Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Agile Software Architecture

      • 1st Edition
      • November 27, 2013
      • Muhammad Ali Babar + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 7 7 2 0
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 5 7
      Agile software development approaches have had significant impact on industrial software development practices. Today, agile software development has penetrated to most IT companies across the globe, with an intention to increase quality, productivity, and profitability. Comprehensive knowledge is needed to understand the architectural challenges involved in adopting and using agile approaches and industrial practices to deal with the development of large, architecturally challenging systems in an agile way. Agile Software Architecture focuses on gaps in the requirements of applying architecture-centric approaches and principles of agile software development and demystifies the agile architecture paradox. Readers will learn how agile and architectural cultures can co-exist and support each other according to the context. Moreover, this book will also provide useful leads for future research in architecture and agile to bridge such gaps by developing appropriate approaches that incorporate architecturally sound practices in agile methods.
    • The Basics of Digital Privacy

      • 1st Edition
      • February 17, 2013
      • Denny Cherry
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 0 1 1 3
      • eBook
        9 7 8 0 1 2 8 0 0 1 5 2 3
      Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who’s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis!
    • Crisis Management at the Speed of the Internet

      • 1st Edition
      • March 25, 2013
      • Bob Hayes + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 5 8 7 3
      • eBook
        9 7 8 0 1 2 4 1 1 5 9 1 0
      Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster—even if the viral information isn’t factual. It is critical that an organization respond quickly and decisively to crises in online media. The report explores examples of companies that have experienced this kind of impact, and describes practical, strategic methods for mitigating and resolving a crisis, including cross-functional team readiness and internal communications training. It is a valuable resource for any security professional working to create or improve an existing corporate crisis management policy. Crisis Management at the Speed of the Internet is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Platform Ecosystems

      • 1st Edition
      • November 12, 2013
      • Amrit Tiwana
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 0 6 6 9
      • eBook
        9 7 8 0 1 2 4 0 8 0 5 4 6
      Platform Ecosystems is a hands-on guide that offers a complete roadmap for designing and orchestrating vibrant software platform ecosystems. Unlike software products that are managed, the evolution of ecosystems and their myriad participants must be orchestrated through a thoughtful alignment of architecture and governance. Whether you are an IT professional or a general manager, you will benefit from this book because platform strategy here lies at the intersection of software architecture and business strategy. It offers actionable tools to develop your own platform strategy, backed by original research, tangible metrics, rich data, and cases. You will learn how architectural choices create organically-evolvabl... vibrant ecosystems. You will also learn to apply state-of-the-art research in software engineering, strategy, and evolutionary biology to leverage ecosystem dynamics unique to platforms. Read this book to learn how to: Evolve software products and services into vibrant platform ecosystems Orchestrate platform architecture and governance to sustain competitive advantage Govern platform evolution using a powerful 3-dimensional framework If you’re ready to transform platform strategy from newspaper gossip and business school theory to real-world competitive advantage, start right here!
    • Computer-Aided Vaccine Design

      • 1st Edition
      • July 31, 2013
      • Joo Chuan Tong + 1 more
      • English
      • Hardback
        9 7 8 1 9 0 7 5 6 8 4 1 1
      • eBook
        9 7 8 1 9 0 8 8 1 8 4 1 6
      Computational pre-screening of antigens is now routinely applied to the discovery of vaccine candidates.Computer-... vaccine design is a comprehensive introduction to this exciting field of study. The book is intended to be a textbook for researchers and for courses in bioinformatics, as well as a laboratory reference guide. It is written mainly for biologists who want to understand the current methods of computer-aided vaccine design. The contents are designed to help biologists appreciate the underlying concepts and algorithms used, as well as limitations of the methods and strategies for their use. Chapters include: MHC and T cell responses; Immunoglobulins and B cell responses; Scientific publications and databases; Database design; Computational T cell vaccine design; Computational B cell vaccine design; infectious disease informatics; Vaccine safety and quality assessments; and Vaccine adjuvant informatics.
    • Intelligence as Adaptive Behavior

