Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Bridge Technology Report

      • 1st Edition
      • October 22, 2013
      • Architecture Technology Architecture Technology Corpor
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 0 8 5 7
      • eBook
        9 7 8 1 4 8 3 2 8 4 9 7 2
      Please note this is a Short Discount publication.As LANs have proliferated, new technologies and system concepts have come to the fore. One of the key issues is how to interconnect networks. One means of interconnection is to use a 'bridge'. Other competing technologies are repeaters, routers, and gateways. Bridges permit traffic isolation, connect network segments together and operate at the MAC layer. Further, because they operate at the MAC layer, they can handle a variety of protocols such as TCP/IP, SNA, and X.25.This report focuses on the specific technology of bridging two networks and the competing approaches of spanning tree [backed by DEC] and the source route technology [backed by IBM]. Both of these approaches are compared and their strengths and weaknesses described and contrasted. Other approaches that combine the two approaches as well as novel approaches to this problem are described.In a world of increasing complexity of networks, it is imperative that the user understand the possible means of bridging two networks and the capabilities of the various vendors products. The report focuses itself on developing that critical understanding.
    • Next Generation Knowledge Machines

      • 1st Edition
      • September 13, 2013
      • Syed V. Ahamed
      • English
      • Paperback
        9 7 8 0 1 2 8 1 0 2 7 4 9
      • Hardback
        9 7 8 0 1 2 4 1 6 6 2 9 5
      • eBook
        9 7 8 0 1 2 4 1 6 6 6 9 1
      This book delivers the scientific and mathematical basis to treat and process knowledge as a quantifiable and dimensioned entity. It provides the units and measures for the value of information contained in a "body of knowledge" that can be measured, processed, enhanced, communicated and preserved. It provides a basis to evaluate the quantity of knowledge acquired by students at various levels and in different universities. The effect of time on the dynamics and flow of knowledge is tied to Internet knowledge banks and provides the basis for designing and building the next generation of novel machine to appear in society. This book ties the basic needs of all human beings to the modern machines that resolve such need based on Internet knowledge banks (KBs) distributed throughout nations and societies. The features of the Intelligent Internet are fully exploited to make a new generation of students and knowledge workers use the knowledge resources elegantly and optimally. It deals with topics and insight into the design and architecture of next-generation computing systems that deal with human and social problems. Processor and Internet technologies that have already revolutionized human lives form the subject matter and the focal point of this book. Information and knowledge on the Internet delivered by next-generation mobile networks form the technical core presented. Human thought processes and adjustments follow the solutions offered by machines.
    • Job Reconnaissance

      • 1st Edition
      • September 20, 2013
      • Josh More
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 0 1 1
      • eBook
        9 7 8 0 1 2 4 1 6 6 6 0 8
      There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job. This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context. The emphasis in Job Reconnaissance is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search books commonly miss.
    • Applied Network Security Monitoring

      • 1st Edition
      • November 26, 2013
      • Chris Sanders + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 2 0 8 1
      • eBook
        9 7 8 0 1 2 4 1 7 2 1 6 6
      Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data. If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.
    • Strategic Intelligence Management

      • 1st Edition
      • January 17, 2013
      • Babak Akhgar + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 4 0 7 1 9 1 9
      • eBook
        9 7 8 0 1 2 4 0 7 2 1 9 0
      Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives. Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats.
    • Visual Usability

      • 1st Edition
      • March 21, 2013
      • Tania Schlatter + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 8 5 3 6 1
      • eBook
        9 7 8 0 1 2 4 0 1 7 1 3 9
      Imagine how much easier creating web and mobile applications would be if you had a practical and concise, hands-on guide to visual design. Visual Usability gets into the nitty-gritty of applying visual design principles to complex application design.You’ll learn how to avoid common mistakes, make informed decisions about application design, and elevate the ordinary. We’ll review three key principles that affect application design – consistency, hierarchy, and personality – and illustrate how to apply tools like typography, color, and layout to digital application design. Whether you’re a UI professional looking to fine-tune your skills, a developer who cares about making applications beautiful and usable, or someone entirely new to the design arena, Visual Usability is your one-stop, practical guide to visual design.
    • User Interface Inspection Methods

