Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Business Process Change

      • 3rd Edition
      • April 26, 2014
      • Paul Harmon
      • English
      • eBook
        9 7 8 0 1 2 8 0 0 5 2 2 4
      Business Process Change, 3rd Edition provides a balanced view of the field of business process change. Bestselling author Paul Harmon offers concepts, methods, cases for all aspects and phases of successful business process improvement. Updated and added for this edition is new material on the development of business models and business process architecture development, on integrating decision management models and business rules, on service processes and on dynamic case management, and on integrating various approaches in a broad business process management approach. New to this edition: How to develop business models and business process architecture How to integrate decision management models and business rules New material on service processes and on dynamic case management Learn to integrate various approaches in a broad business process management approach
    • Conformal Prediction for Reliable Machine Learning

      • 1st Edition
      • April 23, 2014
      • Vineeth Balasubramanian + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 8 5 3 7 8
      • eBook
        9 7 8 0 1 2 4 0 1 7 1 5 3
      The conformal predictions framework is a recent development in machine learning that can associate a reliable measure of confidence with a prediction in any real-world pattern recognition application, including risk-sensitive applications such as medical diagnosis, face recognition, and financial risk prediction. Conformal Predictions for Reliable Machine Learning: Theory, Adaptations and Applications captures the basic theory of the framework, demonstrates how to apply it to real-world problems, and presents several adaptations, including active learning, change detection, and anomaly detection. As practitioners and researchers around the world apply and adapt the framework, this edited volume brings together these bodies of work, providing a springboard for further research as well as a handbook for application in real-world problems.
    • Social Engineering Penetration Testing

      • 1st Edition
      • April 11, 2014
      • Gavin Watson + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 2 4 8
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 2 8
      Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
    • Ultimate Computing

      • 1st Edition
      • April 11, 2014
      • S.R. Hameroff
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 8 6 6 3
      • eBook
        9 7 8 0 4 4 4 6 0 0 0 9 7
      The possibility of direct interfacing between biological and technological information devices could result in a merger of mind and machine - Ultimate Computing. This book, a thorough consideration of this idea, involves a number of disciplines, including biochemistry, cognitive science, computer science, engineering, mathematics, microbiology, molecular biology, pharmacology, philosophy, physics, physiology, and psychology.
    • Collaboration with Cloud Computing

      • 1st Edition
      • April 7, 2014
      • Ric Messier
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 4 0 7
      • eBook
        9 7 8 0 1 2 4 1 7 1 2 3 7
      Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
    • Knowledge-Based Configuration

      • 1st Edition
      • March 31, 2014
      • Alexander Felfernig + 3 more
      • English
      • Hardback
        9 7 8 0 1 2 4 1 5 8 1 7 7
      • eBook
        9 7 8 0 1 2 4 1 5 8 6 9 6
      Knowledge-based Configuration incorporates knowledge representation formalisms to capture complex product models and reasoning methods to provide intelligent interactive behavior with the user. This book represents the first time that corporate and academic worlds collaborate integrating research and commercial benefits of knowledge-based configuration. Foundational interdisciplinary material is provided for composing models from increasingly complex products and services. Case studies, the latest research, and graphical knowledge representations that increase understanding of knowledge-based configuration provide a toolkit to continue to push the boundaries of what configurators can do and how they enable companies and customers to thrive.
    • The UX Five-Second Rules

      • 1st Edition
      • March 21, 2014
      • Paul Doncaster
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 3 4 7
      • eBook
        9 7 8 0 1 2 8 0 0 6 6 1 0
      The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method. The Five-Second Rules uses detailed examples from a collection of more than 300 tests to describe the strengths and weaknesses of this rapid testing method. Readers will learn about the "five-second rules" for getting useful data, and will explore what types of design issues can be resolved by using the method. A five-second test (also known as "timeout test" and "exposure test") involves displaying a visual or informational design for five seconds, removing it from view, then asking what aspects were recalled most easily or vividly. The goal is to understand what stands out most about a design or product, and the impact on the viewer's perception of it.
    • Pragmatic Enterprise Architecture

      • 1st Edition
      • March 15, 2014
      • James Luisi
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 0 5 6
      • eBook
        9 7 8 0 1 2 8 0 0 5 0 2 6
      Pragmatic Enterprise Architecture is a practical hands-on instruction manual for enterprise architects. This book prepares you to better engage IT, management, and business users by equipping you with the tools and knowledge you need to address the most common enterprise architecture challenges. You will come away with a pragmatic understanding of and approach to enterprise architecture and actionable ideas to transform your enterprise. Experienced enterprise architect James V. Luisi generously shares life cycle architectures, transaction path analysis frameworks, and more so you can save time, energy, and resources on your next big project. As an enterprise architect, you must have relatable frameworks and excellent communication skills to do your job. You must actively engage and support a large enterprise involving a hundred architectural disciplines with a modest number of subject matter experts across business, information systems, control systems, and operations architecture. They must achieve their mission using the influence of ideas and business benefits expressed in simple terms so that any audience can understand what to do and why. Pragmatic Enterprise Architecture gives you the tools to accomplish your goals in less time with fewer resources.
    • Eye Tracking in User Experience Design

      • 1st Edition
      • March 12, 2014
      • Jennifer Romano Bergstrom + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 1 3 8 3
      • eBook
        9 7 8 0 1 2 4 1 6 7 0 9 4
      Eye Tracking for User Experience Design explores the many applications of eye tracking to better understand how users view and interact with technology. Ten leading experts in eye tracking discuss how they have taken advantage of this new technology to understand, design, and evaluate user experience. Real-world stories are included from these experts who have used eye tracking during the design and development of products ranging from information websites to immersive games. They also explore recent advances in the technology which tracks how users interact with mobile devices, large-screen displays and video game consoles. Methods for combining eye tracking with other research techniques for a more holistic understanding of the user experience are discussed. This is an invaluable resource to those who want to learn how eye tracking can be used to better understand and design for their users.
    • Process Modeling Style

      • 1st Edition
      • March 11, 2014
      • John Long
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 9 5 9 8
      • eBook
        9 7 8 0 1 2 8 0 1 0 4 0 2
      Process Modeling Style focuses on other aspects of process modeling beyond notation that are very important to practitioners. Many people who model processes focus on the specific notation used to create their drawings. While that is important, there are many other aspects to modeling, such as naming, creating identifiers, descriptions, interfaces, patterns, and creating useful process documentation. Experience author John Long focuses on those non-notational aspects of modeling, which practitioners will find invaluable.