Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Intelligent Networks

      • 1st Edition
      • July 3, 2013
      • Syed V. Ahamed
      • English
      • Hardback
        9 7 8 0 1 2 4 1 6 6 3 0 1
      • Paperback
        9 7 8 0 1 2 8 1 0 2 8 0 0
      • eBook
        9 7 8 0 1 2 4 1 6 6 7 0 7
      This textbook offers an insightful study of the intelligent Internet-driven revolutionary and fundamental forces at work in society. Readers will have access to tools and techniques to mentor and monitor these forces rather than be driven by changes in Internet technology and flow of money. These submerged social and human forces form a powerful synergistic foursome web of (a) processor technology, (b) evolving wireless networks of the next generation, (c) the intelligent Internet, and (d) the motivation that drives individuals and corporations. In unison, the technological forces can tear human lives apart for the passive or provide a cohesive set of opportunities for the knowledgeable to lead and reap the rewards in the evolved knowledge society. The book also provides in-depth coverage of the functions embedded in modern processors and intelligent communication networks. It focuses on the convergence of the design of modern processor technologies with the switching and routing methodologies of global intelligent networks. Most of the concepts that are generic to the design of terra-flop parallel processors and the terra-bit fiber-optic networks are presented. This book also highlights recent developments in computer and processor technologies into the microscopic and macroscopic medical functions in hospitals and medical centers.
    • Understanding Augmented Reality

      • 1st Edition
      • April 26, 2013
      • Alan B. Craig
      • English
      • Paperback
        9 7 8 0 2 4 0 8 2 4 0 8 6
      • eBook
        9 7 8 0 2 4 0 8 2 4 1 0 9
      Understanding Augmented Reality addresses the elements that are required to create augmented reality experiences. The technology that supports augmented reality will come and go, evolve and change. The underlying principles for creating exciting, useful augmented reality experiences are timeless. Augmented reality designed from a purely technological perspective will lead to an AR experience that is novel and fun for one-time consumption - but is no more than a toy. Imagine a filmmaking book that discussed cameras and special effects software, but ignored cinematography and storytelling! In order to create compelling augmented reality experiences that stand the test of time and cause the participant in the AR experience to focus on the content of the experience - rather than the technology - one must consider how to maximally exploit the affordances of the medium. Understanding Augmented Reality addresses core conceptual issues regarding the medium of augmented reality as well as the technology required to support compelling augmented reality. By addressing AR as a medium at the conceptual level in addition to the technological level, the reader will learn to conceive of AR applications that are not limited by today’s technology. At the same time, ample examples are provided that show what is possible with current technology.
    • Security Risks in Social Media Technologies

      • 1st Edition
      • July 31, 2013
      • Alan Oxley
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 1 4 9
      • eBook
        9 7 8 1 7 8 0 6 3 3 8 0 0
      Security measures can be used by management, IT staff, and users in participatory/collab... service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collab... pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collab... in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
    • The Digital Crown

      • 1st Edition
      • September 17, 2013
      • Ahava Leibtag
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 6 7 4 7
      • eBook
        9 7 8 0 1 2 4 0 7 6 5 7 0
      In 1997, Bill Gates famously said "Content is king." Since then, the digital marketing world has been scrambling to fulfill this promise, as we finally shift our focus to what consumers really want from our brands: a conversation.The Digital Crown walks you through the essentials of crafting great content: the fundamentals of branding, messaging, business goal alignment, and creating portable, mobile content that is future-ready. Systems create freedom, and within this book you’ll learn the seven critical rules to align your internal and external content processes, including putting your audience first, involving stakeholders early and often, and creating multidisciplinary content teams. Complete with case studies and experience drawn directly from global content projects, you are invited to observe the inner workings of successful content engagements. You’ll learn how to juggle the demands of IT, design, and content teams, while acquiring all the practical tools you need to devise a roadmap for connecting and engaging with your customers. This is your next step on the journey to creating and managing winning content to engage your audience and keep them coming back for more.
    • FISMA Compliance Handbook

      • 1st Edition
      • August 20, 2013
      • Laura P. Taylor
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 8 7 1 2
      • eBook
        9 7 8 0 1 2 4 0 5 9 1 5 3
      This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
    • User Interface Inspection Methods

      • 1st Edition
      • November 15, 2013
      • Chauncey Wilson
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 3 9 1 7
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 8 8
      User Interface Inspection Methods succinctly covers five inspection methods: heuristic evaluation, perspective-based user interface inspection, cognitive walkthrough, pluralistic walkthrough, and formal usability inspections. Heuristic evaluation is perhaps the best-known inspection method, requiring a group of evaluators to review a product against a set of general principles. The perspective-based user interface inspection is based on the principle that different perspectives will find different problems in a user interface. In the related persona-based inspection, colleagues assume the roles of personas and review the product based on the needs, background, tasks, and pain points of the different personas. The cognitive walkthrough focuses on ease of learning. Most of the inspection methods do not require users; the main exception is the pluralistic walkthrough, in which a user is invited to provide feedback while members of a product team listen, observe the user, and ask questions. After reading this book, you will be able to use these UI inspection methods with confidence and certainty.
    • Data Warehousing in the Age of Big Data

      • 1st Edition
      • May 2, 2013
      • Krish Krishnan
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 8 9 1 0
      • eBook
        9 7 8 0 1 2 4 0 5 9 2 0 7
      Data Warehousing in the Age of the Big Data will help you and your organization make the most of unstructured data with your existing data warehouse. As Big Data continues to revolutionize how we use data, it doesn't have to create more confusion. Expert author Krish Krishnan helps you make sense of how Big Data fits into the world of data warehousing in clear and concise detail. The book is presented in three distinct parts. Part 1 discusses Big Data, its technologies and use cases from early adopters. Part 2 addresses data warehousing, its shortcomings, and new architecture options, workloads, and integration techniques for Big Data and the data warehouse. Part 3 deals with data governance, data visualization, information life-cycle management, data scientists, and implementing a Big Data–ready data warehouse. Extensive appendixes include case studies from vendor implementations and a special segment on how we can build a healthcare information factory. Ultimately, this book will help you navigate through the complex layers of Big Data and data warehousing while providing you information on how to effectively think about using all these technologies and the architectures to design the next-generation data warehouse.
    • The Basics of Cloud Computing

      • 1st Edition
      • September 3, 2013
      • Derrick Rountree + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 9 3 2 0
      • eBook
        9 7 8 0 1 2 4 0 5 5 2 1 6
      As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn’t a part of their day-to-day responsibility. Authors Derrick Rountree and Ileana Castrillo explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud. The book will be presented as an introduction to the cloud, and reference will be made in the introduction to other Syngress cloud titles for readers who want to delve more deeply into the topic. This book gives readers a conceptual understanding and a framework for moving forward with cloud computing, as opposed to competing and related titles, which seek to be comprehensive guides to the cloud.
    • Brain Browser

      • 1st Edition
      • October 22, 2013
      • Floyd E. Bloom
      • English
      • eBook
        9 7 8 1 4 8 3 2 8 4 9 3 4
      Brain Browser is designed to assist researchers as well as beginning and advanced neuroscience students in their efforts to organize, analyze, and contribute to the growing detailed knowledge of the brain. Brain Browser serves as an electronic notebook for neuroanatomy and offers numerous educational and research applications.For the Student:Learn the organization and structure of the rat brainOrganize your knowledge of brain function and structureStore neuroanatomical references and terms in an efficient mannerFor the Advanced Neuroscientist:Add your own experimental results and build a personal databaseOrganize and recall multiple items of complexly interrelated dataDevelop a more efficient and organized way to write papers and do researchBrain Browser consists of four main Hypertext stacks:Learner introduces the beginner to rat brain organization and provides elementary coverage of circuits, cells, and neurotransmitters.Ne... presents a computer atlas based on The Rat Brain: In Stereotaxic Coordinates, by George Paxinos and Charles Watson (Academic Press, Second Edition, 1986).Linker is an extensive database of neuronal circuitry (the afferent and efferent connections between brain locations).DataMaker enables users to add or modify templates of the atlas plates with their own data.In addition, the Reference program, containing more than 320 references, links any desired reference to any data point. The Dictionary defines terms used in Brain Browser and allows users to add new entries.The program includes five high-density disks, a user's manual, and a complete tutorial. User support is provided by electronic mail on CompuServe(r). Department site licenses are available, as well as a buyer's frequency plan. Contact the publisher for complete details.Brain Browser(tm) is a trademark of The Scripps Research Institute.PLUS(tm) is a trademark of Spinnaker Software CorporationMicrosoft... Windows(tm) is a trademark of Microsoft Corporation.IBM(r) is a registered trademark of International Business Machines, Inc.CompuServe(r) is a registered trademark of CompuServe, Inc.Macintosh(r) is a registered trademark of Apple Computer Inc.Hypercard(r) is a registered trademark of Apple Computer Inc.Intel(r) is a registered trademark of Intel Corporation.
    • Digital Outcasts

      • 1st Edition
      • March 18, 2013
      • Kel Smith
      • English
      • Paperback
        9 7 8 0 1 2 4 0 4 7 0 5 1
      • eBook
        9 7 8 0 1 2 4 0 4 7 1 3 6
      The blind person who tries to make an online purchase. The young girl who cannot speak due to a cognitive disability. The man confined to his home due to permanent injury. The single mother with a long-term illness who struggles to feed her family.With one in seven people worldwide currently living with a disability, the term "outcast" covers numerous scenarios. Digital outcasts rely on technology for everyday services that many people take for granted. However, poorly designed products risk alienating this important (and growing) population.Through a "grass roots" approach to innovation, digital outcasts are gradually taking action to transform their lives and communities. This emerging trend provides exciting learning opportunities for all of us.Citing real-world case studies from healthcare to social science, this book examines the emerging legal and cultural impact of inclusive design.