The need for every professional to have a solid presence on the Internet is more important than ever before. Having a presence beyond an email account, such as a custom web page or web application, usually requires a clumsy assortment of outside services or hiring a dedicated administrator. Thus it is more sensible for the...
For many years, major software companies like Microsoft and Oracle made previously
unfathomable profits by selling enterprise software that companies would buy and
operate in their own data centers. In the last 20 years, we have seen a gradual transition
to a wide variety of software and services models – SaaS, IaaS, PaaS...
In Theoretical and Empirical Investigations of Divination and Magic<\/i> ten leading scholars of religion provide up\-to\-date investigations into these classic domains from historical, anthropological, cognitive, philosophical and theoretical perspectives.
Learn how to use a Raspberry Pi in conjunction with an Arduino to build a basic robot with advanced capabilities. Getting started in robotics does not have to be difficult. This book is an insightful and rewarding introduction to robotics and a catalyst for further directed study.
The transition from royal to popular sovereignty during the age of democratic revolutions--from 1776 to 1848--entailed not only the reorganization of institutions of governance and norms of political legitimacy, but also a dramatic transformation in the iconography and symbolism of political
power. The personal and external rule of...
"This book is at times startling, yet very real and down to earth . . . I saw [Brantt] in all phases of his life and his career. I consider him a friend and an ally. Pain Killer sends a strong message." --Darryl Sutter, former NHL player, coach, and GM
For many years the RHCE from Red Hat has been based on managing
services on a single Red Hat host. The big question is: how many RHCEs
manage just a single host? With that in mind, Red Hat has updated the
exam and training to support Ansible, allowing you to learn to manage
This book presents the latest cutting edge research, theoretical methods, and novel applications in the field of computational intelligence and computational biological approaches that are aiming to combat COVID-19. The book gives the technological key drivers behind using AI to find drugs that target the virus, shedding light on the...
Harness the untapped potential of combining a decentralized Internet of Things (IoT) with the ability to make predictions on real-world fuzzy data. This book covers the theory behind machine learning models and shows you how to program and assemble a voice-controlled security.