Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Local Community in the Era of Social Media Technologies

      • 1st Edition
      • August 31, 2013
      • Hui-Lan Titangos
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 9 6 8
      • eBook
        9 7 8 1 7 8 0 6 3 3 6 1 9
      Social media technologies can help connect local communities to the wider world. Local Community in the Era of Social Media Technologies introduces the experience of bringing a local community to the world. This book, with the model of Santa Cruz County, California, develops a truly global approach to the subject. The first section of the book covers the early efforts of recording the local Santa Cruz area, before moving on to deal with Library 1.0. The next section looks at the present situation with Library 2.0 and its benefits. The book ends with a discussion of future directions and the implications of Library 3.0 and beyond.
    • Total Information Risk Management

      • 1st Edition
      • August 30, 2013
      • Alexander Borek + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 5 4 7 6
      • eBook
        9 7 8 0 1 2 4 0 5 8 6 1 3
      How well does your organization manage the risks associated with information quality? Managing information risk is becoming a top priority on the organizational agenda. The increasing sophistication of IT capabilities along with the constantly changing dynamics of global competition are forcing businesses to make use of their information more effectively. Information is becoming a core resource and asset for all organizations; however, it also brings many potential risks to an organization, from strategic, operational, financial, compliance, and environmental to societal. If you continue to struggle to understand and measure how information and its quality affects your business, this book is for you. This reference is in direct response to the new challenges that all managers have to face. Our process helps your organization to understand the "pain points" regarding poor data and information quality so you can concentrate on problems that have a high impact on core business objectives. This book provides you with all the fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, and written in a language that is clear and easy to understand for non-technical managers.
    • Network and System Security

      • 2nd Edition
      • August 26, 2013
      • John Vacca
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 8 9 9
      • eBook
        9 7 8 0 1 2 4 1 6 6 9 5 0
      Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
    • Big Data Analytics

      • 1st Edition
      • August 23, 2013
      • David Loshin
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 3 1 9 4
      • eBook
        9 7 8 0 1 2 4 1 8 6 6 4 4
      Big Data Analytics will assist managers in providing an overview of the drivers for introducing big data technology into the organization and for understanding the types of business problems best suited to big data analytics solutions, understanding the value drivers and benefits, strategic planning, developing a pilot, and eventually planning to integrate back into production within the enterprise.
    • Cyber Security and IT Infrastructure Protection

      • 1st Edition
      • August 22, 2013
      • John Vacca
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 8 1 3
      • eBook
        9 7 8 0 1 2 4 2 0 0 4 7 0
      This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements:• Checklists throughout each chapter to gauge understanding• Chapter Review Questions/Exercises and Case Studies• Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
    • Credible Checklists and Quality Questionnaires

      • 1st Edition
      • August 22, 2013
      • Chauncey Wilson
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 3 9 2 4
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 9 5
      Credible Checklists and Quality Questionnaires starts off with an examination of the critical but commonly overlooked checklist method. In the second chapter, questionnaires and surveys are discussed. Asking questions sounds simple, but the hard truth is that asking questions (and designing questionnaires) is a difficult task. This chapter discusses being mindful of the choice of words, order of questions and how early questions influence later questions, answer scales and how they impact the user response, questionnaire design, and much more. The final chapter provides examples of some common questionnaires (both free and fee-based) for assessing the usability of products. After reading this book, readers will be able to use these user design tools with greater confidence and certainty.
    • Managing Information Security

      • 2nd Edition
      • August 21, 2013
      • John Vacca
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 8 8 2
      • eBook
        9 7 8 0 1 2 4 1 6 6 9 4 3
      Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
    • FISMA Compliance Handbook

      • 1st Edition
      • August 20, 2013
      • Laura P. Taylor
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 8 7 1 2
      • eBook
        9 7 8 0 1 2 4 0 5 9 1 5 3
      This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
    • X-Ways Forensics Practitioner’s Guide

      • 1st Edition
      • August 10, 2013
      • Brett Shavers + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 6 0 5 4
      • eBook
        9 7 8 0 1 2 4 1 1 6 2 2 1
      The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documen... features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.
    • Computer-Aided Vaccine Design

      • 1st Edition
      • July 31, 2013
      • Joo Chuan Tong + 1 more
      • English
      • Hardback
        9 7 8 1 9 0 7 5 6 8 4 1 1
      • eBook
        9 7 8 1 9 0 8 8 1 8 4 1 6
      Computational pre-screening of antigens is now routinely applied to the discovery of vaccine candidates.Computer-... vaccine design is a comprehensive introduction to this exciting field of study. The book is intended to be a textbook for researchers and for courses in bioinformatics, as well as a laboratory reference guide. It is written mainly for biologists who want to understand the current methods of computer-aided vaccine design. The contents are designed to help biologists appreciate the underlying concepts and algorithms used, as well as limitations of the methods and strategies for their use. Chapters include: MHC and T cell responses; Immunoglobulins and B cell responses; Scientific publications and databases; Database design; Computational T cell vaccine design; Computational B cell vaccine design; infectious disease informatics; Vaccine safety and quality assessments; and Vaccine adjuvant informatics.