Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Writing for Interaction

    Crafting the Information Experience for Web and Software Apps
    • 1st Edition
    • Linda Newman Lior
    • English
    Writing for Interaction focuses on the art of creating the information experience as it appears within software and web applications, specifically in the form of user interface text. It also provides strategies for ensuring a consistent, positive information experience across a variety of delivery mechanisms, such as online help and social media. Throughout this book, you'll learn simple techniques for writing consistent text with the right tone, how to select content delivery mechanisms, and how straightforward, clear layouts help your customer interact with your application. Divided into five sections, the book completely covers the information experience design process from beginning to end. You'll cover everything from understanding your users and their needs, to creating personas, designing the IX strategy, creating your information, and evaluating the resulting information experience. This is your one-stop reference for information experience!
  • MSP430-based Robot Applications

    A Guide to Developing Embedded Systems
    • 1st Edition
    • Dan Harres
    • English
    This book provides a careful explanation of the basic areas of electronics and computer architecture, along with lots of examples, to demonstrate the interface, sensor design, programming and microcontroller peripheral setup necessary for embedded systems development. With no need for mechanical knowledge of robots, the book starts by demonstrating how to modify a simple radio-controlled car to create a basic robot. The fundamental electronics of the MSP430 are described, along with programming details in both C and assembly language, and full explanations of ports, timing, and data acquisition. Further chapters cover inexpensive ways to perform circuit simulation and prototyping. Key features include: Thorough treatment of the MSP430’s architecture and functionality along with detailed application-specific guidance Programming and the use of sensor technology to build an embedded system A learn-by-doing experience With this book you will learn: The basic theory for electronics design - Analog circuits - Digital logic - Computer arithmetic - Microcontroller programming How to design and build a working robot Assembly language and C programming How to develop your own high-performance embedded systems application using an on-going robotics application
  • The Basics of Digital Privacy

    Simple Tools to Protect Your Personal Information and Your Identity Online
    • 1st Edition
    • Denny Cherry
    • English
    Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who’s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis!
  • Analyzing the Social Web

    • 1st Edition
    • Jennifer Golbeck
    • English
    Analyzing the Social Web provides a framework for the analysis of public data currently available and being generated by social networks and social media, like Facebook, Twitter, and Foursquare. Access and analysis of this public data about people and their connections to one another allows for new applications of traditional social network analysis techniques that let us identify things like who are the most important or influential people in a network, how things will spread through the network, and the nature of peoples' relationships. Analyzing the Social Web introduces you to these techniques, shows you their application to many different types of social media, and discusses how social media can be used as a tool for interacting with the online public.
  • Intel Xeon Phi Coprocessor High Performance Programming

    • 1st Edition
    • James Jeffers + 1 more
    • English
    Authors Jim Jeffers and James Reinders spent two years helping educate customers about the prototype and pre-production hardware before Intel introduced the first Intel Xeon Phi coprocessor. They have distilled their own experiences coupled with insights from many expert customers, Intel Field Engineers, Application Engineers and Technical Consulting Engineers, to create this authoritative first book on the essentials of programming for this new architecture and these new products. This book is useful even before you ever touch a system with an Intel Xeon Phi coprocessor. To ensure that your applications run at maximum efficiency, the authors emphasize key techniques for programming any modern parallel computing system whether based on Intel Xeon processors, Intel Xeon Phi coprocessors, or other high performance microprocessors. Applying these techniques will generally increase your program performance on any system, and better prepare you for Intel Xeon Phi coprocessors and the Intel MIC architecture.
  • Product Performance Evaluation using CAD/CAE

    The Computer Aided Engineering Design Series
    • 1st Edition
    • Kuang-Hua Chang
    • English
    This is one book of a four-part series, which aims to integrate discussion of modern engineering design principles, advanced design tools, and industrial design practices throughout the design process. Through this series, the reader will: Understand basic design principles and modern engineering design paradigms. Understand CAD/CAE/CAM tools available for various design related tasks. Understand how to put an integrated system together to conduct product design using the paradigms and tools. Understand industrial practices in employing virtual engineering design and tools for product development.
  • Intelligent Systems for Security Informatics

    • 1st Edition
    • Christopher C Yang + 3 more
    • English
    The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years.
  • Brainstorming and Beyond

    A User-Centered Design Method
    • 1st Edition
    • Chauncey Wilson
    • English
    Brainstorming and Beyond describes the techniques for generating ideas verbally, in writing, or through sketches. The first chapter focuses on brainstorming, the foundation method for ideation, which is a complex social process building off of social psychology principles, motivational constructs, and corporate culture. Brainstorming is commonly portrayed as an easy way to generate ideas, but in reality, it is a complex social process that is often flawed in ways that are not self-evident. Chapter 2 discusses Brainwriting, which is a variation on brainstorming in which each person writes ideas down on paper and then passes the paper to a new person who reads the first set of ideas and adds new ones. Since there is no group shouting out of ideas, strong facilitation skills are not required, and more often than not, Brainwriting results greatly exceed those of group brainstorming in a shorter time because ideas are generated in a parallel, rather than serial, fashion. Brainwriting is useful when time is limited, groups are hostile, or you are dealing with a culture where shouting out wild or divergent ideas might be difficult. Finally, in Chapter 3, readers learn about Braindrawing, a method of visual brainstorming that helps practitioners generate ideas for icons, other graphics, user interface layouts, or Web page designs. Each of these methods provides readers with ways to generate, present, and evaluate ideas so they can begin building a strong foundation for product success.
  • Strategic Intelligence Management

    National Security Imperatives and Information and Communications Technologies
    • 1st Edition
    • Babak Akhgar + 1 more
    • English
    Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives. Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats.
  • Flow Networks

    Analysis and Optimization of Repairable Flow Networks, Networks with Disturbed Flows, Static Flow Networks and Reliability Networks
    • 1st Edition
    • Michael T. Todinov
    • English
    Repairable flow networks are a new area of research, which analyzes the repair and flow disruption caused by failures of components in static flow networks. This book addresses a gap in current network research by developing the theory, algorithms and applications related to repairable flow networks and networks with disturbed flows. The theoretical results presented in the book lay the foundations of a new generation of ultra-fast algorithms for optimizing the flow in networks after failures or congestion, and the high computational speed creates the powerful possibility of optimal control of very large and complex networks in real time. Furthermore, the possibility for re-optimizing the network flows in real time increases significantly the yield from real production networks and reduces to a minimum the flow disruption caused by failures. The potential application of repairable flow networks reaches across many large and complex systems, including active power networks, telecommunication networks, oil and gas production networks, transportation networks, water supply networks, emergency evacuation networks, and supply networks. The book reveals a fundamental flaw in classical algorithms for maximising the throughput flow in networks, published since the creation of the theory of flow networks in 1956. Despite the years of intensive research, the classical algorithms for maximising the throughput flow leave highly undesirable directed loops of flow in the optimised networks. These flow loops are associated with wastage of energy and resources and increased levels of congestion in the optimised networks.