Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Crisis Management at the Speed of the Internet

      • 1st Edition
      • March 25, 2013
      • Bob Hayes + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 5 8 7 3
      • eBook
        9 7 8 0 1 2 4 1 1 5 9 1 0
      Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster—even if the viral information isn’t factual. It is critical that an organization respond quickly and decisively to crises in online media. The report explores examples of companies that have experienced this kind of impact, and describes practical, strategic methods for mitigating and resolving a crisis, including cross-functional team readiness and internal communications training. It is a valuable resource for any security professional working to create or improve an existing corporate crisis management policy. Crisis Management at the Speed of the Internet is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Visual Usability

      • 1st Edition
      • March 21, 2013
      • Tania Schlatter + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 8 5 3 6 1
      • eBook
        9 7 8 0 1 2 4 0 1 7 1 3 9
      Imagine how much easier creating web and mobile applications would be if you had a practical and concise, hands-on guide to visual design. Visual Usability gets into the nitty-gritty of applying visual design principles to complex application design.You’ll learn how to avoid common mistakes, make informed decisions about application design, and elevate the ordinary. We’ll review three key principles that affect application design – consistency, hierarchy, and personality – and illustrate how to apply tools like typography, color, and layout to digital application design. Whether you’re a UI professional looking to fine-tune your skills, a developer who cares about making applications beautiful and usable, or someone entirely new to the design arena, Visual Usability is your one-stop, practical guide to visual design.
    • Windows 2012 Server Network Security

      • 1st Edition
      • March 19, 2013
      • Derrick Rountree
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 5 8 3
      • eBook
        9 7 8 1 5 9 7 4 9 9 6 5 1
      Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. Windows 2012 Server Network Security provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.
    • Digital Outcasts

      • 1st Edition
      • March 18, 2013
      • Kel Smith
      • English
      • Paperback
        9 7 8 0 1 2 4 0 4 7 0 5 1
      • eBook
        9 7 8 0 1 2 4 0 4 7 1 3 6
      The blind person who tries to make an online purchase. The young girl who cannot speak due to a cognitive disability. The man confined to his home due to permanent injury. The single mother with a long-term illness who struggles to feed her family.With one in seven people worldwide currently living with a disability, the term "outcast" covers numerous scenarios. Digital outcasts rely on technology for everyday services that many people take for granted. However, poorly designed products risk alienating this important (and growing) population.Through a "grass roots" approach to innovation, digital outcasts are gradually taking action to transform their lives and communities. This emerging trend provides exciting learning opportunities for all of us.Citing real-world case studies from healthcare to social science, this book examines the emerging legal and cultural impact of inclusive design.
    • Writing for Interaction

      • 1st Edition
      • February 26, 2013
      • Linda Newman Lior
      • English
      • Paperback
        9 7 8 0 1 2 3 9 4 8 1 3 7
      • eBook
        9 7 8 0 1 2 3 9 4 8 4 4 1
      Writing for Interaction focuses on the art of creating the information experience as it appears within software and web applications, specifically in the form of user interface text. It also provides strategies for ensuring a consistent, positive information experience across a variety of delivery mechanisms, such as online help and social media. Throughout this book, you'll learn simple techniques for writing consistent text with the right tone, how to select content delivery mechanisms, and how straightforward, clear layouts help your customer interact with your application. Divided into five sections, the book completely covers the information experience design process from beginning to end. You'll cover everything from understanding your users and their needs, to creating personas, designing the IX strategy, creating your information, and evaluating the resulting information experience. This is your one-stop reference for information experience!
    • Managing Data in Motion

      • 1st Edition
      • February 26, 2013
      • April Reeve
      • English
      • Paperback
        9 7 8 0 1 2 3 9 7 1 6 7 8
      • eBook
        9 7 8 0 1 2 3 9 7 7 9 1 5
      Managing Data in Motion describes techniques that have been developed for significantly reducing the complexity of managing system interfaces and enabling scalable architectures. Author April Reeve brings over two decades of experience to present a vendor-neutral approach to moving data between computing environments and systems. Readers will learn the techniques, technologies, and best practices for managing the passage of data between computer systems and integrating disparate data together in an enterprise environment. The average enterprise's computing environment is comprised of hundreds to thousands computer systems that have been built, purchased, and acquired over time. The data from these various systems needs to be integrated for reporting and analysis, shared for business transaction processing, and converted from one format to another when old systems are replaced and new systems are acquired. The management of the "data in motion" in organizations is rapidly becoming one of the biggest concerns for business and IT management. Data warehousing and conversion, real-time data integration, and cloud and "big data" applications are just a few of the challenges facing organizations and businesses today. Managing Data in Motion tackles these and other topics in a style easily understood by business and IT managers as well as programmers and architects.
    • Applied Cyber Security and the Smart Grid

      • 1st Edition
      • February 26, 2013
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 8 9
      • eBook
        9 7 8 0 1 2 4 0 4 6 3 8 2
      Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
    • MSP430-based Robot Applications

      • 1st Edition
      • February 22, 2013
      • Dan Harres
      • English
      • Paperback
        9 7 8 0 1 2 3 9 7 0 1 2 1
      • eBook
        9 7 8 0 1 2 3 9 7 2 9 6 5
      This book provides a careful explanation of the basic areas of electronics and computer architecture, along with lots of examples, to demonstrate the interface, sensor design, programming and microcontroller peripheral setup necessary for embedded systems development. With no need for mechanical knowledge of robots, the book starts by demonstrating how to modify a simple radio-controlled car to create a basic robot. The fundamental electronics of the MSP430 are described, along with programming details in both C and assembly language, and full explanations of ports, timing, and data acquisition. Further chapters cover inexpensive ways to perform circuit simulation and prototyping. Key features include: Thorough treatment of the MSP430’s architecture and functionality along with detailed application-specific guidance Programming and the use of sensor technology to build an embedded system A learn-by-doing experience With this book you will learn: The basic theory for electronics design - Analog circuits - Digital logic - Computer arithmetic - Microcontroller programming How to design and build a working robot Assembly language and C programming How to develop your own high-performance embedded systems application using an on-going robotics application
    • The Basics of Digital Privacy

      • 1st Edition
      • February 17, 2013
      • Denny Cherry
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 0 1 1 3
      • eBook
        9 7 8 0 1 2 8 0 0 1 5 2 3
      Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who’s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis!
    • Analyzing the Social Web

      • 1st Edition
      • February 17, 2013
      • Jennifer Golbeck
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 5 3 1 5
      • eBook
        9 7 8 0 1 2 4 0 5 8 5 6 9
      Analyzing the Social Web provides a framework for the analysis of public data currently available and being generated by social networks and social media, like Facebook, Twitter, and Foursquare. Access and analysis of this public data about people and their connections to one another allows for new applications of traditional social network analysis techniques that let us identify things like who are the most important or influential people in a network, how things will spread through the network, and the nature of peoples' relationships. Analyzing the Social Web introduces you to these techniques, shows you their application to many different types of social media, and discusses how social media can be used as a tool for interacting with the online public.