Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Managing Information Security

    • 2nd Edition
    • John Vacca
    • English
    Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
  • FISMA Compliance Handbook

    Second Edition
    • 1st Edition
    • Laura P. Taylor
    • English
    This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
  • X-Ways Forensics Practitioner’s Guide

    • 1st Edition
    • Brett Shavers + 1 more
    • English
    The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documen... features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.
  • Computer-Aided Vaccine Design

    • 1st Edition
    • Joo Chuan Tong + 1 more
    • English
    Computational pre-screening of antigens is now routinely applied to the discovery of vaccine candidates.Computer-... vaccine design is a comprehensive introduction to this exciting field of study. The book is intended to be a textbook for researchers and for courses in bioinformatics, as well as a laboratory reference guide. It is written mainly for biologists who want to understand the current methods of computer-aided vaccine design. The contents are designed to help biologists appreciate the underlying concepts and algorithms used, as well as limitations of the methods and strategies for their use. Chapters include: MHC and T cell responses; Immunoglobulins and B cell responses; Scientific publications and databases; Database design; Computational T cell vaccine design; Computational B cell vaccine design; infectious disease informatics; Vaccine safety and quality assessments; and Vaccine adjuvant informatics.
  • Security Risks in Social Media Technologies

    Safe Practices in Public Service Applications
    • 1st Edition
    • Alan Oxley
    • English
    Security measures can be used by management, IT staff, and users in participatory/collab... service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collab... pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collab... in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
  • Practical Anonymity

    Hiding in Plain Sight Online
    • 1st Edition
    • Peter Loshin
    • English
    For those with legitimate reason to use the Internet anonymously--diploma... military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
  • System Parameter Identification

    Information Criteria and Algorithms
    • 1st Edition
    • Badong Chen + 3 more
    • English
    Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing, investigating system identification from an information theory point of view. The book is divided into six chapters, which cover the information needed to understand the theory and application of system parameter identification. The authors’ research provides a base for the book, but it incorporates the results from the latest international research publications.
  • The Lambda Calculus

    Its Syntax and Semantics
    • 2nd Edition
    • Volume 103
    • H.P. Barendregt
    • English
    The revised edition contains a new chapter which provides an elegant description of the semantics. The various classes of lambda calculus models are described in a uniform manner. Some didactical improvements have been made to this edition. An example of a simple model is given and then the general theory (of categorical models) is developed. Indications are given of those parts of the book which can be used to form a coherent course.
  • Blogs and Tweets, Texting and Friending

    Social Media and Online Professionalism in Health Care
    • 1st Edition
    • Sandra M. DeJong
    • English
    Blogs and Tweets, Texting and Friending: Social Media and Online Professionalism in Health Care summarizes the most common mistakes — and their legal and ethical ramifications —made in social media by busy health care professionals. It gives best practices for using social media while maintaining online professionalism. The book goes on to identify categories of caution, from confidentiality of patient information and maintaining the professional's privacy to general netiquette in tweeting, texting, blogging, and friending. And it guides you in setting up a faculty page (or choosing not to) and managing your online footprint. The connected generation regularly uses social media, including health care professionals, but what happens when a patient wants to friend you? Or when you've already posted a rant on a patient that gets viewed by others? What information may already be floating on the Internet that a patient may find about you in a Google search and that might impact your therapeutic relationship? Whether you are new to social media or an expert user in your private life (but haven't thought about what this means for you professionally), this book is for you. It’s the "when" and "how" to use social media effectively while maintaining online professionalism.
  • Risk Management Framework

    A Lab-Based Approach to Securing Information Systems
    • 1st Edition
    • James Broad
    • English
    The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization.