Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • An Analysis of the Information Technology Standardization Process

    • 1st Edition
    • December 2, 2012
    • J.L. Berg + 1 more
    • English
    A number of important issues form the basis of this book: How can the Information Technology (IT) standardization process, leading to unified products which are needed on the market, be made more efficient? Which current IT standards are of high quality, what factors have led to that high quality, and can those factors be re-created for other IT standards? What improvements to the quality of IT standards are needed? Which organizations should be involved? What permanent changes in the IT standardization scene are necessary? At what point in the evolution of a technology is it appropriate to produce standards? Is strategic planning feasible in the current standardization approach? Diverse disciplines contributed to the findings in this book: computer scientists, standardization leaders and professionals, users and vendors, economists, auditors, software implementors, and communication specialists.
  • An Introduction to Programming with Specifications

    • 1st Edition
    • December 2, 2012
    • Bozzano G Luisa
    • English
    A feature of modern advanced computing is the functional approach to programming. In this book, the authors present an introduction to the mathematics which underline functional programming, emphasizing the understanding of definition and specification--a prerequisite of good programming and problem solving with a computer. The book is self-contained, requiring a low level of mathematical sophistication and may be used as an introduction to the mathematics of programming.
  • New Trends in System Reliability Evaluation

    • 1st Edition
    • December 2, 2012
    • K.B. Misra
    • English
    The subject of system reliability evaluation has never been so extensively and incisively discussed as in the present volume. The book fills a gap in the existing literature on the subject by highlighting the shortcomings of the current state-of-the-art and focusing on on-going efforts aimed at seeking better models, improved solutions and alternative approaches to the problem of system reliability evaluation. The book's foremost objective is to provide an insight into developments that are likely to revolutionize the art and science in the near future. At the same time it will help serve as a benchmark for the reader not only to understand and appreciate the newer developments but to profitably guide him in reorienting his efforts. This book will be valuable for people working in various industries, research organizations, particularly in electrical and electronics, defence, nuclear, chemical, space and communciation systems. It will also be useful for serious-minded students, teachers, and for the laboratories of educational institutions.
  • Logging and Log Management

    The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
    • 1st Edition
    • November 29, 2012
    • Kevin Schmidt + 2 more
    • English
    Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis. This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers.
  • Federal Cloud Computing

    The Definitive Guide for Cloud Service Providers
    • 1st Edition
    • November 27, 2012
    • Matthew Metheny
    • English
    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis.
  • FISMA and the Risk Management Framework

    The New Practice of Federal Cyber Security
    • 1st Edition
    • November 27, 2012
    • Daniel R. Philpott + 1 more
    • English
    FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems.
  • Applications of ATILA FEM Software to Smart Materials

    Case Studies in Designing Devices
    • 1st Edition
    • November 27, 2012
    • Kenji Uchino + 1 more
    • English
    ATILA Finite Element Method (FEM) software facilitates the modelling and analysis of applications using piezoelectric, magnetostrictor and shape memory materials. It allows entire designs to be constructed, refined and optimized before production begins. Through a range of instructive case studies, Applications of ATILA FEM software to smart materials provides an indispensable guide to the use of this software in the design of effective products.Part one provides an introduction to ATILA FEM software, beginning with an overview of the software code. New capabilities and loss integration are discussed, before part two goes on to present case studies of finite element modelling using ATILA. The use of ATILA in finite element analysis, piezoelectric polarization, time domain analysis of piezoelectric devices and the design of ultrasonic motors is considered, before piezo-composite and photonic crystal applications are reviewed. The behaviour of piezoelectric single crystals for sonar and thermal analysis in piezoelectric and magnetostrictive materials is also discussed, before a final reflection on the use of ATILA in modelling the damping of piezoelectric structures and the behaviour of single crystal devices.With its distinguished editors and international team of expert contributors, Applications of ATILA FEM software to smart materials is a key reference work for all those involved in the research, design, development and application of smart materials, including electrical and mechanical engineers, academics and scientists working in piezoelectrics, magenetostrictors and shape memory materials.
  • Augmented Reality

    An Emerging Technologies Guide to AR
    • 1st Edition
    • November 19, 2012
    • Joseph Rampolla + 1 more
    • English
    With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is brought into view, in real-time, through augmented reality. In this cutting-edge book, the authors outline and discuss never-before-publish... information about augmented reality and its capabilities. With coverage of mobile, desktop, developers, security, challenges, and gaming, this book gives you a comprehensive understanding of what augmented reality is, what it can do, what is in store for the future and most importantly: how to benefit from using AR in our lives and careers.
  • The Basics of Cyber Warfare

    Understanding the Fundamentals of Cyber Warfare in Theory and Practice
    • 1st Edition
    • November 16, 2012
    • Jason Andress + 1 more
    • English
    The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology. The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
  • Data Insights

    New Ways to Visualize and Make Sense of Data
    • 1st Edition
    • November 13, 2012
    • Hunter Whitney
    • English
    Data Insights: New Ways to Visualize and Make Sense of Data offers thought-provoking insights into how visualization can foster a clearer and more comprehensive understanding of data. The book offers perspectives from people with different backgrounds, including data scientists, statisticians, painters, and writers. It argues that all data is useless, or misleading, if we do not know what it means.Organized into seven chapters, the book explores some of the ways that data visualization and other emerging approaches can make data meaningful and therefore useful. It also discusses some fundamental ideas and basic questions in the data lifecycle; the process of interactions between people, data, and displays that lead to better questions and more useful answers; and the fundamentals, origins, and purposes of the basic building blocks that are used in data visualization. The reader is introduced to tried and true approaches to understanding users in the context of user interface design, how communications can get distorted, and how data visualization is related to thinking machines. Finally, the book looks at the future of data visualization by assessing its strengths and weaknesses. Case studies from business analytics, healthcare, network monitoring, security, and games, among others, as well as illustrations, thought-provoking quotes, and real-world examples are included.This book will prove useful to computer professionals, technical marketing professionals, content strategists, Web and product designers, and researchers.