Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Robotics Sourcebook

      • 1st Edition
      • December 2, 2012
      • V. Daniel Hunt
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 9 5 7 8
      • eBook
        9 7 8 0 4 4 4 6 0 1 6 1 2
      Robotics Sourcebook provides concise, up-to-date definitions of the terms, acronyms, and abbreviations currently used in robotics. It covers industrial robots, smart robots, and military robots, as well as machine vision, laser systems, CAD/CAM/CIM, advanced manufacturing technology, production processes, bar code identification, and factories of the future. It explains how robots work, and it presents key factors in robot implementation, as well as examples of typical applications, from assembly functions and die-casting to foundry, inspection, and forging. It also analyzes the world robotics market and includes forecasts of market trends. Divided into four parts encompassing 12 chapters, this volume begins with an overview of the robotics industry and U.S. industrial performance, along with current international competitors and their markets, including Japan, Western Europe, France, Britain, and West Germany. It proceeds with a discussion of technological developments, research and development, standards, international agreements, definitions of terms, and robotics programs such as those of NASA, the National Science Foundation, U.S. Navy Robotics, and the United Kingdom. Also included is extensive reference material that contains points of contact for additional information and a detailed bibliography, plus photographs, charts, and diagrams. This book should be a useful reference source for engineers or professionals working in the field of industrial robotics.
    • COLT Proceedings 1990

      • 1st Edition
      • December 2, 2012
      • COLT
      • English
      • eBook
        9 7 8 0 3 2 3 1 3 7 7 0 6
      COLT '90 covers the proceedings of the Third Annual Workshop on Computational Learning Theory, sponsored by the ACM SIGACT/SIGART, University of Rochester, Rochester, New York on August 6-8, 1990. The book focuses on the processes, methodologies, principles, and approaches involved in computational learning theory. The selection first elaborates on inductive inference of minimal programs, learning switch configurations, computational complexity of approximating distributions by probabilistic automata, and a learning criterion for stochastic rules. The text then takes a look at inductive identification of pattern languages with restricted substitutions, learning ring-sum-expansions, sample complexity of PAC-learning using random and chosen examples, and some problems of learning with an Oracle. The book examines a mechanical method of successful scientific inquiry, boosting a weak learning algorithm by majority, and learning by distances. Discussions focus on the relation to PAC learnability, majority-vote game, boosting a weak learner by majority vote, and a paradigm of scientific inquiry. The selection is a dependable source of data for researchers interested in the computational learning theory.
    • Securing SQL Server

      • 2nd Edition
      • July 17, 2012
      • Denny Cherry
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 9 5 2 1
      SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book written by Denny Cherry, a Microsoft SQL MVP and one of the biggest names in SQL server today, readers learn how to properly secure a SQL server database from internal and external threats using best practices as well as specific tricks the authors employ in their roles as database administrators for some of the largest SQL server deployments in the world. "Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. He's a bare-knuckles, no holds-barred technologist, and you can bet that if he tells you that something does or doesn't work, he's speaking from experience. Active in the community, his passion is sharing. You'll enjoy this book."--Buck Woody, Senior Technology Specialist, Microsoft
    • Theory of Electric Polarization

      • 2nd Edition
      • December 2, 2012
      • Bozzano G Luisa
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 6 6 0 7
      • eBook
        9 7 8 0 4 4 4 6 0 0 0 6 6
      Theory of Electric Polarization: Dielectrics in Static Fields: Second Edition concerns the theory of the static behavior of dielectrics. The book reviews electric moment, electric dipoles, some concepts of, and problems of electrostatics. One problem concerns the phenomena of a conducting sphere in a homogeneous external field which was resolved using Laplace's equation. The text also discusses the work required to assemble a charge distribution, the energy of a dialectric or an induced dipole in an external field, and the electrostatic interaction of two particles. The book explores the reaction field of a polarizable or non-polarizable point dipole, the reaction field in an ellipsoidal cavity, the reaction field of an eccentric dipole in a spherical cavity, and the contribution of the permanent dipoles to the cohesion energy of a liquid. The text tackles the Onsager equation, the Debye equation, a correction to the Clausius-Mossotti equation, and the Kirkwood correlation factor. The book explains normal and anomalous saturation, electrostriction, as well as the non-linear effect due to the anisotropy of polarizability and hyperpolarizabilitie... The text can prove beneficial for researchers, investigators or scientists whose work involve organic chemistry, analytical chemistry, physical chemistry, and inorganic chemistry.
    • Advanced Persistent Threat

