Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Virtual Reality

    Applications and Explorations
    • 1st Edition
    • Alan Wexelblat
    • English
    Virtual Reality: Applications and Explorations provides information pertinent to the fundamental aspects of virtual reality and artificial reality. This book discusses the potential applications of virtual reality. Organized into three parts encompassing 10 chapters, this book begins with an overview of the traditional computer science activities ad discusses how hard problems in computer science can be addressed with virtual reality ideas and technology. This text then explores some applications of virtual reality technology that could potentially touch almost every purposeful activity that humans undertake in a technological civilization. Other chapters consider the use of virtual reality to manage and present to users information that cannot otherwise be comprehended. This book discusses as well the use of artificial worlds in both computer art and virtual reality. The final chapter deals with how the ideas of virtual reality and artificial reality can be of use to anyone who has to manage a business or organization. This book is a valuable resource for computer scientists.
  • Advanced Programming Methodologies

    • 1st Edition
    • Gianna Cioni + 1 more
    • English
    Advanced Programming Methodologies consists of lecture demos and practical experiments from the Summer School on Advanced Programming Methodologies which took place in Rome, Italy, on September 17-24, 1987. The school focused on tools of advanced programming as well as theoretical foundations for software engineering. Problems connected with implementation and application of high-level programming languages are highlighted. Comprised of 11 chapters, this volume first looks at two software development projects at the Institute of Informatics of the University of Warsaw in Poland, with emphasis on the methodologies used in programming and implementation. The reader is then introduced to flexible specification environments; object-oriented programming; and Paragon's type hierarchies for data abstraction. Subsequent chapters focus on the inheritance rule in object-oriented programming; a functional programming approach to modularity in large software systems; database management systems; and relational algebra and fixpoint computation for logic programming implementation. The book also examines modules in high-level programming languages before concluding with a chapter devoted to storage management. This book is intended for computer programmers, undergraduate students taking various courses in programming, and advanced students of computer science.
  • Computers and the General Practitioner

    Proceedings of the GP-Info Symposium, London, 1980
    • 1st Edition
    • Alastair Malcolm + 1 more
    • English
    Computers and the General Practitioner focuses on the applications of computers in various aspects of health service, including ECG analysis, primary care, and diagnosis. The selection first tackles general practice and technological promise and experience of pioneers. Topics include information systems and general practice, trends in silicon chip technology, and problems of computer usage in National Health Service practice. The publication then examines security in computer controlled information systems and national strategy for primary care computing, including security defenses, linked systems, cryptography, and basic system. The text takes a look at the computer education of the general practitioner, use of computers in the consulting room, and ECG analysis by computer in general practice. Discussions focus on the problems associated with educating doctors, features of a heuristic system, and the function of the computer as a general practitioner's diagnostic assistant. The selection is a dependable source of data for doctors and readers interested in exploring the applications of computers in health services.
  • Quantum Information Processing with Diamond

    Principles and Applications
    • 1st Edition
    • Steven Prawer + 1 more
    • English
    Diamond nitrogen vacancy (NV) color centers can transform quantum information science into practical quantum information technology, including fast, safe computing. Quantum Information Processing with Diamond looks at the principles of quantum information science, diamond materials, and their applications. Part one provides an introduction to quantum information processing using diamond, as well as its principles and fabrication techniques. Part two outlines experimental demonstrations of quantum information processing using diamond, and the emerging applications of diamond for quantum information science. It contains chapters on quantum key distribution, quantum microscopy, the hybridization of quantum systems, and building quantum optical devices. Part three outlines promising directions and future trends in diamond technologies for quantum information processing and sensing. Quantum Information Processing with Diamond is a key reference for R&D managers in industrial sectors such as conventional electronics, communication engineering, computer science, biotechnology, quantum optics, quantum mechanics, quantum computing, quantum cryptology, and nanotechnology, as well as academics in physics, chemistry, biology, and engineering.
  • Modeling Enterprise Architecture with TOGAF

    A Practical Guide Using UML and BPMN
    • 1st Edition
    • Philippe Desfray + 1 more
    • English
    Modeling Enterprise Architecture with TOGAF explains everything you need to know to effectively model enterprise architecture with The Open Group Architecture Framework (TOGAF), the leading EA standard. This solution-focused reference presents key techniques and illustrative examples to help you model enterprise architecture. This book describes the TOGAF standard and its structure, from the architecture transformation method to governance, and presents enterprise architecture modeling practices with plenty of examples of TOGAF deliverables in the context of a case study. Although widespread and growing quickly, enterprise architecture is delicate to manage across all its dimensions. Focusing on the architecture transformation method, TOGAF provides a wide framework, which covers the repository, governance, and a set of recognized best practices. The examples featured in this book were realized using the open source Modelio tool, which includes extensions for TOGAF.
  • Business Process Change

    • 3rd Edition
    • Paul Harmon
    • English
    Business Process Change, 3rd Edition provides a balanced view of the field of business process change. Bestselling author Paul Harmon offers concepts, methods, cases for all aspects and phases of successful business process improvement. Updated and added for this edition is new material on the development of business models and business process architecture development, on integrating decision management models and business rules, on service processes and on dynamic case management, and on integrating various approaches in a broad business process management approach. New to this edition: How to develop business models and business process architecture How to integrate decision management models and business rules New material on service processes and on dynamic case management Learn to integrate various approaches in a broad business process management approach
  • Conformal Prediction for Reliable Machine Learning

    Theory, Adaptations and Applications
    • 1st Edition
    • Vineeth Balasubramanian + 2 more
    • English
    The conformal predictions framework is a recent development in machine learning that can associate a reliable measure of confidence with a prediction in any real-world pattern recognition application, including risk-sensitive applications such as medical diagnosis, face recognition, and financial risk prediction. Conformal Predictions for Reliable Machine Learning: Theory, Adaptations and Applications captures the basic theory of the framework, demonstrates how to apply it to real-world problems, and presents several adaptations, including active learning, change detection, and anomaly detection. As practitioners and researchers around the world apply and adapt the framework, this edited volume brings together these bodies of work, providing a springboard for further research as well as a handbook for application in real-world problems.
  • Ultimate Computing

    Biomolecular Consciousness and NanoTechnology
    • 1st Edition
    • S.R. Hameroff
    • English
    The possibility of direct interfacing between biological and technological information devices could result in a merger of mind and machine - Ultimate Computing. This book, a thorough consideration of this idea, involves a number of disciplines, including biochemistry, cognitive science, computer science, engineering, mathematics, microbiology, molecular biology, pharmacology, philosophy, physics, physiology, and psychology.
  • Social Engineering Penetration Testing

    Executing Social Engineering Pen Tests, Assessments and Defense
    • 1st Edition
    • Gavin Watson + 2 more
    • English
    Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
  • Collaboration with Cloud Computing

    Security, Social Media, and Unified Communications
    • 1st Edition
    • Ric Messier
    • English
    Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network