All Books


Building Knowledge Graphs

Graph

Incredibly useful, knowledge graphs help organizations keep track of medical research, cybersecurity threat intelligence, GDPR compliance, web user engagement, and much more. They do so by storing interlinked descriptions of entities - objects, events, situations, or abstract concepts - and encoding the underlying information. How do you create a k

Cassandra: The Definitive Guide, 3rd Edition

Cassandra NoSQL

Imagine what you could do if scalability wasn't a problem. With this hands-on guide, you'll learn how the Cassandra database management system handles hundreds of terabytes of data while remaining highly available across multiple data centers. This third edition - updated for Cassandra 4.0 - provides the technical details and practical examples you

Statistics Done Wrong

Statistics

Scientific progress depends on good research, and good research needs good statistics. But statistical analysis is tricky to get right, even for the best and brightest of us. You'd be surprised how many scientists are doing it wrong. Statistics Done Wrong is a pithy, essential guide to statistical blunders in modern science that will show you how t

TCP/IP Guide

TCP/IP

It is highly likely that a reader of this guide will have encountered the term "TCP/IP" before beginning, even without knowing its specific meaning. The reason for this is simple: TCP/IP is ubiquitous. It is the most widely used Internetworking protocol suite today, a prominence gained largely through its fundamental role in operating the global In

HTML5 Canvas Notes for Professionals

HTML JavaScript

The HTML5 Canvas Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow.

Xamarin.Forms Notes for Professionals

.NET C#

The Xamarin.Forms Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow.

Security of Ubiquitous Computing Systems

Cryptography

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and softwa

The Future of Software Quality Assurance

This open access book, published to mark the 15th anniversary of the International Software Quality Institute (iSQI), is intended to raise the profile of software testers and their profession. It gathers contributions by respected software testing experts in order to highlight the state of the art as well as future challenges and trends. In additio

Financial Machine Learning

Financial Machine Learning surveys the nascent literature on machine learning in the study of financial markets. The authors highlight the best examples of what this line of research has to offer and recommend promising directions for future research. This survey is designed for both financial economists interested in grasping machine learning tool

Password

Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What's an 'identity theft' in the digital age if not the unauthorized use of a password? In untangling the histories, cultural contexts and philosophies of the password, Martin Paul Eve