      • 1st Edition
      • November 15, 2013
      • Chauncey Wilson
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 3 9 1 7
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 8 8
      User Interface Inspection Methods succinctly covers five inspection methods: heuristic evaluation, perspective-based user interface inspection, cognitive walkthrough, pluralistic walkthrough, and formal usability inspections. Heuristic evaluation is perhaps the best-known inspection method, requiring a group of evaluators to review a product against a set of general principles. The perspective-based user interface inspection is based on the principle that different perspectives will find different problems in a user interface. In the related persona-based inspection, colleagues assume the roles of personas and review the product based on the needs, background, tasks, and pain points of the different personas. The cognitive walkthrough focuses on ease of learning. Most of the inspection methods do not require users; the main exception is the pluralistic walkthrough, in which a user is invited to provide feedback while members of a product team listen, observe the user, and ask questions. After reading this book, you will be able to use these UI inspection methods with confidence and certainty.
    • Decision Support in Public Administration

      • 1st Edition
      • Volume 26
      • October 22, 2013
      • P.W.G. Bots + 2 more
      • English
      • Paperback
        9 7 8 0 4 4 4 8 1 4 8 5 2
      • eBook
        9 7 8 1 4 8 3 2 9 3 4 3 1
      The vast flow of information to be considered by policy and decision makers in national and local governments is continuing to expand during the 1990s, whilst budgets for staff to process the information are being tightened. This publication provides a forum for the examination of the problem. It aims to focus the efforts of researchers and practitioners more effectively in applying information technology to increase the performance of decision makers in public administration despite the limited resources. Topics explored include the following: design considerations and approaches for, and practical experiences with, communication and information processing infrastructure and applications at the workplace level; the design and implementation of support systems for individual or group decision making in governmental and municipal settings; modelling and model management techniques, based on case reports of successful and unsuccessful modelling efforts; concepts, approaches and models for re-designing tasks and processes in public administration; issues and challenges in integrating the information systems of several governmental bodies. The book is divided into two parts for the discussion of these themes - the first section deals primarily with theoretical and conceptual issues; the second part contains papers with a stronger emphasis on systems, their functionality and experiences in their development and application. The authors' affiliations (17 organizations from 8 different countries) indicates the international nature of the contributions. The ideas put forward in their papers show that research into supporting decision making in public administration is well on its way but that the research area is vast, with yet many hills to scale.
    • Formal Description Techniques, IV

      • 1st Edition
      • Volume 2
      • October 22, 2013
      • K.R. Parker + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 8 9 4 0 2 1
      • eBook
        9 7 8 1 4 8 3 2 9 3 3 3 2
      Formality is becoming accepted as essential in the development of complex systems such as multi-layer communications protocols and distributed systems. Formality is mandatory for mathematical verification, a procedure being imposed on safety-critical system development. Standard documents are also becoming increasingly formalised in order to capture notions precisely and unambiguously. This FORTE '91 proceedings volume has focussed on the standardised languages SDL, Estelle and LOTOS while, as with earlier conferences, remaining open to other notations and techniques, thus encouraging the continuous evolution of formal techniques. This useful volume contains 29 submitted papers, three invited papers, four industry reports, and four tool reports organised to correspond with the conference sessions.
    • Blogs and Tweets, Texting and Friending

      • 1st Edition
      • July 4, 2013
      • Sandra M. DeJong
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 1 2 8 4
      • eBook
        9 7 8 0 1 2 4 0 8 0 6 8 3
      Blogs and Tweets, Texting and Friending: Social Media and Online Professionalism in Health Care summarizes the most common mistakes — and their legal and ethical ramifications —made in social media by busy health care professionals. It gives best practices for using social media while maintaining online professionalism. The book goes on to identify categories of caution, from confidentiality of patient information and maintaining the professional's privacy to general netiquette in tweeting, texting, blogging, and friending. And it guides you in setting up a faculty page (or choosing not to) and managing your online footprint. The connected generation regularly uses social media, including health care professionals, but what happens when a patient wants to friend you? Or when you've already posted a rant on a patient that gets viewed by others? What information may already be floating on the Internet that a patient may find about you in a Google search and that might impact your therapeutic relationship? Whether you are new to social media or an expert user in your private life (but haven't thought about what this means for you professionally), this book is for you. It’s the "when" and "how" to use social media effectively while maintaining online professionalism.