Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Security Risks in Social Media Technologies

      • 1st Edition
      • July 31, 2013
      • Alan Oxley
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 1 4 9
      • eBook
        9 7 8 1 7 8 0 6 3 3 8 0 0
      Security measures can be used by management, IT staff, and users in participatory/collab... service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collab... pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collab... in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
    • Practical Anonymity

      • 1st Edition
      • July 19, 2013
      • Peter Loshin
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 4 0 4 4
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 2 6
      For those with legitimate reason to use the Internet anonymously--diploma... military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
    • System Parameter Identification

      • 1st Edition
      • July 17, 2013
      • Badong Chen + 3 more
      • English
      • Hardback
        9 7 8 0 1 2 4 0 4 5 7 4 3
      • Paperback
        9 7 8 0 1 2 8 1 0 3 1 6 6
      • eBook
        9 7 8 0 1 2 4 0 4 5 9 5 8
      Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing, investigating system identification from an information theory point of view. The book is divided into six chapters, which cover the information needed to understand the theory and application of system parameter identification. The authors’ research provides a base for the book, but it incorporates the results from the latest international research publications.
    • The Lambda Calculus

      • 2nd Edition
      • Volume 103
      • July 10, 2013
      • H.P. Barendregt
      • English
      • Hardback
        9 7 8 0 4 4 4 8 6 7 4 8 3
      • Paperback
        9 7 8 0 4 4 4 8 7 5 0 8 2
      • eBook
        9 7 8 0 0 8 0 9 3 3 7 5 7
      The revised edition contains a new chapter which provides an elegant description of the semantics. The various classes of lambda calculus models are described in a uniform manner. Some didactical improvements have been made to this edition. An example of a simple model is given and then the general theory (of categorical models) is developed. Indications are given of those parts of the book which can be used to form a coherent course.
    • Blogs and Tweets, Texting and Friending

      • 1st Edition
      • July 4, 2013
      • Sandra M. DeJong
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 1 2 8 4
      • eBook
        9 7 8 0 1 2 4 0 8 0 6 8 3
      Blogs and Tweets, Texting and Friending: Social Media and Online Professionalism in Health Care summarizes the most common mistakes — and their legal and ethical ramifications —made in social media by busy health care professionals. It gives best practices for using social media while maintaining online professionalism. The book goes on to identify categories of caution, from confidentiality of patient information and maintaining the professional's privacy to general netiquette in tweeting, texting, blogging, and friending. And it guides you in setting up a faculty page (or choosing not to) and managing your online footprint. The connected generation regularly uses social media, including health care professionals, but what happens when a patient wants to friend you? Or when you've already posted a rant on a patient that gets viewed by others? What information may already be floating on the Internet that a patient may find about you in a Google search and that might impact your therapeutic relationship? Whether you are new to social media or an expert user in your private life (but haven't thought about what this means for you professionally), this book is for you. It’s the "when" and "how" to use social media effectively while maintaining online professionalism.
    • Intelligent Networks

      • 1st Edition
      • July 3, 2013
      • Syed V. Ahamed
      • English
      • Hardback
        9 7 8 0 1 2 4 1 6 6 3 0 1
      • Paperback
        9 7 8 0 1 2 8 1 0 2 8 0 0
      • eBook
        9 7 8 0 1 2 4 1 6 6 7 0 7
      This textbook offers an insightful study of the intelligent Internet-driven revolutionary and fundamental forces at work in society. Readers will have access to tools and techniques to mentor and monitor these forces rather than be driven by changes in Internet technology and flow of money. These submerged social and human forces form a powerful synergistic foursome web of (a) processor technology, (b) evolving wireless networks of the next generation, (c) the intelligent Internet, and (d) the motivation that drives individuals and corporations. In unison, the technological forces can tear human lives apart for the passive or provide a cohesive set of opportunities for the knowledgeable to lead and reap the rewards in the evolved knowledge society. The book also provides in-depth coverage of the functions embedded in modern processors and intelligent communication networks. It focuses on the convergence of the design of modern processor technologies with the switching and routing methodologies of global intelligent networks. Most of the concepts that are generic to the design of terra-flop parallel processors and the terra-bit fiber-optic networks are presented. This book also highlights recent developments in computer and processor technologies into the microscopic and macroscopic medical functions in hospitals and medical centers.
    • Risk Management Framework

      • 1st Edition
      • July 3, 2013
      • James Broad
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 5 8
      • eBook
        9 7 8 0 1 2 4 0 4 7 2 3 5
      The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization.
    • Product Manufacturing and Cost Estimating using CAD/CAE

      • 1st Edition
      • July 1, 2013
      • Kuang-Hua Chang
      • English
      • Hardback
        9 7 8 0 1 2 4 0 1 7 4 5 0
      • eBook
        9 7 8 0 1 2 4 0 4 6 0 0 9
      This is the second part of a four part series that covers discussion of computer design tools throughout the design process. Through this book, the reader will... ...understand basic design principles and all digital design paradigms. ...understand CAD/CAE/CAM tools available for various design related tasks. ...understand how to put an integrated system together to conduct All Digital Design (ADD). ...understand industrial practices in employing ADD and tools for product development.
    • High Performance Deformable Image Registration Algorithms for Manycore Processors

      • 1st Edition
      • June 28, 2013
      • James Shackleford + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 7 4 1 6
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 0 2
      High Performance Deformable Image Registration Algorithms for Manycore Processors develops highly data-parallel image registration algorithms suitable for use on modern multi-core architectures, including graphics processing units (GPUs). Focusing on deformable registration, we show how to develop data-parallel versions of the registration algorithm suitable for execution on the GPU. Image registration is the process of aligning two or more images into a common coordinate frame and is a fundamental step to be able to compare or fuse data obtained from different sensor measurements. Extracting useful information from 2D/3D data is essential to realizing key technologies underlying our daily lives. Examples include autonomous vehicles and humanoid robots that can recognize and manipulate objects in cluttered environments using stereo vision and laser sensing and medical imaging to localize and diagnose tumors in internal organs using data captured by CT/MRI scans.
    • Professional Penetration Testing

      • 2nd Edition
      • June 27, 2013
      • Thomas Wilhelm
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 3 4
      • eBook
        9 7 8 0 1 2 4 0 4 6 1 8 4
      Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web.