Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Enterprise Applications Administration

      • 1st Edition
      • November 25, 2013
      • Jeremy Faircloth
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 7 7 3 7
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 7 1
      Enterprise Applications Administration prepares you for the full breadth of work associated with administering large enterprise applications. This book provides essential information on tasks such as operating systems administration, network design, system architecture, project planning, working within a team, protecting the network, and how to keep applications up and running. The book effectively bridges the gap between what is taught in the technology-specific literature and the real world of enterprise application administrators.
    • Cyber Warfare

      • 2nd Edition
      • October 1, 2013
      • Jason Andress + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 7 2 1
      • eBook
        9 7 8 0 1 2 4 1 6 6 3 3 2
      Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
    • Introduction to Cyber-Warfare

      • 1st Edition
      • May 16, 2013
      • Paulo Shakarian + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 8 1 4 7
      • eBook
        9 7 8 0 1 2 4 0 7 9 2 6 7
      Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.
    • Kermit

      • 1st Edition
      • October 22, 2013
      • Bozzano G Luisa
      • English
      • Paperback
        9 7 8 0 9 3 2 3 7 6 8 8 6
      • eBook
        9 7 8 1 4 8 3 2 9 3 9 5 0
      This authoritative, all-in-one introduction, manual, and complete reference shows readers - at all levels of technical expertise - how to use Kermit to transfer diverse data between different computer systems and data communications environments. Using tutorials, case studies, and examples of actual Kermit codes, it provides instructions for basic use and a detailed description of the Kermit protocols: * File management through protocols * Command referencing and extended features * Telecommunications protocols
    • The Art of Multiprocessor Programming, Revised Reprint

      • 1st Edition
      • May 22, 2012
      • Maurice Herlihy + 1 more
      • English
      • eBook
        9 7 8 0 1 2 3 9 7 7 9 5 3
      Revised and updated with improvements conceived in parallel programming courses, The Art of Multiprocessor Programming is an authoritative guide to multicore programming. It introduces a higher level set of software development skills than that needed for efficient single-core programming. This book provides comprehensive coverage of the new principles, algorithms, and tools necessary for effective multiprocessor programming. Students and professionals alike will benefit from thorough coverage of key multiprocessor programming issues.
    • Graphics Gems III (IBM Version)

      • 1st Edition
      • December 2, 2012
      • David Kirk
      • English
      • Hardback
        9 7 8 0 1 2 4 0 9 6 7 3 8
      • eBook
        9 7 8 0 0 8 0 5 0 7 5 5 2
      This sequel to Graphics Gems (Academic Press, 1990), and Graphics Gems II (Academic Press, 1991) is a practical collection of computer graphics programming tools and techniques. Graphics Gems III contains a larger percentage of gems related to modeling and rendering, particularly lighting and shading. This new edition also covers image processing, numerical and programming techniques, modeling and transformations, 2D and 3D geometry and algorithms,ray tracing and radiosity, rendering, and more clever new tools and tricks for graphics programming. Volume III also includes a disk containing source codes for either the IBM or Mac versions featuring all code from Volumes I, II, and III. Author David Kirk lends his expertise to the Graphics Gems series in Volume III with his far-reaching knowledge of modeling and rendering, specifically focusing on the areas of lighting and shading. Volume III includes a disk containing source codes for both the IBM and Mac versions featuring all code from volumes I, II, and III. Graphics Gems I, II, and III are sourcebooks of ideas for graphics programmers. They also serve as toolboxes full of useful tricks and techniques for novice programmers and graphics experts alike. Each volume reflects the personality and particular interests of its respective editor.
    • Radiosity and Realistic Image Synthesis

