Git Books


Think DSP

Python

If you understand basic mathematics and know how to program with Python, you're ready to dive into signal processing. While most resources start with theory to teach this complex subject, this practical book introduces techniques by showing you how they're applied in the real world. In the first chapter alone, you'll be able to decompose a sound in

Open Government

In a world where web services can make real-time data accessible to anyone, how can the government leverage this openness to improve its operations and increase citizen participation and awareness? Through a collection of essays and case studies, leading visionaries and practitioners both inside and outside of government share their ideas on how to

Data Parallel C++, 2nd Edition

C / C++

Learn how to accelerate C++ programs using data parallelism and SYCL. This open access book enables C++ programmers to be at the forefront of this exciting and important development that is helping to push computing to new levels. This updated second edition is full of practical advice, detailed explanations, and code examples to illustrate key top

Demystifying Intelligent Multimode Security Systems

Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are

Learning Analytics Methods and Tutorials

R

This open access comprehensive methodological book offers a much-needed answer to the lack of resources and methodological guidance in learning analytics, which has been a problem ever since the field started. The book covers all important quantitative topics in education at large as well as the latest in learning analytics and education data minin

A Graduate Course in Applied Cryptography

Cryptography

Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making

Mobile Media Learning

This book is an inspirational message about what is possible and practical in the name of learning through mobile media. We present stories from a diverse set of educators, a microcosm of the landscape of mobile media learning. Each author has found a way to create something new and beautiful in their own world. And though their results are excepti

Deploying to OpenShift

Openshift Kubernetes

Get an in-depth tour of OpenShift, the container-based software deployment and management platform from Red Hat that provides a secure multi-tenant environment for the enterprise. This practical guide describes in detail how OpenShift, building on Kubernetes, enables you to automate the way you create, ship, and run applications in a containerized

Own Your Space, 2nd Edition

This book is presented as a resource for every teenager and an essential tool for parents and teachers. However, the authors specifically target it at computer-savvy, keyboard-comfortable teens who use the internet daily and want to learn how to secure their systems, preserve their digital lifestyles, and protect their data. The book aims to provid

Practical Cryptography for Developers

Cryptography

A modern practical book about cryptography for developers with code examples, covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher block modes, authenticated encryption,