Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Hacking with Kali

    Practical Penetration Testing Techniques
    • 1st Edition
    • James Broad + 1 more
    • English
    Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
  • Information Management

    Strategies for Gaining a Competitive Advantage with Data
    • 1st Edition
    • William McKnight
    • English
    Information Management: Gaining a Competitive Advantage with Data is about making smart decisions to make the most of company information. Expert author William McKnight develops the value proposition for information in the enterprise and succinctly outlines the numerous forms of data storage. Information Management will enlighten you, challenge your preconceived notions, and help activate information in the enterprise. Get the big picture on managing data so that your team can make smart decisions by understanding how everything from workload allocation to data stores fits together. The practical, hands-on guidance in this book includes: Part 1: The importance of information management and analytics to business, and how data warehouses are used Part 2: The technologies and data that advance an organization, and extend data warehouses and related functionality Part 3: Big Data and NoSQL, and how technologies like Hadoop enable management of new forms of data Part 4: Pulls it all together, while addressing topics of agile development, modern business intelligence, and organizational change management Read the book cover-to-cover, or keep it within reach for a quick and useful resource. Either way, this book will enable you to master all of the possibilities for data or the broadest view across the enterprise.
  • Distributed Computing Through Combinatorial Topology

    • 1st Edition
    • Maurice Herlihy + 2 more
    • English
    Distributed Computing Through Combinatorial Topology describes techniques for analyzing distributed algorithms based on award winning combinatorial topology research. The authors present a solid theoretical foundation relevant to many real systems reliant on parallelism with unpredictable delays, such as multicore microprocessors, wireless networks, distributed systems, and Internet protocols. Today, a new student or researcher must assemble a collection of scattered conference publications, which are typically terse and commonly use different notations and terminologies. This book provides a self-contained explanation of the mathematics to readers with computer science backgrounds, as well as explaining computer science concepts to readers with backgrounds in applied mathematics. The first section presents mathematical notions and models, including message passing and shared-memory systems, failures, and timing models. The next section presents core concepts in two chapters each: first, proving a simple result that lends itself to examples and pictures that will build up readers' intuition; then generalizing the concept to prove a more sophisticated result. The overall result weaves together and develops the basic concepts of the field, presenting them in a gradual and intuitively appealing way. The book's final section discusses advanced topics typically found in a graduate-level course for those who wish to explore further.
  • Agile Software Architecture

    Aligning Agile Processes and Software Architectures
    • 1st Edition
    • Muhammad Ali Babar + 2 more
    • English
    Agile software development approaches have had significant impact on industrial software development practices. Today, agile software development has penetrated to most IT companies across the globe, with an intention to increase quality, productivity, and profitability. Comprehensive knowledge is needed to understand the architectural challenges involved in adopting and using agile approaches and industrial practices to deal with the development of large, architecturally challenging systems in an agile way. Agile Software Architecture focuses on gaps in the requirements of applying architecture-centric approaches and principles of agile software development and demystifies the agile architecture paradox. Readers will learn how agile and architectural cultures can co-exist and support each other according to the context. Moreover, this book will also provide useful leads for future research in architecture and agile to bridge such gaps by developing appropriate approaches that incorporate architecturally sound practices in agile methods.
  • Applied Network Security Monitoring

    Collection, Detection, and Analysis
    • 1st Edition
    • Chris Sanders + 1 more
    • English
    Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data. If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.
  • Data Mining Applications with R

    • 1st Edition
    • Yanchang Zhao + 1 more
    • English
    Data Mining Applications with R is a great resource for researchers and professionals to understand the wide use of R, a free software environment for statistical computing and graphics, in solving different problems in industry. R is widely used in leveraging data mining techniques across many different industries, including government, finance, insurance, medicine, scientific research and more. This book presents 15 different real-world case studies illustrating various techniques in rapidly growing areas. It is an ideal companion for data mining researchers in academia and industry looking for ways to turn this versatile software into a powerful analytic tool. R code, Data and color figures for the book are provided at the RDataMining.com website.
  • Enterprise Applications Administration

    The Definitive Guide to Implementation and Operations
    • 1st Edition
    • Jeremy Faircloth
    • English
    Enterprise Applications Administration prepares you for the full breadth of work associated with administering large enterprise applications. This book provides essential information on tasks such as operating systems administration, network design, system architecture, project planning, working within a team, protecting the network, and how to keep applications up and running. The book effectively bridges the gap between what is taught in the technology-specific literature and the real world of enterprise application administrators.
  • Interview Techniques for UX Practitioners

    A User-Centered Design Method
    • 1st Edition
    • Chauncey Wilson
    • English
    Much of the work of user-centered design practitioners involves some type of interviewing. While interviewing is an important skill, many colleagues have little or no formal training in interviewing methods and often learn on the job with limited feedback on the quality of their interviews. This book teaches readers about the three basic interview methods: structured interviews, semi-structured interviews, and unstructured interviews. The author discusses the various strengths, weaknesses, issues with each type of interview, and includes best practices and procedures for conducing effective and efficient interviews. The book dives into the detailed information about interviews that haven’t been discussed before – readers learn how and when to ask the "how" and "why" questions to get a deeper understanding of problems, concepts, and processes, as well as discussions on laddering and critical incident techniques. Because so much of what UX practitioners do involves good interviewing skills, this is your one-stop resource with the definitions, processes, procedures and best practices on the basic approaches.
  • Budget Constraints and Optimization in Sponsored Search Auctions

    • 1st Edition
    • Yanwu Yang + 1 more
    • English
    The Intelligent Systems Series publishes reference works and handbooks in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. They include theoretical studies, design methods, and real-world implementations and applications. The series' readership is broad, but focuses on engineering, electronics, and computer science. Budget constraints and optimization in sponsored search auctions takes into account consideration of the entire life cycle of campaigns for researchers and developers working on search systems and ROI maximization. The highly experienced authors compiled their knowledge and experience to provide insight, algorithms and development techniques for successful optimized/constraine... systems. The book presents a cutting-edge budget optimization approach that embraces three-level budget decisions in the life cycle of search auctions: allocation across markets at the system level, distribution over temporal slots at the campaign level, and real-time adjustment at the keyword level.
  • Advanced Theory of Constraint and Motion Analysis for Robot Mechanisms

    • 1st Edition
    • Jingshan Zhao + 3 more
    • English
    Advanced Theory of Constraint and Motion Analysis for Robot Mechanisms provides a complete analytical approach to the invention of new robot mechanisms and the analysis of existing designs based on a unified mathematical description of the kinematic and geometric constraints of mechanisms. Beginning with a high level introduction to mechanisms and components, the book moves on to present a new analytical theory of terminal constraints for use in the development of new spatial mechanisms and structures. It clearly describes the application of screw theory to kinematic problems and provides tools that students, engineers and researchers can use for investigation of critical factors such as workspace, dexterity and singularity.