      • 1st Edition
      • December 2, 2012
      • Michael F. Cohen + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 1 7 8 2 7 0 2
      • Paperback
        9 7 8 0 1 2 4 1 2 1 5 0 8
      • eBook
        9 7 8 0 0 8 0 5 1 5 6 7 0
      The goal of image synthesis is to create, using the computer, a visual experience that is identical to what a viewer would experience when viewing a real environment. Radiosity and Realistic Image Synthesis offers the first comprehensive look at the radiosity method for image synthesis and the tools required to approach this elusive goal. Basic concepts and mathematical fundamentals underlying image synthesis and radiosity algorithms are covered thoroughly. (A basic knowledge of undergraduate calculus is assumed). The algorithms that have been developed to implement the radiosity method ranging from environment subdivision to final display are discussed. Successes and difficulties in implementing and using these algorithms are highlighted. Extensions to the basic radiosity method to include glossy surfaces, fog or smoke, and realistic light sources are also described. There are 16 pages of full colour images and over 100 illustrations to explain the development and show the results of the radiosity method. Results of applications of this new technology from a variety of fields are also included.Michael Cohen has worked in the area of realistic image synthesis since 1983 and was instrumental in the development of the radiosity method. He is currently an assistant professor of computer science at Princeton University. John Wallace is a software engineer at 3D/EYE, Inc., where he is the project leader for the development of Hewlett-Packard's ATRCore radiosity and ray tracing library. A chapter on the basic concepts of image synthesis is contributed by Patrick Hanrahan. He has worked on the topic of image synthesis at Pixar, where he was instrumental in the development of the Renderman software. He has also led research on the hierarchical methods at Princeton University, where he is an associate professor of computer science. All three authors have written numerous articles on radiosity that have appeared in the SIGGAPH proceedings and elsewhere. They have also taught the SIGGRAPH course on radiosity for 5 years.
    • Artificial Intelligence in Chemical Engineering

      • 1st Edition
      • December 2, 2012
      • Thomas E. Quantrille + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 5 6 9 5 5 0 3
      • eBook
        9 7 8 0 0 8 0 5 7 1 2 1 8
      Artificial intelligence (AI) is the part of computer science concerned with designing intelligent computer systems (systems that exhibit characteristics we associate with intelligence in human behavior). This book is the first published textbook of AI in chemical engineering, and provides broad and in-depth coverage of AI programming, AI principles, expert systems, and neural networks in chemical engineering. This book introduces the computational means and methodologies that are used to enable computers to perform intelligent engineering tasks. A key goal is to move beyond the principles of AI into its applications in chemical engineering. After reading this book, a chemical engineer will have a firm grounding in AI, know what chemical engineering applications of AI exist today, and understand the current challenges facing AI in engineering.
    • Connected Computing Environment

      • 1st Edition
      • Volume 90
      • December 2, 2012
      • English
      • Hardback
        9 7 8 0 1 2 4 0 8 0 9 1 1
      • eBook
        9 7 8 0 1 2 4 0 8 1 1 1 6
      Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field.
    • PowerPC Microprocessor Common Hardware Reference Platform

      • 1st Edition
      • June 25, 2012
      • Apple Computer, Inc. + 2 more
      • English
      • eBook
        9 7 8 0 1 2 8 0 1 5 5 5 1
      This book defines the architecture requirements and minimum system requirementsfor a computer system that is designed to become an open industry standard.These requirements provide a description of the devices, interfaces, and dataformats required to design and build a PowerPC-based computer. This standard isdesigned to provide software compatibility for several operating environments.Systems built to these requirements can use industry-standard componentscurrently found in IBM-compatible and Apple® Macintosh® personal computers. Thesesystems are expected to run various future versions of operating systemsincluding Apple Mac OS™, IBM AIX™ and PowerPC™ Editions of IBM OS/2 Warp Connect™,Microsoft Windows NT™ Workstation, Novell Netware™, and SunSoft Solaris™. This book is the primary source of information for anyone developing a hardwareplatform, an operating system, or hardware component to be part of thesestandard systems. It describes the hardware-to-operatin... interface thatis essential to anyone building hardware platforms and provides the minimumsystem configurations that platform designers must meet when building a standardplatform. Component manufacturers require this information to producecompatible chips and adapters to use on these platforms, and software developersrequire the information on mandatory functions and documented interfaces.The architecture is intended to support a range of PowerPC microprocessor-based system implementations including portable, desktop, and server classsystems, and allows multiple operating-system implementations across a widerange of environments and functions. This enables new hardware and softwareenhancements that are necessary for the development of improved userinterfaces, higher performance, and broader operating environments.