Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Assessing Vendors

      • 1st Edition
      • April 10, 2013
      • Josh More
      • English
      • Paperback
        9 7 8 0 1 2 4 0 9 6 0 7 3
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 6 4
      Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. Assessing Vendors shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
    • Swarm Intelligence and Bio-Inspired Computation

      • 1st Edition
      • May 16, 2013
      • Xin-She Yang + 4 more
      • English
      • Hardback
        9 7 8 0 1 2 4 0 5 1 6 3 8
      • Paperback
        9 7 8 1 4 9 3 3 0 1 3 6 2
      • eBook
        9 7 8 0 1 2 4 0 5 1 7 7 5
      Swarm Intelligence and bio-inspired computation have become increasing popular in the last two decades. Bio-inspired algorithms such as ant colony algorithms, bat algorithms, bee algorithms, firefly algorithms, cuckoo search and particle swarm optimization have been applied in almost every area of science and engineering with a dramatic increase of number of relevant publications. This book reviews the latest developments in swarm intelligence and bio-inspired computation from both the theory and application side, providing a complete resource that analyzes and discusses the latest and future trends in research directions. It can help new researchers to carry out timely research and inspire readers to develop new algorithms. With its impressive breadth and depth, this book will be useful for advanced undergraduate students, PhD students and lecturers in computer science, engineering and science as well as researchers and engineers.
    • Social Media Audits

      • 1st Edition
      • October 31, 2013
      • Urs E Gattiker
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 4 5 3
      • eBook
        9 7 8 1 7 8 0 6 3 4 2 6 5
      Social media is quickly becoming important to most businesses, but many managers, professionals, and marketing experts are unsure about the practicalities of social media marketing and how to measure success. Social Media Audits gives people dealing with social business in their working life a guide to social media marketing, measurement, and how to evaluate and improve the use of social media in an organizational context. This book consists of three parts, the first of which introduces the reader to concepts and ideas emerging in social media. The second part considers the need to shift from traditional ‘shout marketing’ to a more conversational, social approach to customers. The third part moves the discussion towards a systematic approach to evaluating social media activities.
    • Basic Fluid Mechanics

      • 1st Edition
      • September 11, 2013
      • J J Sharp
      • English
      • Paperback
        9 7 8 0 4 0 8 0 1 6 4 0 7
      • eBook
        9 7 8 1 4 8 3 1 4 0 7 5 9
      BASIC Fluid Mechanics combines the application of BASIC programming with fluid mechanics. Topics covered in this book include the fundamentals of the BASIC computer language, properties of fluids, fluid statics, kinematics, and conservation of energy. Force and momentum, viscous flow, flow measurement, and dimensional analysis and similarity are also considered. This book is comprised of nine chapters and begins with a brief introduction to the application of BASIC. The discussion then turns to the various properties of a fluid and the differences between fluids and solids. The chapters that follow explore fluid statics, kinematics, and conservation of energy. The Euler and Bernoulli equations that are used to express the principle of conservation of energy when applied to fluids are highlighted, and calculations for force and momentum are presented. The text also considers laminar flow between parallel plates and in circular tubes, as well as the techniques for measuring flow. The final chapter describes the principles of dimensional analysis and similarity methods. Worked examples developing programs for the solution of typical problems are provided at the end of each chapter. This monograph will be useful to students in an undergraduate program and practicing engineers who are attempting to get to grips with modern computational procedures.
    • Practical Anonymity

      • 1st Edition
      • July 19, 2013
      • Peter Loshin
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 4 0 4 4
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 2 6
      For those with legitimate reason to use the Internet anonymously--diploma... military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
    • The Basics of Web Hacking

      • 1st Edition
      • June 18, 2013
      • Josh Pauli
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 0 0 4
      • eBook
        9 7 8 0 1 2 4 1 6 6 5 9 2
      The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities. The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user. With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.
    • Professional Penetration Testing

      • 2nd Edition
      • June 27, 2013
      • Thomas Wilhelm
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 3 4
      • eBook
        9 7 8 0 1 2 4 0 4 6 1 8 4
      Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web.
    • The Basics of Hacking and Penetration Testing

      • 2nd Edition
      • June 24, 2013
      • Patrick Engebretson
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 6 4 4 3
      • eBook
        9 7 8 0 1 2 4 1 1 6 4 1 2
      The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
    • System Parameter Identification

      • 1st Edition
      • July 17, 2013
      • Badong Chen + 3 more
      • English
      • Hardback
        9 7 8 0 1 2 4 0 4 5 7 4 3
      • Paperback
        9 7 8 0 1 2 8 1 0 3 1 6 6
      • eBook
        9 7 8 0 1 2 4 0 4 5 9 5 8
      Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing, investigating system identification from an information theory point of view. The book is divided into six chapters, which cover the information needed to understand the theory and application of system parameter identification. The authors’ research provides a base for the book, but it incorporates the results from the latest international research publications.
    • Decision Support Systems: Issues and Challenges

      • 1st Edition
      • October 22, 2013
      • Göran Fick + 1 more
      • English
      • Paperback
        9 7 8 1 4 8 3 1 1 2 7 4 9
      • eBook
        9 7 8 1 4 8 3 1 4 5 1 6 7
      Decision Support Systems: Issues and Challenges covers the proceedings of the International Institute for Applied Systems Analysis (IIASA) International Task Force Meeting. The book reviews papers that tackle issues about decision support systems (DSS). Comprised of 17 chapters, the book organizes the chapters according to the topic of discussion, including framework, resource discipline, application experience, and issues for the future in DSS. The opening chapter is an introduction to the main topic of the book. Chapter 2 discusses frameworks for research on decision support systems, and Chapter 3 covers the decision support systems. The fourth chapter deals with organizational science contributions to the design of decision support systems, while the fifth chapter discusses using data bases for decision support. Chapter 6 tackles the overview of database technology in decision support systems, and Chapter 7 talks about doing and speaking in the office. The eighth chapter discusses a look back at an office of the future, while the ninth chapter covers the implications for research of installing a decision support system. Chapter 10 tackles the problems of design and implementation of computer-based decision support systems. Chapter 11 discusses an interactive modeling system for analysis of alternative decisions; Chapter 12 covers the structure of decision support systems. Chapters 13 to 15 review the group discussion during the conference about the issues for the future in DSS. This book will be of great interest to leaders, since it discusses the integration of technology in the interaction within an organization.