      • 1st Edition
      • November 13, 2012
      • Eric Cole
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 4 9 1
      • eBook
        9 7 8 1 5 9 7 4 9 9 5 5 2
      The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.
    • Robotics, Mechatronics and Manufacturing Systems

      • 1st Edition
      • December 2, 2012
      • T. Takamori + 1 more
      • English
      • eBook
        9 7 8 0 4 4 4 6 0 0 2 9 5
      One of the most important problems in the field of engineering and technology is the development of so-called intelligent systems, which can perform various intellectual tasks.This book is dedicated to the current progress of research in this vast field and specifically explores the topics of robotics, mechatronics and manufacturing systems.
    • Internet Law in China

      • 1st Edition
      • March 14, 2012
      • Guosong Shao
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 6 4 8 7
      • Paperback
        9 7 8 0 0 8 1 0 1 6 7 7 0
      • eBook
        9 7 8 1 7 8 0 6 3 3 3 7 4
      A comprehensive, structured, and up-to-date introduction to the law governing the dissemination of information in a computer-mediated world in China, Internet Law in China stresses the practical applications of the law that are encountered by all individuals and organizations in Chinese cyberspace, but always in the light of theoretical underpinnings. Among the overarching topics treated in the Chinese context are the following: intellectual property protection in cyberspace; privacy of communication and data privacy; electronic contract forming and electronic signature; personal, domestic and international jurisdiction; and free expression in cyberspace. This book is particularly valuable to legal, business, and communication professionals, academics, and students concerned with the regulation of the Internet and related activities in China. It is the first book to focus solely on Chinese Internet law.
    • SDL '95 with MSC in CASE

      • 1st Edition
      • December 2, 2012
      • R. Braek + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 5 5 7 0
      • eBook
        9 7 8 0 4 4 4 5 9 8 6 4 6
      Message Sequence Charts (MSC) have had an unanticipated success, both with SDL, on its own and in conjunction with other methods and tools. Major tool vendors now offer both SDL and MSC in their tool set. This timely volume reports on the recent developments in this expanding field. Several papers deal with language issues, tools and methods for effective use of MSC. Advances in "SDL technology" are discussed, and several papers deal with the early stages of product development and how SDL may be complemented by other methods, such as OMT, to improve problem understanding and make better SDL designs. New developments in the areas of tools for verification, validation and testing are also included, together with a large number of papers on applications.
    • The Single Server Queue

      • 2nd Edition
      • Volume 8
      • December 2, 2012
      • J.W. Cohen
      • English
      • Paperback
        9 7 8 0 4 4 4 8 9 4 8 2 3
      • eBook
        9 7 8 0 4 4 4 5 9 6 2 4 6
      This classic work, now available in paperback, concentrates on the basic models of queueing theory. It has a dual aim: to describe relevant mathematical techniques and to analyse the single server queue and its most important variants.
    • Systems Engineering Using SDL-92

      • 1st Edition
      • December 2, 2012
      • A. Olsen
      • O. Færgemand + 3 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 8 3 6 6
      • eBook
        9 7 8 0 4 4 4 5 9 8 9 0 5
      CCITT (now ITU-T) Specification and Description Language (SDL) and systems engineering (formal and informal) in SDL are considered in this publication. The latest version of the language, SDL-92 [ITU Z.100 SDL-92] is introduced. The book has been written for existing and potential users of SDL - technologists involved in the specification and engineering of systems. It offers easier learning, through examples and application, than the Z.100 Recommendation of March 1993, which gives precise technical definitions and concepts. The book has sufficient coverage of the language so that for normal use it should not be necessary to consult Z.100. For this reason, the grammars, both textual and graphical, are included, and the index makes it possible to find text on most of the language mechanisms.Chapter 1 provides an overview of specification and design of telecommunication systems. It considers the usage and scope of SDL. Chapter 2 gives an overview of the language, with an introduction of the major language elements. Chapter 3 focuses on the specification of behaviour and the information interchange between processes. Chapter 4 covers the structuring of systems in terms of instances, how these may be defined by types and how types may be organised in type/subtype hierarchies by inheritance. Parameterised types and packages of type definitions are also covered. Chapter 5 presents the part of the language that provides data types, with emphasis placed on how to use predefined data types. Chapter 6 presents the use of SDL for system engineering, with a discussion of general systems engineering principles followed by an introduction to methodologies which use SDL. The use of other languages in combination with SDL, documentation issues, naming and other lexical rules, errors and language support are considered, since they are more relevant to the use of language in engineering than when initially learning the language.