This book tackles a lot of big topics, but it tries to keep things simple, clear, and to the point. We’ve culled the best, juiciest information from a good sampling of For Dummies books on personal finance and compiled them into one fat volume. It’s absolutely packed with easy-to-grasp advice on all things having to do with managing your money. Whether you’re a stay-at-home parent, a …
Wireless communications technologies have seen a remarkably fast evolution in the past two decades. Each new generation of wireless devices has brought notable improvements in terms of communication reliability, data rates, device sizes, battery life, and network connectivity. In addition, the increase homogenization of traffic transports using Internet Protocols is translating into network to…
This book is a part of the comprehensive series Current Developments in Biotechnology and Bioengineering (Editor-in-Chief: Ashok Pandey), comprising nine volumes, and presents a collection of chapters dealing with solid waste management. According to a World Health Organization report, world cities alone currently generate about 1.3 billion tonnes of solid waste per year, and this figure is pre…
Fifteen years ago, the average computer user spent most of his or her time using productivity applications such as Microsoft® Word or Microsoft Excel®. In the ensuing years, users have become more sophisticated, network implementations have become the rule rather than the exception, and collaboration has become a key facet of a successful business strategy. Perhaps the most signifi cant chang…
Cyber security is a topic that cuts across pretty much every area of life. Government, healthcare, politics, fashion, sports, the media, big business, small business, charities, education – you name it, it is affected by cyber security. It is a fascinating, challenging, fast-paced field that changes every day, but at the same time is concerned with issues that have been a part of human life f…
This book will inform about computer organization
The world of cybersecurity happens to be very dynamic. As technology progresses, the field witnesses novel innovations in the forms of offensive tools and defensive mechanisms that make it a constant battleground, where the fight between red teams and blue teams ensues habitually and often on a large scale. As a cybersecurity researcher, I have always been intrigued by what is allowed and what …
This textbook focuses on: (i) the continuum of the environment— namely the earth, water, and atmosphere, epitomized by the term “Environmental Science”; and (ii) science-based aspects of the pollution of the environment. Thus, this textbook is designed to provide a scientific basis that will allow for prudent decisions to be made to manage and mitigate pollution throughout the environment…
Risk is a part of everyday life, and even quite straightforward businesses can have a range of ‘hazards’. You are not expected to eliminate all risk. What you must do is make sure you know about the main risks that affect you, and what you need to do to manage them responsibly.
There are not many security-related books in Chinese; the few that have been published deal mostly with handy skills when countering hacker attacks. This book not only describes skills and techniques but also tries to solve security problems in a constructive manner. What I admire about Wu is that he is always willing to collaborate with his colleagues to build a more secure Internet environmen…
This book is focused on the complex problem of controlling air pollution and mitigating its adverse effects on human health and the environment. It is written by leading experts in the field and addresses many aspects of air pollution, including monitoring and source characterization of air pollution, the theory and application of air quality modeling, health effects and risk assessment, air qu…
This book is primarily addressed to students who are taking a course on the C++ language, to those who wish to self-study the C++ language, as well as to programmers who have experience with C and want to move on to C++. It could also prove useful to instructors of the C++ course, who are looking for explanatory programming examples to add in their lectures.
This book is ideal for Python programmers who want to explore the tools available in the Python ecosystem in order to build their own IoT web stack and IoT-related projects. People from creative and designing backgrounds will also find this book equally useful.
This book is about using data to understand how social media services are used. Since the advent of Web 2.0, sites and services that give their users the power to actively change and contribute to the services’ content have exploded in popularity. Social media finds its roots in early social networking and community communication services, including the bulletin board systems (BBS) of the 198…
Because of the increasing complexity and growth of real-world networks, their analysis by using classical graph-theoretic methods is oftentimes a difficult procedure. Thus, there is a strong need to combine graph-theoretic methods with mathematical techniques from other scientific disciplines, such as machine learning, statistics, and information theory, for analyzing complex networks more adeq…
The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advanta…
Designing a software system is difficult. Understanding the context in which a software system lives is more difficult. In order to understand that context, developers need to communicate with the business. But there is a lot that can go wrong while communicating with the business. For example people can misunderstand what is being said, they are scared to speak up, tensions could grow, and con…
From tablets of stone through to libraries of parchments; from paper-based files to the electronic era, there is not one aspect of modern business that has avoided the need to collect, collate, organize and report upon data. The proliferation of databases and database technologies within modern times, has now been further secured by the use of the Internet to enable database integration on …
The response to the first and second editions of Python Crash Course has been overwhelmingly positive. More than one million copies are in print, including translations in over 10 languages. I’ve received letters and emails from readers as young as 10, as well as from retirees who want to learn to program in their free time. Python Crash Course is being used in middle schools and high schools…