Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Digital Picture Processing

      • 2nd Edition
      • Volume 1
      • January 9, 2014
      • Azriel Rosenfeld + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 2 1 5 5 3
      • eBook
        9 7 8 0 3 2 3 1 3 9 9 1 5
      The rapid rate at which the field of digital picture processing has grown in the past five years had necessitated extensive revisions and the introduction of topics not found in the original edition.
    • Freemium Economics

      • 1st Edition
      • December 27, 2013
      • Eric Benjamin Seufert
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 9 0 5
      • eBook
        9 7 8 0 1 2 4 1 6 6 9 8 1
      Freemium Economics presents a practical, instructive approach to successfully implementing the freemium model into your software products by building analytics into product design from the earliest stages of development. Your freemium product generates vast volumes of data, but using that data to maximize conversion, boost retention, and deliver revenue can be challenging if you don't fully understand the impact that small changes can have on revenue. In this book, author Eric Seufert provides clear guidelines for using data and analytics through all stages of development to optimize your implementation of the freemium model. Freemium Economics de-mystifies the freemium model through an exploration of its core, data-oriented tenets, so that you can apply it methodically rather than hoping that conversion and revenue will naturally follow product launch.
    • Designing with the Mind in Mind

      • 2nd Edition
      • December 17, 2013
      • Jeff Johnson
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 9 1 4 4
      • eBook
        9 7 8 0 1 2 4 1 1 5 5 6 9
      In this completely updated and revised edition of Designing with the Mind in Mind, Jeff Johnson provides you with just enough background in perceptual and cognitive psychology that user interface (UI) design guidelines make intuitive sense rather than being just a list or rules to follow. Early UI practitioners were trained in cognitive psychology, and developed UI design rules based on it. But as the field has evolved since the first edition of this book, designers enter the field from many disciplines. Practitioners today have enough experience in UI design that they have been exposed to design rules, but it is essential that they understand the psychology behind the rules in order to effectively apply them. In this new edition, you'll find new chapters on human choice and decision making, hand-eye coordination and attention, as well as new examples, figures, and explanations throughout.
    • Hacking with Kali

      • 1st Edition
      • December 4, 2013
      • James Broad + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 7 4 9 2
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 3 3
      Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
    • Distributed Computing Through Combinatorial Topology

      • 1st Edition
      • November 30, 2013
      • Maurice Herlihy + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 4 5 7 8 1
      • eBook
        9 7 8 0 1 2 4 0 4 7 2 8 0
      Distributed Computing Through Combinatorial Topology describes techniques for analyzing distributed algorithms based on award winning combinatorial topology research. The authors present a solid theoretical foundation relevant to many real systems reliant on parallelism with unpredictable delays, such as multicore microprocessors, wireless networks, distributed systems, and Internet protocols. Today, a new student or researcher must assemble a collection of scattered conference publications, which are typically terse and commonly use different notations and terminologies. This book provides a self-contained explanation of the mathematics to readers with computer science backgrounds, as well as explaining computer science concepts to readers with backgrounds in applied mathematics. The first section presents mathematical notions and models, including message passing and shared-memory systems, failures, and timing models. The next section presents core concepts in two chapters each: first, proving a simple result that lends itself to examples and pictures that will build up readers' intuition; then generalizing the concept to prove a more sophisticated result. The overall result weaves together and develops the basic concepts of the field, presenting them in a gradual and intuitively appealing way. The book's final section discusses advanced topics typically found in a graduate-level course for those who wish to explore further.
    • Information Management

      • 1st Edition
      • November 30, 2013
      • William McKnight
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 0 5 6 0
      • eBook
        9 7 8 0 1 2 4 0 9 5 2 6 7
      Information Management: Gaining a Competitive Advantage with Data is about making smart decisions to make the most of company information. Expert author William McKnight develops the value proposition for information in the enterprise and succinctly outlines the numerous forms of data storage. Information Management will enlighten you, challenge your preconceived notions, and help activate information in the enterprise. Get the big picture on managing data so that your team can make smart decisions by understanding how everything from workload allocation to data stores fits together. The practical, hands-on guidance in this book includes: Part 1: The importance of information management and analytics to business, and how data warehouses are used Part 2: The technologies and data that advance an organization, and extend data warehouses and related functionality Part 3: Big Data and NoSQL, and how technologies like Hadoop enable management of new forms of data Part 4: Pulls it all together, while addressing topics of agile development, modern business intelligence, and organizational change management Read the book cover-to-cover, or keep it within reach for a quick and useful resource. Either way, this book will enable you to master all of the possibilities for data or the broadest view across the enterprise.
    • Agile Software Architecture

      • 1st Edition
      • November 27, 2013
      • Muhammad Ali Babar + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 7 7 2 0
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 5 7
      Agile software development approaches have had significant impact on industrial software development practices. Today, agile software development has penetrated to most IT companies across the globe, with an intention to increase quality, productivity, and profitability. Comprehensive knowledge is needed to understand the architectural challenges involved in adopting and using agile approaches and industrial practices to deal with the development of large, architecturally challenging systems in an agile way. Agile Software Architecture focuses on gaps in the requirements of applying architecture-centric approaches and principles of agile software development and demystifies the agile architecture paradox. Readers will learn how agile and architectural cultures can co-exist and support each other according to the context. Moreover, this book will also provide useful leads for future research in architecture and agile to bridge such gaps by developing appropriate approaches that incorporate architecturally sound practices in agile methods.
    • Applied Network Security Monitoring

      • 1st Edition
      • November 26, 2013
      • Chris Sanders + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 2 0 8 1
      • eBook
        9 7 8 0 1 2 4 1 7 2 1 6 6
      Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data. If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.
    • Data Mining Applications with R

      • 1st Edition
      • November 26, 2013
      • Yanchang Zhao + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 4 1 1 5 1 1 8
      • Paperback
        9 7 8 0 1 2 8 1 0 0 0 8 0
      • eBook
        9 7 8 0 1 2 4 1 1 5 2 0 0
      Data Mining Applications with R is a great resource for researchers and professionals to understand the wide use of R, a free software environment for statistical computing and graphics, in solving different problems in industry. R is widely used in leveraging data mining techniques across many different industries, including government, finance, insurance, medicine, scientific research and more. This book presents 15 different real-world case studies illustrating various techniques in rapidly growing areas. It is an ideal companion for data mining researchers in academia and industry looking for ways to turn this versatile software into a powerful analytic tool. R code, Data and color figures for the book are provided at the RDataMining.com website.
    • Enterprise Applications Administration

      • 1st Edition
      • November 25, 2013
      • Jeremy Faircloth
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 7 7 3 7
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 7 1
      Enterprise Applications Administration prepares you for the full breadth of work associated with administering large enterprise applications. This book provides essential information on tasks such as operating systems administration, network design, system architecture, project planning, working within a team, protecting the network, and how to keep applications up and running. The book effectively bridges the gap between what is taught in the technology-specific literature and the real world of enterprise application administrators.