Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Visual Usability

      • 1st Edition
      • March 21, 2013
      • Tania Schlatter + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 8 5 3 6 1
      • eBook
        9 7 8 0 1 2 4 0 1 7 1 3 9
      Imagine how much easier creating web and mobile applications would be if you had a practical and concise, hands-on guide to visual design. Visual Usability gets into the nitty-gritty of applying visual design principles to complex application design.You’ll learn how to avoid common mistakes, make informed decisions about application design, and elevate the ordinary. We’ll review three key principles that affect application design – consistency, hierarchy, and personality – and illustrate how to apply tools like typography, color, and layout to digital application design. Whether you’re a UI professional looking to fine-tune your skills, a developer who cares about making applications beautiful and usable, or someone entirely new to the design arena, Visual Usability is your one-stop, practical guide to visual design.
    • Windows 2012 Server Network Security

      • 1st Edition
      • March 19, 2013
      • Derrick Rountree
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 5 8 3
      • eBook
        9 7 8 1 5 9 7 4 9 9 6 5 1
      Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. Windows 2012 Server Network Security provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.
    • Digital Outcasts

      • 1st Edition
      • March 18, 2013
      • Kel Smith
      • English
      • Paperback
        9 7 8 0 1 2 4 0 4 7 0 5 1
      • eBook
        9 7 8 0 1 2 4 0 4 7 1 3 6
      The blind person who tries to make an online purchase. The young girl who cannot speak due to a cognitive disability. The man confined to his home due to permanent injury. The single mother with a long-term illness who struggles to feed her family.With one in seven people worldwide currently living with a disability, the term "outcast" covers numerous scenarios. Digital outcasts rely on technology for everyday services that many people take for granted. However, poorly designed products risk alienating this important (and growing) population.Through a "grass roots" approach to innovation, digital outcasts are gradually taking action to transform their lives and communities. This emerging trend provides exciting learning opportunities for all of us.Citing real-world case studies from healthcare to social science, this book examines the emerging legal and cultural impact of inclusive design.
    • Writing for Interaction

      • 1st Edition
      • February 26, 2013
      • Linda Newman Lior
      • English
      • Paperback
        9 7 8 0 1 2 3 9 4 8 1 3 7
      • eBook
        9 7 8 0 1 2 3 9 4 8 4 4 1
      Writing for Interaction focuses on the art of creating the information experience as it appears within software and web applications, specifically in the form of user interface text. It also provides strategies for ensuring a consistent, positive information experience across a variety of delivery mechanisms, such as online help and social media. Throughout this book, you'll learn simple techniques for writing consistent text with the right tone, how to select content delivery mechanisms, and how straightforward, clear layouts help your customer interact with your application. Divided into five sections, the book completely covers the information experience design process from beginning to end. You'll cover everything from understanding your users and their needs, to creating personas, designing the IX strategy, creating your information, and evaluating the resulting information experience. This is your one-stop reference for information experience!
    • Managing Data in Motion

      • 1st Edition
      • February 26, 2013
      • April Reeve
      • English
      • Paperback
        9 7 8 0 1 2 3 9 7 1 6 7 8
      • eBook
        9 7 8 0 1 2 3 9 7 7 9 1 5
      Managing Data in Motion describes techniques that have been developed for significantly reducing the complexity of managing system interfaces and enabling scalable architectures. Author April Reeve brings over two decades of experience to present a vendor-neutral approach to moving data between computing environments and systems. Readers will learn the techniques, technologies, and best practices for managing the passage of data between computer systems and integrating disparate data together in an enterprise environment. The average enterprise's computing environment is comprised of hundreds to thousands computer systems that have been built, purchased, and acquired over time. The data from these various systems needs to be integrated for reporting and analysis, shared for business transaction processing, and converted from one format to another when old systems are replaced and new systems are acquired. The management of the "data in motion" in organizations is rapidly becoming one of the biggest concerns for business and IT management. Data warehousing and conversion, real-time data integration, and cloud and "big data" applications are just a few of the challenges facing organizations and businesses today. Managing Data in Motion tackles these and other topics in a style easily understood by business and IT managers as well as programmers and architects.
    • Applied Cyber Security and the Smart Grid

      • 1st Edition
      • February 26, 2013
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 8 9
      • eBook
        9 7 8 0 1 2 4 0 4 6 3 8 2
      Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
    • MSP430-based Robot Applications

      • 1st Edition
      • February 22, 2013
      • Dan Harres
      • English
      • Paperback
        9 7 8 0 1 2 3 9 7 0 1 2 1
      • eBook
        9 7 8 0 1 2 3 9 7 2 9 6 5
      This book provides a careful explanation of the basic areas of electronics and computer architecture, along with lots of examples, to demonstrate the interface, sensor design, programming and microcontroller peripheral setup necessary for embedded systems development. With no need for mechanical knowledge of robots, the book starts by demonstrating how to modify a simple radio-controlled car to create a basic robot. The fundamental electronics of the MSP430 are described, along with programming details in both C and assembly language, and full explanations of ports, timing, and data acquisition. Further chapters cover inexpensive ways to perform circuit simulation and prototyping. Key features include: Thorough treatment of the MSP430’s architecture and functionality along with detailed application-specific guidance Programming and the use of sensor technology to build an embedded system A learn-by-doing experience With this book you will learn: The basic theory for electronics design - Analog circuits - Digital logic - Computer arithmetic - Microcontroller programming How to design and build a working robot Assembly language and C programming How to develop your own high-performance embedded systems application using an on-going robotics application
    • The Basics of Digital Privacy

      • 1st Edition
      • February 17, 2013
      • Denny Cherry
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 0 1 1 3
      • eBook
        9 7 8 0 1 2 8 0 0 1 5 2 3
      Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who’s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis!
    • Analyzing the Social Web

      • 1st Edition
      • February 17, 2013
      • Jennifer Golbeck
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 5 3 1 5
      • eBook
        9 7 8 0 1 2 4 0 5 8 5 6 9
      Analyzing the Social Web provides a framework for the analysis of public data currently available and being generated by social networks and social media, like Facebook, Twitter, and Foursquare. Access and analysis of this public data about people and their connections to one another allows for new applications of traditional social network analysis techniques that let us identify things like who are the most important or influential people in a network, how things will spread through the network, and the nature of peoples' relationships. Analyzing the Social Web introduces you to these techniques, shows you their application to many different types of social media, and discusses how social media can be used as a tool for interacting with the online public.
    • Intel Xeon Phi Coprocessor High Performance Programming

      • 1st Edition
      • February 11, 2013
      • James Jeffers + 1 more
      • English
      • eBook
        9 7 8 0 1 2 4 1 0 4 9 4 5
      Authors Jim Jeffers and James Reinders spent two years helping educate customers about the prototype and pre-production hardware before Intel introduced the first Intel Xeon Phi coprocessor. They have distilled their own experiences coupled with insights from many expert customers, Intel Field Engineers, Application Engineers and Technical Consulting Engineers, to create this authoritative first book on the essentials of programming for this new architecture and these new products. This book is useful even before you ever touch a system with an Intel Xeon Phi coprocessor. To ensure that your applications run at maximum efficiency, the authors emphasize key techniques for programming any modern parallel computing system whether based on Intel Xeon processors, Intel Xeon Phi coprocessors, or other high performance microprocessors. Applying these techniques will generally increase your program performance on any system, and better prepare you for Intel Xeon Phi coprocessors and the Intel MIC architecture.