Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • CUDA Fortran for Scientists and Engineers

    Best Practices for Efficient CUDA Fortran Programming
    • 1st Edition
    • September 11, 2013
    • Gregory Ruetsch + 1 more
    • English
    CUDA Fortran for Scientists and Engineers shows how high-performance application developers can leverage the power of GPUs using Fortran, the familiar language of scientific computing and supercomputer performance benchmarking. The authors presume no prior parallel computing experience, and cover the basics along with best practices for efficient GPU computing using CUDA Fortran. To help you add CUDA Fortran to existing Fortran codes, the book explains how to understand the target GPU architecture, identify computationally intensive parts of the code, and modify the code to manage the data and parallelism and optimize performance. All of this is done in Fortran, without having to rewrite in another language. Each concept is illustrated with actual examples so you can immediately evaluate the performance of your code in comparison.
  • The Basics of Cloud Computing

    Understanding the Fundamentals of Cloud Computing in Theory and Practice
    • 1st Edition
    • September 3, 2013
    • Derrick Rountree + 1 more
    • English
    As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn’t a part of their day-to-day responsibility. Authors Derrick Rountree and Ileana Castrillo explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud. The book will be presented as an introduction to the cloud, and reference will be made in the introduction to other Syngress cloud titles for readers who want to delve more deeply into the topic. This book gives readers a conceptual understanding and a framework for moving forward with cloud computing, as opposed to competing and related titles, which seek to be comprehensive guides to the cloud.
  • Mobile User Experience

    Patterns to Make Sense of it All
    • 1st Edition
    • September 3, 2013
    • Adrian Mendoza
    • English
    This is your must-have resource to the theoretical and practical concepts of mobile UX. You’ll learn about the concepts and how to apply them in real-world scenarios. Throughout the book, the author provides you with 10 of the most commonly used archetypes in the UX arena to help illustrate what mobile UX is and how you can master it as quickly as possible. First, you’ll start off learning how to communicate mobile UX flows visually. From there, you’ll learn about applying and using 10 unique user experience patterns or archetypes for mobile. Finally, you’ll understand how to prototype and use these patterns to create websites and apps.Whether you’re a UX professional looking to master mobility or a designer looking to incorporate the best UX practices into your website, after reading this book, you’ll be better equipped to maneuver this emerging specialty.
  • Total Information Risk Management

    Maximizing the Value of Data and Information Assets
    • 1st Edition
    • August 30, 2013
    • Alexander Borek + 3 more
    • English
    How well does your organization manage the risks associated with information quality? Managing information risk is becoming a top priority on the organizational agenda. The increasing sophistication of IT capabilities along with the constantly changing dynamics of global competition are forcing businesses to make use of their information more effectively. Information is becoming a core resource and asset for all organizations; however, it also brings many potential risks to an organization, from strategic, operational, financial, compliance, and environmental to societal. If you continue to struggle to understand and measure how information and its quality affects your business, this book is for you. This reference is in direct response to the new challenges that all managers have to face. Our process helps your organization to understand the "pain points" regarding poor data and information quality so you can concentrate on problems that have a high impact on core business objectives. This book provides you with all the fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, and written in a language that is clear and easy to understand for non-technical managers.
  • Practical File System Design

    • 1st Edition
    • August 29, 2013
    • Dominic Giampaolo
    • English
    This is the new guide to the design and implementation of file systems in general, and the Be File System (BFS) in particular. This book covers all topics related to file systems, going into considerable depth where traditional operating systems books often stop. Advanced topics are covered in detail such as journaling, attributes, indexing and query processing. Built from scratch as a modern 64 bit, journaled file system, BFS is the primary file system for the Be Operating System (BeOS), which was designed for high performance multimedia applications. You do not have to be a kernel architect or file system engineer to use Practical File System Design. Neither do you have to be a BeOS developer or user. Only basic knowledge of C is required. If you have ever wondered about how file systems work, how to implement one, or want to learn more about the Be File System, this book is all you will need.
  • Network and System Security

    • 2nd Edition
    • August 26, 2013
    • John Vacca
    • English
    Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
  • Big Data Analytics

    From Strategic Planning to Enterprise Integration with Tools, Techniques, NoSQL, and Graph
    • 1st Edition
    • August 23, 2013
    • David Loshin
    • English
    Big Data Analytics will assist managers in providing an overview of the drivers for introducing big data technology into the organization and for understanding the types of business problems best suited to big data analytics solutions, understanding the value drivers and benefits, strategic planning, developing a pilot, and eventually planning to integrate back into production within the enterprise.
  • Credible Checklists and Quality Questionnaires

    A User-Centered Design Method
    • 1st Edition
    • August 22, 2013
    • Chauncey Wilson
    • English
    Credible Checklists and Quality Questionnaires starts off with an examination of the critical but commonly overlooked checklist method. In the second chapter, questionnaires and surveys are discussed. Asking questions sounds simple, but the hard truth is that asking questions (and designing questionnaires) is a difficult task. This chapter discusses being mindful of the choice of words, order of questions and how early questions influence later questions, answer scales and how they impact the user response, questionnaire design, and much more. The final chapter provides examples of some common questionnaires (both free and fee-based) for assessing the usability of products. After reading this book, readers will be able to use these user design tools with greater confidence and certainty.
  • Cyber Security and IT Infrastructure Protection

    • 1st Edition
    • August 22, 2013
    • John Vacca
    • English
    This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements:• Checklists throughout each chapter to gauge understanding• Chapter Review Questions/Exercises and Case Studies• Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
  • Managing Information Security

    • 2nd Edition
    • August 21, 2013
    • John Vacca
    • English
    Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.