Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Generating Functionology

      • 2nd Edition
      • October 22, 2013
      • Herbert S. Wilf
      • English
      • Hardback
        9 7 8 0 1 2 7 5 1 9 5 6 2
      • eBook
        9 7 8 0 0 8 0 5 7 1 5 1 5
      This is the Second Edition of the highly successful introduction to the use of generating functions and series in combinatorial mathematics. This new edition includes several new areas of application, including the cycle index of the symmetric group, permutations and square roots, counting polyominoes, and exact covering sequences. An appendix on using the computer algebra programs MAPLE(r) and Mathematica(r) to generate functions is also included. The book provides a clear, unified introduction to the basic enumerative applications of generating functions, and includes exercises and solutions, many new, at the end of each chapter.
    • Network Convergence

      • 1st Edition
      • September 28, 2013
      • Vinod Joseph + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 7 8 7 7 6
      • eBook
        9 7 8 0 1 2 3 9 7 8 8 1 3
      Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments. This reference starts with an overview of the Ethernet and existing broadband architectures, including XDSL, WIMAX, and VLANs. It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP/MPLS layers, considered to be the backbone of next-generation packet transport architecture. If you're a network designer or architect, a technical sales professional, or if you're pursuing technical certifications, you will benefit from Network Convergence's fundamental information on this rapidly evolving technology.
    • Job Reconnaissance

      • 1st Edition
      • September 20, 2013
      • Josh More
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 0 1 1
      • eBook
        9 7 8 0 1 2 4 1 6 6 6 0 8
      There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job. This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context. The emphasis in Job Reconnaissance is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search books commonly miss.
    • Flow Networks

      • 1st Edition
      • January 16, 2013
      • Michael T. Todinov
      • English
      • Paperback
        9 7 8 0 3 2 3 2 8 2 7 4 1
      • Hardback
        9 7 8 0 1 2 3 9 8 3 9 6 1
      • eBook
        9 7 8 0 1 2 3 9 8 4 0 6 7
      Repairable flow networks are a new area of research, which analyzes the repair and flow disruption caused by failures of components in static flow networks. This book addresses a gap in current network research by developing the theory, algorithms and applications related to repairable flow networks and networks with disturbed flows. The theoretical results presented in the book lay the foundations of a new generation of ultra-fast algorithms for optimizing the flow in networks after failures or congestion, and the high computational speed creates the powerful possibility of optimal control of very large and complex networks in real time. Furthermore, the possibility for re-optimizing the network flows in real time increases significantly the yield from real production networks and reduces to a minimum the flow disruption caused by failures. The potential application of repairable flow networks reaches across many large and complex systems, including active power networks, telecommunication networks, oil and gas production networks, transportation networks, water supply networks, emergency evacuation networks, and supply networks. The book reveals a fundamental flaw in classical algorithms for maximising the throughput flow in networks, published since the creation of the theory of flow networks in 1956. Despite the years of intensive research, the classical algorithms for maximising the throughput flow leave highly undesirable directed loops of flow in the optimised networks. These flow loops are associated with wastage of energy and resources and increased levels of congestion in the optimised networks.
    • Blogs and Tweets, Texting and Friending

      • 1st Edition
      • July 4, 2013
      • Sandra M. DeJong
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 1 2 8 4
      • eBook
        9 7 8 0 1 2 4 0 8 0 6 8 3
      Blogs and Tweets, Texting and Friending: Social Media and Online Professionalism in Health Care summarizes the most common mistakes — and their legal and ethical ramifications —made in social media by busy health care professionals. It gives best practices for using social media while maintaining online professionalism. The book goes on to identify categories of caution, from confidentiality of patient information and maintaining the professional's privacy to general netiquette in tweeting, texting, blogging, and friending. And it guides you in setting up a faculty page (or choosing not to) and managing your online footprint. The connected generation regularly uses social media, including health care professionals, but what happens when a patient wants to friend you? Or when you've already posted a rant on a patient that gets viewed by others? What information may already be floating on the Internet that a patient may find about you in a Google search and that might impact your therapeutic relationship? Whether you are new to social media or an expert user in your private life (but haven't thought about what this means for you professionally), this book is for you. It’s the "when" and "how" to use social media effectively while maintaining online professionalism.
    • Cyber Security and IT Infrastructure Protection

      • 1st Edition
      • August 22, 2013
      • John Vacca
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 8 1 3
      • eBook
        9 7 8 0 1 2 4 2 0 0 4 7 0
      This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements:• Checklists throughout each chapter to gauge understanding• Chapter Review Questions/Exercises and Case Studies• Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
    • Brainstorming and Beyond

      • 1st Edition
      • January 22, 2013
      • Chauncey Wilson
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 1 5 7 5
      • eBook
        9 7 8 0 1 2 4 0 7 1 6 6 7
      Brainstorming and Beyond describes the techniques for generating ideas verbally, in writing, or through sketches. The first chapter focuses on brainstorming, the foundation method for ideation, which is a complex social process building off of social psychology principles, motivational constructs, and corporate culture. Brainstorming is commonly portrayed as an easy way to generate ideas, but in reality, it is a complex social process that is often flawed in ways that are not self-evident. Chapter 2 discusses Brainwriting, which is a variation on brainstorming in which each person writes ideas down on paper and then passes the paper to a new person who reads the first set of ideas and adds new ones. Since there is no group shouting out of ideas, strong facilitation skills are not required, and more often than not, Brainwriting results greatly exceed those of group brainstorming in a shorter time because ideas are generated in a parallel, rather than serial, fashion. Brainwriting is useful when time is limited, groups are hostile, or you are dealing with a culture where shouting out wild or divergent ideas might be difficult. Finally, in Chapter 3, readers learn about Braindrawing, a method of visual brainstorming that helps practitioners generate ideas for icons, other graphics, user interface layouts, or Web page designs. Each of these methods provides readers with ways to generate, present, and evaluate ideas so they can begin building a strong foundation for product success.
    • Cloud Computing

      • 1st Edition
      • May 24, 2013
      • Dan C. Marinescu
      • English
      • Paperback
        9 7 8 0 1 2 4 0 4 6 2 7 6
      • eBook
        9 7 8 0 1 2 4 0 4 6 4 1 2
      Cloud Computing: Theory and Practice provides students and IT professionals with an in-depth analysis of the cloud from the ground up. Beginning with a discussion of parallel computing and architectures and distributed systems, the book turns to contemporary cloud infrastructures, how they are being deployed at leading companies such as Amazon, Google and Apple, and how they can be applied in fields such as healthcare, banking and science. The volume also examines how to successfully deploy a cloud application across the enterprise using virtualization, resource management and the right amount of networking support, including content delivery networks and storage area networks. Developers will find a complete introduction to application development provided on a variety of platforms.
    • The Wireshark Field Guide

      • 1st Edition
      • May 14, 2013
      • Robert Shimonski
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 4 1 3 6
      • eBook
        9 7 8 0 1 2 4 1 0 4 9 6 9
      The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic. Readers will learn the fundamentals of packet capture and inspection, the use of color codes and filters, deep analysis, including probes and taps, and much more. The Wireshark Field Guide is an indispensable companion for network technicians, operators, and engineers.
    • X-Ways Forensics Practitioner’s Guide

      • 1st Edition
      • August 10, 2013
      • Brett Shavers + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 6 0 5 4
      • eBook
        9 7 8 0 1 2 4 1 1 6 2 2 1
      The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documen... features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.