Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • The Plugged-In Professor

      • 1st Edition
      • May 15, 2013
      • Sharmila Ferris + 1 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 9 4 4
      • eBook
        9 7 8 1 7 8 0 6 3 3 4 2 8
      New technologies are transforming the way students work. The Plugged in Professor provides a timely and exceptional resource for using social media and other new technologies to help college students meet both general and discipline-specific objectives. The title covers techniques built around well-known social networking technologies, as well as other emerging technologies such as mobile phone and tablet apps. With a practical focus and reader-friendly format, this book shows educators how to apply techniques in each technology, and includes clear student learning objectives, step-by-step directions, observations and advice, and supplemental readings and resources. Twenty-five chapters by leading contributors cover key aspects of new technologies in education, in four parts: Writing, research and information fluency; Communication and collaboration; Critical thinking and creativity; and Integrative learning.
    • The Wireshark Field Guide

      • 1st Edition
      • May 14, 2013
      • Robert Shimonski
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 4 1 3 6
      • eBook
        9 7 8 0 1 2 4 1 0 4 9 6 9
      The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic. Readers will learn the fundamentals of packet capture and inspection, the use of color codes and filters, deep analysis, including probes and taps, and much more. The Wireshark Field Guide is an indispensable companion for network technicians, operators, and engineers.
    • Implementing Analytics

      • 1st Edition
      • May 6, 2013
      • Nauman Sheikh
      • English
      • Paperback
        9 7 8 0 1 2 4 0 1 6 9 6 5
      • eBook
        9 7 8 0 1 2 4 0 1 6 8 1 1
      Implementing Analytics demystifies the concept, technology and application of analytics and breaks its implementation down to repeatable and manageable steps, making it possible for widespread adoption across all functions of an organization. Implementing Analytics simplifies and helps democratize a very specialized discipline to foster business efficiency and innovation without investing in multi-million dollar technology and manpower. A technology agnostic methodology that breaks down complex tasks like model design and tuning and emphasizes business decisions rather than the technology behind analytics.
    • Data Warehousing in the Age of Big Data

      • 1st Edition
      • May 2, 2013
      • Krish Krishnan
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 8 9 1 0
      • eBook
        9 7 8 0 1 2 4 0 5 9 2 0 7
      Data Warehousing in the Age of the Big Data will help you and your organization make the most of unstructured data with your existing data warehouse. As Big Data continues to revolutionize how we use data, it doesn't have to create more confusion. Expert author Krish Krishnan helps you make sense of how Big Data fits into the world of data warehousing in clear and concise detail. The book is presented in three distinct parts. Part 1 discusses Big Data, its technologies and use cases from early adopters. Part 2 addresses data warehousing, its shortcomings, and new architecture options, workloads, and integration techniques for Big Data and the data warehouse. Part 3 deals with data governance, data visualization, information life-cycle management, data scientists, and implementing a Big Data–ready data warehouse. Extensive appendixes include case studies from vendor implementations and a special segment on how we can build a healthcare information factory. Ultimately, this book will help you navigate through the complex layers of Big Data and data warehousing while providing you information on how to effectively think about using all these technologies and the architectures to design the next-generation data warehouse.
    • Software Engineering

      • 1st Edition
      • April 30, 2013
      • Richard F Schmidt
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 7 6 8 3
      • eBook
        9 7 8 0 1 2 4 0 7 8 7 8 9
      Software Engineering: Architecture-driven Software Development is the first comprehensive guide to the underlying skills embodied in the IEEE's Software Engineering Body of Knowledge (SWEBOK) standard. Standards expert Richard Schmidt explains the traditional software engineering practices recognized for developing projects for government or corporate systems. Software engineering education often lacks standardization, with many institutions focusing on implementation rather than design as it impacts product architecture. Many graduates join the workforce with incomplete skills, leading to software projects that either fail outright or run woefully over budget and behind schedule. Additionally, software engineers need to understand system engineering and architecture—the hardware and peripherals their programs will run on. This issue will only grow in importance as more programs leverage parallel computing, requiring an understanding of the parallel capabilities of processors and hardware. This book gives both software developers and system engineers key insights into how their skillsets support and complement each other. With a focus on these key knowledge areas, Software Engineering offers a set of best practices that can be applied to any industry or domain involved in developing software products.
    • Understanding Augmented Reality

      • 1st Edition
      • April 26, 2013
      • Alan B. Craig
      • English
      • Paperback
        9 7 8 0 2 4 0 8 2 4 0 8 6
      • eBook
        9 7 8 0 2 4 0 8 2 4 1 0 9
      Understanding Augmented Reality addresses the elements that are required to create augmented reality experiences. The technology that supports augmented reality will come and go, evolve and change. The underlying principles for creating exciting, useful augmented reality experiences are timeless. Augmented reality designed from a purely technological perspective will lead to an AR experience that is novel and fun for one-time consumption - but is no more than a toy. Imagine a filmmaking book that discussed cameras and special effects software, but ignored cinematography and storytelling! In order to create compelling augmented reality experiences that stand the test of time and cause the participant in the AR experience to focus on the content of the experience - rather than the technology - one must consider how to maximally exploit the affordances of the medium. Understanding Augmented Reality addresses core conceptual issues regarding the medium of augmented reality as well as the technology required to support compelling augmented reality. By addressing AR as a medium at the conceptual level in addition to the technological level, the reader will learn to conceive of AR applications that are not limited by today’s technology. At the same time, ample examples are provided that show what is possible with current technology.
    • Simple Steps to Data Encryption

      • 1st Edition
      • April 25, 2013
      • Peter Loshin
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 4 8 3 8
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 2 6
      Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHO... having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools and techniques
    • Windows Server 2012 Security from End to Edge and Beyond

      • 1st Edition
      • April 18, 2013
      • Yuri Diogenes + 2 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 8 0 4
      • eBook
        9 7 8 1 5 9 7 4 9 9 8 1 1
      Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors’ blog http://blogs.technet... Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter.
    • Mastering Cloud Computing

      • 1st Edition
      • April 5, 2013
      • Rajkumar Buyya + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 4 5 4 8
      • eBook
        9 7 8 0 1 2 4 0 9 5 3 9 7
      Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won’t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout.
    • Software Engineering for Embedded Systems

      • 1st Edition
      • April 1, 2013
      • Robert Oshana
      • English
      • eBook
        9 7 8 0 1 2 4 1 5 9 4 1 9
      This Expert Guide gives you the techniques and technologies in software engineering to optimally design and implement your embedded system. Written by experts with a solutions focus, this encyclopedic reference gives you an indispensable aid to tackling the day-to-day problems when using software engineering methods to develop your embedded systems. With this book you will learn: The principles of good architecture for an embedded system Design practices to help make your embedded project successful Details on principles that are often a part of embedded systems, including digital signal processing, safety-critical principles, and development processes Techniques for setting up a performance engineering strategy for your embedded system software How to develop user interfaces for embedded systems Strategies for testing and deploying your embedded system, and ensuring quality development processes Practical techniques for optimizing embedded software for performance, memory, and power Advanced guidelines for developing multicore software for embedded systems How to develop embedded software for networking, storage, and automotive segments How to manage the embedded development process Includes contributions from: Frank Schirrmeister, Shelly Gretlein, Bruce Douglass, Erich Styger, Gary Stringham, Jean Labrosse, Jim Trudeau, Mike Brogioli, Mark Pitchford, Catalin Dan Udma, Markus Levy, Pete Wilson, Whit Waldo, Inga Harris, Xinxin Yang, Srinivasa Addepalli, Andrew McKay, Mark Kraeling and Robert Oshana.