Git Books
Think DSP
If you understand basic mathematics and know how to program with Python, you're ready to dive into signal processing. While most resources start with theory to teach this complex subject, this practical book introduces techniques by showing you how they're applied in the real world. In the first chapter alone, you'll be able to decompose a sound in
Open Government
In a world where web services can make real-time data accessible to anyone, how can the government leverage this openness to improve its operations and increase citizen participation and awareness? Through a collection of essays and case studies, leading visionaries and practitioners both inside and outside of government share their ideas on how to
Data Parallel C++, 2nd Edition
Learn how to accelerate C++ programs using data parallelism and SYCL. This open access book enables C++ programmers to be at the forefront of this exciting and important development that is helping to push computing to new levels. This updated second edition is full of practical advice, detailed explanations, and code examples to illustrate key top
Demystifying Intelligent Multimode Security Systems
Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are
Learning Analytics Methods and Tutorials
This open access comprehensive methodological book offers a much-needed answer to the lack of resources and methodological guidance in learning analytics, which has been a problem ever since the field started. The book covers all important quantitative topics in education at large as well as the latest in learning analytics and education data minin
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making
Mobile Media Learning
This book is an inspirational message about what is possible and practical in the name of learning through mobile media. We present stories from a diverse set of educators, a microcosm of the landscape of mobile media learning. Each author has found a way to create something new and beautiful in their own world. And though their results are excepti
Deploying to OpenShift
Get an in-depth tour of OpenShift, the container-based software deployment and management platform from Red Hat that provides a secure multi-tenant environment for the enterprise. This practical guide describes in detail how OpenShift, building on Kubernetes, enables you to automate the way you create, ship, and run applications in a containerized
Own Your Space, 2nd Edition
This book is presented as a resource for every teenager and an essential tool for parents and teachers. However, the authors specifically target it at computer-savvy, keyboard-comfortable teens who use the internet daily and want to learn how to secure their systems, preserve their digital lifestyles, and protect their data. The book aims to provid
Practical Cryptography for Developers
A modern practical book about cryptography for developers with code examples, covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher block modes, authenticated encryption,