Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Intelligent Networks

    Recent Approaches and Applications in Medical Systems
    • 1st Edition
    • Syed V. Ahamed
    • English
    This textbook offers an insightful study of the intelligent Internet-driven revolutionary and fundamental forces at work in society. Readers will have access to tools and techniques to mentor and monitor these forces rather than be driven by changes in Internet technology and flow of money. These submerged social and human forces form a powerful synergistic foursome web of (a) processor technology, (b) evolving wireless networks of the next generation, (c) the intelligent Internet, and (d) the motivation that drives individuals and corporations. In unison, the technological forces can tear human lives apart for the passive or provide a cohesive set of opportunities for the knowledgeable to lead and reap the rewards in the evolved knowledge society. The book also provides in-depth coverage of the functions embedded in modern processors and intelligent communication networks. It focuses on the convergence of the design of modern processor technologies with the switching and routing methodologies of global intelligent networks. Most of the concepts that are generic to the design of terra-flop parallel processors and the terra-bit fiber-optic networks are presented. This book also highlights recent developments in computer and processor technologies into the microscopic and macroscopic medical functions in hospitals and medical centers.
  • Product Manufacturing and Cost Estimating using CAD/CAE

    The Computer Aided Engineering Design Series
    • 1st Edition
    • Kuang-Hua Chang
    • English
    This is the second part of a four part series that covers discussion of computer design tools throughout the design process. Through this book, the reader will... ...understand basic design principles and all digital design paradigms. ...understand CAD/CAE/CAM tools available for various design related tasks. ...understand how to put an integrated system together to conduct All Digital Design (ADD). ...understand industrial practices in employing ADD and tools for product development.
  • High Performance Deformable Image Registration Algorithms for Manycore Processors

    • 1st Edition
    • James Shackleford + 2 more
    • English
    High Performance Deformable Image Registration Algorithms for Manycore Processors develops highly data-parallel image registration algorithms suitable for use on modern multi-core architectures, including graphics processing units (GPUs). Focusing on deformable registration, we show how to develop data-parallel versions of the registration algorithm suitable for execution on the GPU. Image registration is the process of aligning two or more images into a common coordinate frame and is a fundamental step to be able to compare or fuse data obtained from different sensor measurements. Extracting useful information from 2D/3D data is essential to realizing key technologies underlying our daily lives. Examples include autonomous vehicles and humanoid robots that can recognize and manipulate objects in cluttered environments using stereo vision and laser sensing and medical imaging to localize and diagnose tumors in internal organs using data captured by CT/MRI scans.
  • Professional Penetration Testing

    Creating and Learning in a Hacking Lab
    • 2nd Edition
    • Thomas Wilhelm
    • English
    Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web.
  • The Basics of Hacking and Penetration Testing

    Ethical Hacking and Penetration Testing Made Easy
    • 2nd Edition
    • Patrick Engebretson
    • English
    The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
  • Practical Web Analytics for User Experience

    How Analytics Can Help You Understand Your Users
    • 1st Edition
    • Michael Beasley
    • English
    Practical Web Analytics for User Experience teaches you how to use web analytics to help answer the complicated questions facing UX professionals. Within this book, you'll find a quantitative approach for measuring a website's effectiveness and the methods for posing and answering specific questions about how users navigate a website. The book is organized according to the concerns UX practitioners face. Chapters are devoted to traffic, clickpath, and content use analysis, measuring the effectiveness of design changes, including A/B testing, building user profiles based on search habits, supporting usability test findings with reporting, and more. This is the must-have resource you need to start capitalizing on web analytics and analyze websites effectively.
  • The Basics of Web Hacking

    Tools and Techniques to Attack the Web
    • 1st Edition
    • Josh Pauli
    • English
    The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities. The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user. With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.
  • Matlab

    A Practical Introduction to Programming and Problem Solving
    • 3rd Edition
    • Dorothy C. Attaway
    • English
    MatLab, Third Edition is the only book that gives a full introduction to programming in MATLAB combined with an explanation of the software’s powerful functions, enabling engineers to fully exploit its extensive capabilities in solving engineering problems. The book provides a systematic, step-by-step approach, building on concepts throughout the text, facilitating easier learning. Sections on common pitfalls and programming guidelines direct students towards best practice. The book is organized into 14 chapters, starting with programming concepts such as variables, assignments, input/output, and selection statements; moves onto loops; and then solves problems using both the ‘programming concept’ and the ‘power of MATLAB’ side-by-side. In-depth coverage is given to input/output, a topic that is fundamental to many engineering applications. Vectorized Code has been made into its own chapter, in order to emphasize the importance of using MATLAB efficiently. There are also expanded examples on low-level file input functions, Graphical User Interfaces, and use of MATLAB Version R2012b; modified and new end-of-chapter exercises; improved labeling of plots; and improved standards for variable names and documentation. This book will be a valuable resource for engineers learning to program and model in MATLAB, as well as for undergraduates in engineering and science taking a course that uses (or recommends) MATLAB.
  • UI is Communication

    How to Design Intuitive, User Centered Interfaces by Focusing on Effective Communication
    • 1st Edition
    • Everett N McKay
    • English
    User interface design is a challenging, multi-disciplinary activity that requires understanding a wide range of concepts and techniques that are often subjective and even conflicting. Imagine how much it would help if there were a single perspective that you could use to simplify these complex issues down to a small set of objective principles. In UI is Communication, Everett McKay explains how to design intuitive user interfaces by focusing on effective human communication. A user interface is ultimately a conversation between users and technology. Well-designed user interfaces use the language of UI to communicate to users efficiently and naturally. They also recognize that there is an emotional human being at the other end of the interaction, so good user interfaces strive to make an emotional connection. Applying what you learn from UI is Communication will remove much of the mystic, subjectiveness, and complexity from user interface design, and help you make better design decisions with confidence. It’s the perfect introduction to user interface design.
  • Cloud Computing

    Theory and Practice
    • 1st Edition
    • Dan C. Marinescu
    • English
    Cloud Computing: Theory and Practice provides students and IT professionals with an in-depth analysis of the cloud from the ground up. Beginning with a discussion of parallel computing and architectures and distributed systems, the book turns to contemporary cloud infrastructures, how they are being deployed at leading companies such as Amazon, Google and Apple, and how they can be applied in fields such as healthcare, banking and science. The volume also examines how to successfully deploy a cloud application across the enterprise using virtualization, resource management and the right amount of networking support, including content delivery networks and storage area networks. Developers will find a complete introduction to application development provided on a variety of platforms.