Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Intelligent Systems for Security Informatics

      • 1st Edition
      • January 28, 2013
      • Christopher C Yang + 3 more
      • English
      • Hardback
        9 7 8 0 1 2 4 0 4 7 0 2 0
      • Paperback
        9 7 8 0 3 2 3 2 8 2 5 5 0
      • eBook
        9 7 8 0 1 2 4 0 5 9 0 2 3
      The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years.
    • Simple Steps to Data Encryption

      • 1st Edition
      • April 25, 2013
      • Peter Loshin
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 4 8 3 8
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 2 6
      Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHO... having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools and techniques
    • Intel Xeon Phi Coprocessor High Performance Programming

      • 1st Edition
      • February 11, 2013
      • James Jeffers + 1 more
      • English
      • eBook
        9 7 8 0 1 2 4 1 0 4 9 4 5
      Authors Jim Jeffers and James Reinders spent two years helping educate customers about the prototype and pre-production hardware before Intel introduced the first Intel Xeon Phi coprocessor. They have distilled their own experiences coupled with insights from many expert customers, Intel Field Engineers, Application Engineers and Technical Consulting Engineers, to create this authoritative first book on the essentials of programming for this new architecture and these new products. This book is useful even before you ever touch a system with an Intel Xeon Phi coprocessor. To ensure that your applications run at maximum efficiency, the authors emphasize key techniques for programming any modern parallel computing system whether based on Intel Xeon processors, Intel Xeon Phi coprocessors, or other high performance microprocessors. Applying these techniques will generally increase your program performance on any system, and better prepare you for Intel Xeon Phi coprocessors and the Intel MIC architecture.
    • Advances in Intelligent Vehicles

      • 1st Edition
      • December 2, 2013
      • Yaobin Chen + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 9 7 1 9 9 9
      • eBook
        9 7 8 0 1 2 3 9 7 3 2 7 6
      Advances in Intelligent Vehicles presents recent advances in intelligent vehicle technologies that enhance the safety, reliability, and performance of vehicles and vehicular networks and systems. This book provides readers with up-to-date research results and cutting-edge technologies in the area of intelligent vehicles and transportation systems. Topics covered include virtual and staged testing scenarios, collision avoidance, human factors, and modeling techniques. The Series in Intelligent Systems publishes titles that cover state-of-the-art knowledge and the latest advances in research and development in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.
    • Joe Celko’s Complete Guide to NoSQL

      • 1st Edition
      • October 7, 2013
      • Joe Celko
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 1 9 2 6
      • eBook
        9 7 8 0 1 2 4 0 7 2 2 0 6
      Joe Celko's Complete Guide to NoSQL provides a complete overview of non-relational technologies so that you can become more nimble to meet the needs of your organization. As data continues to explode and grow more complex, SQL is becoming less useful for querying data and extracting meaning. In this new world of bigger and faster data, you will need to leverage non-relational technologies to get the most out of the information you have. Learn where, when, and why the benefits of NoSQL outweigh those of SQL with Joe Celko's Complete Guide to NoSQL. This book covers three areas that make today's new data different from the data of the past: velocity, volume and variety. When information is changing faster than you can collect and query it, it simply cannot be treated the same as static data. Celko will help you understand velocity, to equip you with the tools to drink from a fire hose. Old storage and access models do not work for big data. Celko will help you understand volume, as well as different ways to store and access data such as petabytes and exabytes. Not all data can fit into a relational model, including genetic data, semantic data, and data generated by social networks. Celko will help you understand variety, as well as the alternative storage, query, and management frameworks needed by certain kinds of data.
    • Managing Data in Motion

      • 1st Edition
      • February 26, 2013
      • April Reeve
      • English
      • Paperback
        9 7 8 0 1 2 3 9 7 1 6 7 8
      • eBook
        9 7 8 0 1 2 3 9 7 7 9 1 5
      Managing Data in Motion describes techniques that have been developed for significantly reducing the complexity of managing system interfaces and enabling scalable architectures. Author April Reeve brings over two decades of experience to present a vendor-neutral approach to moving data between computing environments and systems. Readers will learn the techniques, technologies, and best practices for managing the passage of data between computer systems and integrating disparate data together in an enterprise environment. The average enterprise's computing environment is comprised of hundreds to thousands computer systems that have been built, purchased, and acquired over time. The data from these various systems needs to be integrated for reporting and analysis, shared for business transaction processing, and converted from one format to another when old systems are replaced and new systems are acquired. The management of the "data in motion" in organizations is rapidly becoming one of the biggest concerns for business and IT management. Data warehousing and conversion, real-time data integration, and cloud and "big data" applications are just a few of the challenges facing organizations and businesses today. Managing Data in Motion tackles these and other topics in a style easily understood by business and IT managers as well as programmers and architects.
    • Mastering Cloud Computing

      • 1st Edition
      • April 5, 2013
      • Rajkumar Buyya + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 4 5 4 8
      • eBook
        9 7 8 0 1 2 4 0 9 5 3 9 7
      Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won’t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout.
    • The Basics of IT Audit

      • 1st Edition
      • October 31, 2013
      • Stephen D. Gantz
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 1 5 9 6
      • eBook
        9 7 8 0 1 2 4 1 7 1 7 6 3
      The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.
    • Hacking with Kali

      • 1st Edition
      • December 4, 2013
      • James Broad + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 7 4 9 2
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 3 3
      Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
    • Formal Description Techniques, IV

      • 1st Edition
      • Volume 2
      • October 22, 2013
      • K.R. Parker + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 8 9 4 0 2 1
      • eBook
        9 7 8 1 4 8 3 2 9 3 3 3 2
      Formality is becoming accepted as essential in the development of complex systems such as multi-layer communications protocols and distributed systems. Formality is mandatory for mathematical verification, a procedure being imposed on safety-critical system development. Standard documents are also becoming increasingly formalised in order to capture notions precisely and unambiguously. This FORTE '91 proceedings volume has focussed on the standardised languages SDL, Estelle and LOTOS while, as with earlier conferences, remaining open to other notations and techniques, thus encouraging the continuous evolution of formal techniques. This useful volume contains 29 submitted papers, three invited papers, four industry reports, and four tool reports organised to correspond with the conference sessions.