Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Mining Modelling

      • 1st Edition
      • December 2, 2012
      • V. Ehrenberger + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 4 7 1 9
      • eBook
        9 7 8 0 4 4 4 5 9 7 4 4 1
      The main aim of this book is to offer an exposition of the principles and applications of an original method which was introduced by the authors, developed gradually in the course of time, and applied extensively in the most diverse fields of management in the mining industry and power engineering. It is a relatively universal method of mathematical model construction and application intended to aid managerial personnel at various management levels in decision-making situations, which are frequently characterized by complicated relations of a quantitative as well as logical character.The method, called by the authors simply the ``method of mathematical-logical modelling'' (MLM for short), is based upon an interesting and effective combination of tools from mathematical logic, Boolean algebra and computer programming. From the mathematical point of view it is based primarily on the construction and solution of systems of pseudo-Boolean equations and inequalities with a generalized logical structure. The principal features of the method are its universality, iterativity, interactivity, and advanced and broadly applicable software, coded in FORTRAN 77. Due in particular to these properties, MLM is a powerful tool for modelling real-life situations in the mining industry (and, naturally, in other fields of human activity as well).The exposition is illustrated by a considerable number of examples. Some of these are rather simple and aimed at helping the reader verify his correct understanding of the text. Other examples, especially in the second part of the book (Chapters 6, 7 and 8), are more complicated and extensive. In some instances they have the character of case studies and demonstrate typical approaches applied when modelling mining situations.The book will be of interest to a broad range of specialists working in the mining industry - research workers, designers, computer personnel, system analysts, management personnel at all managerial levels, and also undergraduate as well as graduate students.
    • New Trends in System Reliability Evaluation

      • 1st Edition
      • December 2, 2012
      • K.B. Misra
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 5 2 6 6
      • eBook
        9 7 8 0 4 4 4 5 9 8 1 8 9
      The subject of system reliability evaluation has never been so extensively and incisively discussed as in the present volume. The book fills a gap in the existing literature on the subject by highlighting the shortcomings of the current state-of-the-art and focusing on on-going efforts aimed at seeking better models, improved solutions and alternative approaches to the problem of system reliability evaluation. The book's foremost objective is to provide an insight into developments that are likely to revolutionize the art and science in the near future. At the same time it will help serve as a benchmark for the reader not only to understand and appreciate the newer developments but to profitably guide him in reorienting his efforts. This book will be valuable for people working in various industries, research organizations, particularly in electrical and electronics, defence, nuclear, chemical, space and communciation systems. It will also be useful for serious-minded students, teachers, and for the laboratories of educational institutions.
    • Connected Computing Environment

      • 1st Edition
      • Volume 90
      • December 2, 2012
      • English
      • Hardback
        9 7 8 0 1 2 4 0 8 0 9 1 1
      • eBook
        9 7 8 0 1 2 4 0 8 1 1 1 6
      Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field.
    • Logging and Log Management

      • 1st Edition
      • November 29, 2012
      • Kevin Schmidt + 2 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 3 5 3
      • eBook
        9 7 8 1 5 9 7 4 9 6 3 6 0
      Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis. This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers.
    • Federal Cloud Computing

      • 1st Edition
      • November 27, 2012
      • Matthew Metheny
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 7 3 9 8
      Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis.
    • FISMA and the Risk Management Framework

      • 1st Edition
      • November 27, 2012
      • Daniel R. Philpott + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 4 1 4
      • eBook
        9 7 8 1 5 9 7 4 9 6 4 2 1
      FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems.
    • Applications of ATILA FEM Software to Smart Materials

      • 1st Edition
      • November 27, 2012
      • Kenji Uchino + 1 more
      • English
      • Hardback
        9 7 8 0 8 5 7 0 9 0 6 5 2
      • eBook
        9 7 8 0 8 5 7 0 9 6 3 1 9
      ATILA Finite Element Method (FEM) software facilitates the modelling and analysis of applications using piezoelectric, magnetostrictor and shape memory materials. It allows entire designs to be constructed, refined and optimized before production begins. Through a range of instructive case studies, Applications of ATILA FEM software to smart materials provides an indispensable guide to the use of this software in the design of effective products.Part one provides an introduction to ATILA FEM software, beginning with an overview of the software code. New capabilities and loss integration are discussed, before part two goes on to present case studies of finite element modelling using ATILA. The use of ATILA in finite element analysis, piezoelectric polarization, time domain analysis of piezoelectric devices and the design of ultrasonic motors is considered, before piezo-composite and photonic crystal applications are reviewed. The behaviour of piezoelectric single crystals for sonar and thermal analysis in piezoelectric and magnetostrictive materials is also discussed, before a final reflection on the use of ATILA in modelling the damping of piezoelectric structures and the behaviour of single crystal devices.With its distinguished editors and international team of expert contributors, Applications of ATILA FEM software to smart materials is a key reference work for all those involved in the research, design, development and application of smart materials, including electrical and mechanical engineers, academics and scientists working in piezoelectrics, magenetostrictors and shape memory materials.
    • Augmented Reality

      • 1st Edition
      • November 19, 2012
      • Joseph Rampolla + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 7 3 3 6
      • eBook
        9 7 8 1 5 9 7 4 9 7 3 4 3
      With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is brought into view, in real-time, through augmented reality. In this cutting-edge book, the authors outline and discuss never-before-publish... information about augmented reality and its capabilities. With coverage of mobile, desktop, developers, security, challenges, and gaming, this book gives you a comprehensive understanding of what augmented reality is, what it can do, what is in store for the future and most importantly: how to benefit from using AR in our lives and careers.
    • The Basics of Cyber Warfare

      • 1st Edition
      • November 16, 2012
      • Jason Andress + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 4 7 3 7 2
      • eBook
        9 7 8 0 1 2 4 0 5 1 8 1 2
      The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology. The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
    • CUDA Programming

      • 1st Edition
      • November 13, 2012
      • Shane Cook
      • English
      • Paperback
        9 7 8 0 1 2 4 1 5 9 3 3 4
      • eBook
        9 7 8 0 1 2 4 1 5 9 8 8 4
      If you need to learn CUDA but don't have experience with parallel computing, CUDA Programming: A Developer's Introduction offers a detailed guide to CUDA with a grounding in parallel fundamentals. It starts by introducing CUDA and bringing you up to speed on GPU parallelism and hardware, then delving into CUDA installation. Chapters on core concepts including threads, blocks, grids, and memory focus on both parallel and CUDA-specific issues. Later, the book demonstrates CUDA in practice for optimizing applications, adjusting to new hardware, and solving common problems.