Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Computers and the General Practitioner

    Proceedings of the GP-Info Symposium, London, 1980
    • 1st Edition
    • Alastair Malcolm + 1 more
    • English
    Computers and the General Practitioner focuses on the applications of computers in various aspects of health service, including ECG analysis, primary care, and diagnosis. The selection first tackles general practice and technological promise and experience of pioneers. Topics include information systems and general practice, trends in silicon chip technology, and problems of computer usage in National Health Service practice. The publication then examines security in computer controlled information systems and national strategy for primary care computing, including security defenses, linked systems, cryptography, and basic system. The text takes a look at the computer education of the general practitioner, use of computers in the consulting room, and ECG analysis by computer in general practice. Discussions focus on the problems associated with educating doctors, features of a heuristic system, and the function of the computer as a general practitioner's diagnostic assistant. The selection is a dependable source of data for doctors and readers interested in exploring the applications of computers in health services.
  • Quantum Information Processing with Diamond

    Principles and Applications
    • 1st Edition
    • Steven Prawer + 1 more
    • English
    Diamond nitrogen vacancy (NV) color centers can transform quantum information science into practical quantum information technology, including fast, safe computing. Quantum Information Processing with Diamond looks at the principles of quantum information science, diamond materials, and their applications. Part one provides an introduction to quantum information processing using diamond, as well as its principles and fabrication techniques. Part two outlines experimental demonstrations of quantum information processing using diamond, and the emerging applications of diamond for quantum information science. It contains chapters on quantum key distribution, quantum microscopy, the hybridization of quantum systems, and building quantum optical devices. Part three outlines promising directions and future trends in diamond technologies for quantum information processing and sensing. Quantum Information Processing with Diamond is a key reference for R&D managers in industrial sectors such as conventional electronics, communication engineering, computer science, biotechnology, quantum optics, quantum mechanics, quantum computing, quantum cryptology, and nanotechnology, as well as academics in physics, chemistry, biology, and engineering.
  • Modeling Enterprise Architecture with TOGAF

    A Practical Guide Using UML and BPMN
    • 1st Edition
    • Philippe Desfray + 1 more
    • English
    Modeling Enterprise Architecture with TOGAF explains everything you need to know to effectively model enterprise architecture with The Open Group Architecture Framework (TOGAF), the leading EA standard. This solution-focused reference presents key techniques and illustrative examples to help you model enterprise architecture. This book describes the TOGAF standard and its structure, from the architecture transformation method to governance, and presents enterprise architecture modeling practices with plenty of examples of TOGAF deliverables in the context of a case study. Although widespread and growing quickly, enterprise architecture is delicate to manage across all its dimensions. Focusing on the architecture transformation method, TOGAF provides a wide framework, which covers the repository, governance, and a set of recognized best practices. The examples featured in this book were realized using the open source Modelio tool, which includes extensions for TOGAF.
  • Business Process Change

    • 3rd Edition
    • Paul Harmon
    • English
    Business Process Change, 3rd Edition provides a balanced view of the field of business process change. Bestselling author Paul Harmon offers concepts, methods, cases for all aspects and phases of successful business process improvement. Updated and added for this edition is new material on the development of business models and business process architecture development, on integrating decision management models and business rules, on service processes and on dynamic case management, and on integrating various approaches in a broad business process management approach. New to this edition: How to develop business models and business process architecture How to integrate decision management models and business rules New material on service processes and on dynamic case management Learn to integrate various approaches in a broad business process management approach
  • Conformal Prediction for Reliable Machine Learning

    Theory, Adaptations and Applications
    • 1st Edition
    • Vineeth Balasubramanian + 2 more
    • English
    The conformal predictions framework is a recent development in machine learning that can associate a reliable measure of confidence with a prediction in any real-world pattern recognition application, including risk-sensitive applications such as medical diagnosis, face recognition, and financial risk prediction. Conformal Predictions for Reliable Machine Learning: Theory, Adaptations and Applications captures the basic theory of the framework, demonstrates how to apply it to real-world problems, and presents several adaptations, including active learning, change detection, and anomaly detection. As practitioners and researchers around the world apply and adapt the framework, this edited volume brings together these bodies of work, providing a springboard for further research as well as a handbook for application in real-world problems.
  • Ultimate Computing

    Biomolecular Consciousness and NanoTechnology
    • 1st Edition
    • S.R. Hameroff
    • English
    The possibility of direct interfacing between biological and technological information devices could result in a merger of mind and machine - Ultimate Computing. This book, a thorough consideration of this idea, involves a number of disciplines, including biochemistry, cognitive science, computer science, engineering, mathematics, microbiology, molecular biology, pharmacology, philosophy, physics, physiology, and psychology.
  • Social Engineering Penetration Testing

    Executing Social Engineering Pen Tests, Assessments and Defense
    • 1st Edition
    • Gavin Watson + 2 more
    • English
    Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
  • Collaboration with Cloud Computing

    Security, Social Media, and Unified Communications
    • 1st Edition
    • Ric Messier
    • English
    Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
  • Knowledge-Based Configuration

    From Research to Business Cases
    • 1st Edition
    • Alexander Felfernig + 3 more
    • English
    Knowledge-based Configuration incorporates knowledge representation formalisms to capture complex product models and reasoning methods to provide intelligent interactive behavior with the user. This book represents the first time that corporate and academic worlds collaborate integrating research and commercial benefits of knowledge-based configuration. Foundational interdisciplinary material is provided for composing models from increasingly complex products and services. Case studies, the latest research, and graphical knowledge representations that increase understanding of knowledge-based configuration provide a toolkit to continue to push the boundaries of what configurators can do and how they enable companies and customers to thrive.
  • The UX Five-Second Rules

    Guidelines for User Experience Design's Simplest Testing Technique
    • 1st Edition
    • Paul Doncaster
    • English
    The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method. The Five-Second Rules uses detailed examples from a collection of more than 300 tests to describe the strengths and weaknesses of this rapid testing method. Readers will learn about the "five-second rules" for getting useful data, and will explore what types of design issues can be resolved by using the method. A five-second test (also known as "timeout test" and "exposure test") involves displaying a visual or informational design for five seconds, removing it from view, then asking what aspects were recalled most easily or vividly. The goal is to understand what stands out most about a design or product, and the impact on the viewer's perception of it.