      • 1st Edition
      • October 22, 2013
      • B. Chandrasekaran
      • English
      • eBook
        9 7 8 1 4 8 3 2 8 8 1 2 3
      The "intelligence" of traditional artificial intelligence systems is notoriously narrow and inflexible--incapabl... of adapting to the constantly changing circumstances of the real world. Although traditional artificial intelligence systems can be successful in narrowly prescribed domains, they are inappropriate for dynamic, complex domains, such as autonomous robot navigation.**This book proposes an alternative methodology for designing intelligent systems based on a model of intelligence as adaptive behavior. The author describes an experiment in computational neuroethology--the computer modeling of neuronal control of behavior--in which the nervous system for an artificial insect is modeled. The experiment demonstrates that simple, complete intelligent agents are able to cope with complex, dynamic environments--sugges... that adaptive models of intelligence, based on biological bases of adaptive behavior, may prove to be very useful in the design of intelligent, autonomous systems.
    • The Moderator's Survival Guide

      • 1st Edition
      • September 25, 2013
      • Donna Tedesco + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 4 7 0 0 6
      • eBook
        9 7 8 0 1 2 4 0 4 7 1 4 3
      The Moderator's Survival Guide is your indispensable resource for navigating the rocky shoals of your one-on-one user research sessions. Inside, you’ll find guidance for nearly 100 diverse situations (ranging from business-as-usual to tricky and sticky) that might occur during usability studies, contextual inquiries, or user interviews. As a moderator, you are responsible for the well-being of the participant, your study, and your organization. You must be prepared for anything that may happen, from your technology failing to the participant quailing. Use this guide to identify your best next steps, react appropriately, and survive any challenges that comes your way.
    • Information Management

      • 1st Edition
      • November 30, 2013
      • William McKnight
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 0 5 6 0
      • eBook
        9 7 8 0 1 2 4 0 9 5 2 6 7
      Information Management: Gaining a Competitive Advantage with Data is about making smart decisions to make the most of company information. Expert author William McKnight develops the value proposition for information in the enterprise and succinctly outlines the numerous forms of data storage. Information Management will enlighten you, challenge your preconceived notions, and help activate information in the enterprise. Get the big picture on managing data so that your team can make smart decisions by understanding how everything from workload allocation to data stores fits together. The practical, hands-on guidance in this book includes: Part 1: The importance of information management and analytics to business, and how data warehouses are used Part 2: The technologies and data that advance an organization, and extend data warehouses and related functionality Part 3: Big Data and NoSQL, and how technologies like Hadoop enable management of new forms of data Part 4: Pulls it all together, while addressing topics of agile development, modern business intelligence, and organizational change management Read the book cover-to-cover, or keep it within reach for a quick and useful resource. Either way, this book will enable you to master all of the possibilities for data or the broadest view across the enterprise.
    • Analyzing the Social Web

      • 1st Edition
      • February 17, 2013
      • Jennifer Golbeck
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 5 3 1 5
      • eBook
        9 7 8 0 1 2 4 0 5 8 5 6 9
      Analyzing the Social Web provides a framework for the analysis of public data currently available and being generated by social networks and social media, like Facebook, Twitter, and Foursquare. Access and analysis of this public data about people and their connections to one another allows for new applications of traditional social network analysis techniques that let us identify things like who are the most important or influential people in a network, how things will spread through the network, and the nature of peoples' relationships. Analyzing the Social Web introduces you to these techniques, shows you their application to many different types of social media, and discusses how social media can be used as a tool for interacting with the online public.
    • Investigating Internet Crimes

      • 1st Edition
      • November 12, 2013
      • Todd G. Shipley + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 8 1 7 8
      • eBook
        9 7 8 0 1 2 4 0 7 9 2 9 8
      Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.