, application, and client-side loads. But today there are many options to...
This book delves into the widely held belief that the 21st century will be the "Asian Century" by examining the Asia's rapid economic development in the post-war era and the challenges it faces in forging ahead of world leaders in the West.The impact of the current turbulent global political climate on Asia is critically analyzed, em...
This book constitutes the thoroughly refereed proceedings of the 9th International Conference on Intelligent Human Computer Interaction, IHCI 2017, held in Evry, France, in December 2017.
The 15 papers presented together with three invited papers were carefully reviewed and selected from 25 submissions. The conference is forum for the presentation...
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016.
The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classific...
This book explores specific migration, governance, and identity processes currently involving children and ideas of childhood. Migrancy as a social space allows majority populations to question the capabilities of migrants, and is a space in which an increasing number of children are growing up. In this space, families, nation-states, civil society...
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
Resilience has become an important topic on the safety research agenda and in organizational practice. Most empirical work on resilience has been descriptive, identifying characteristics of work and organizing activity which allow organizations to cope with unexpected situations. Fewer studies have developed testable models and theories that can be...
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
It is intended mainly for beginners to the field of information security, writte...
This book takes a look at fully automated, autonomous vehicles and discusses many open questions: How can autonomous vehicles be integrated into the current transportation system with diverse users and human drivers? Where do automated vehicles fall under current legal frameworks? What risks are associated with automation and how will society respo...
This free book was prepared as a Final Publication of the COST Action IC1304 "Autonomous Control for a Reliable Internet of Services (ACROSS)". The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-grad...
First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers...
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book.
Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
This book looks at how a democracy can devolve into a post-factual state.The media is being flooded by populist narratives, fake news, conspiracy theories and make-believe. Misinformation is turning into a challenge for all of us, whether politicians, journalists, or citizens. In the age of information, attention is a prime asset and may be convert...
It relates to the III Annual Conference hosted by the Russian Federal Ministry of Education and Science in December 2016. This event has summarized, analyzed and discussed the interim results, academic outputs and scientific achievements of the Russian Federal Targeted Programme for Research and Development in priority areas of development of the R...
Consumer networks have revolutionized the way companies understand and reach their customers, making possible intricate measurement and accurate prediction at every step of every transaction. The same revolution is underway in our infrastructure, where new generations of sensor-laden power plants, cars and medical devices will generate vast quantit...