Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Federal Cloud Computing

    The Definitive Guide for Cloud Service Providers
    • 1st Edition
    • Matthew Metheny
    • English
    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis.
  • FISMA and the Risk Management Framework

    The New Practice of Federal Cyber Security
    • 1st Edition
    • Daniel R. Philpott + 1 more
    • English
    FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems.
  • Applications of ATILA FEM Software to Smart Materials

    Case Studies in Designing Devices
    • 1st Edition
    • Kenji Uchino + 1 more
    • English
    ATILA Finite Element Method (FEM) software facilitates the modelling and analysis of applications using piezoelectric, magnetostrictor and shape memory materials. It allows entire designs to be constructed, refined and optimized before production begins. Through a range of instructive case studies, Applications of ATILA FEM software to smart materials provides an indispensable guide to the use of this software in the design of effective products.Part one provides an introduction to ATILA FEM software, beginning with an overview of the software code. New capabilities and loss integration are discussed, before part two goes on to present case studies of finite element modelling using ATILA. The use of ATILA in finite element analysis, piezoelectric polarization, time domain analysis of piezoelectric devices and the design of ultrasonic motors is considered, before piezo-composite and photonic crystal applications are reviewed. The behaviour of piezoelectric single crystals for sonar and thermal analysis in piezoelectric and magnetostrictive materials is also discussed, before a final reflection on the use of ATILA in modelling the damping of piezoelectric structures and the behaviour of single crystal devices.With its distinguished editors and international team of expert contributors, Applications of ATILA FEM software to smart materials is a key reference work for all those involved in the research, design, development and application of smart materials, including electrical and mechanical engineers, academics and scientists working in piezoelectrics, magenetostrictors and shape memory materials.
  • Augmented Reality

    An Emerging Technologies Guide to AR
    • 1st Edition
    • Joseph Rampolla + 1 more
    • English
    With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is brought into view, in real-time, through augmented reality. In this cutting-edge book, the authors outline and discuss never-before-publish... information about augmented reality and its capabilities. With coverage of mobile, desktop, developers, security, challenges, and gaming, this book gives you a comprehensive understanding of what augmented reality is, what it can do, what is in store for the future and most importantly: how to benefit from using AR in our lives and careers.
  • The Basics of Cyber Warfare

    Understanding the Fundamentals of Cyber Warfare in Theory and Practice
    • 1st Edition
    • Jason Andress + 1 more
    • English
    The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology. The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
  • Data Insights

    New Ways to Visualize and Make Sense of Data
    • 1st Edition
    • Hunter Whitney
    • English
    Data Insights: New Ways to Visualize and Make Sense of Data offers thought-provoking insights into how visualization can foster a clearer and more comprehensive understanding of data. The book offers perspectives from people with different backgrounds, including data scientists, statisticians, painters, and writers. It argues that all data is useless, or misleading, if we do not know what it means.Organized into seven chapters, the book explores some of the ways that data visualization and other emerging approaches can make data meaningful and therefore useful. It also discusses some fundamental ideas and basic questions in the data lifecycle; the process of interactions between people, data, and displays that lead to better questions and more useful answers; and the fundamentals, origins, and purposes of the basic building blocks that are used in data visualization. The reader is introduced to tried and true approaches to understanding users in the context of user interface design, how communications can get distorted, and how data visualization is related to thinking machines. Finally, the book looks at the future of data visualization by assessing its strengths and weaknesses. Case studies from business analytics, healthcare, network monitoring, security, and games, among others, as well as illustrations, thought-provoking quotes, and real-world examples are included.This book will prove useful to computer professionals, technical marketing professionals, content strategists, Web and product designers, and researchers.
  • CUDA Programming

    A Developer's Guide to Parallel Computing with GPUs
    • 1st Edition
    • Shane Cook
    • English
    If you need to learn CUDA but don't have experience with parallel computing, CUDA Programming: A Developer's Introduction offers a detailed guide to CUDA with a grounding in parallel fundamentals. It starts by introducing CUDA and bringing you up to speed on GPU parallelism and hardware, then delving into CUDA installation. Chapters on core concepts including threads, blocks, grids, and memory focus on both parallel and CUDA-specific issues. Later, the book demonstrates CUDA in practice for optimizing applications, adjusting to new hardware, and solving common problems.
  • Heterogeneous Computing with OpenCL

    Revised OpenCL 1.2 Edition
    • 2nd Edition
    • Benedict Gaster + 4 more
    • English
    Heterogeneous Computing with OpenCL, Second Edition teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology. It is the first textbook that presents OpenCL programming appropriate for the classroom and is intended to support a parallel programming course. Students will come away from this text with hands-on experience and significant knowledge of the syntax and use of OpenCL to address a range of fundamental parallel algorithms. Designed to work on multiple platforms and with wide industry support, OpenCL will help you more effectively program for a heterogeneous future. Written by leaders in the parallel computing and OpenCL communities, Heterogeneous Computing with OpenCL explores memory spaces, optimization techniques, graphics interoperability, extensions, and debugging and profiling. It includes detailed examples throughout, plus additional online exercises and other supporting materials that can be downloaded at http://www.heterogen... This book will appeal to software engineers, programmers, hardware engineers, and students/advanced students.
  • Violent Python

    A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
    • 1st Edition
    • TJ O'Connor
    • English
    Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
  • Computer and Information Security Handbook

    • 2nd Edition
    • John Vacca
    • English
    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.