Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Temporal QOS Management in Scientific Cloud Workflow Systems

      • 1st Edition
      • February 20, 2012
      • Xiao Liu + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 7 0 1 0 7
      • eBook
        9 7 8 0 1 2 3 9 7 2 9 5 8
      Cloud computing can provide virtually unlimited scalable high performance computing resources. Cloud workflows often underlie many large scale data/computation intensive e-science applications such as earthquake modelling, weather forecasting and astrophysics. During application modelling, these sophisticated processes are redesigned as cloud workflows, and at runtime, the models are executed by employing the supercomputing and data sharing ability of the underlying cloud computing infrastructures. Temporal QOS Management in Scientific Cloud Workflow Systems focuses on real world scientific applications which often must be completed by satisfying a set of temporal constraints such as milestones and deadlines. Meanwhile, activity duration, as a measurement of system performance, often needs to be monitored and controlled. This book demonstrates how to guarantee on-time completion of most, if not all, workflow applications. Offering a comprehensive framework to support the lifecycle of time-constrained workflow applications, this book will enhance the overall performance and usability of scientific cloud workflow systems.
    • Writing Effective Business Rules

      • 1st Edition
      • January 27, 2012
      • Graham Witt
      • English
      • Paperback
        9 7 8 0 1 2 3 8 5 0 5 1 5
      • eBook
        9 7 8 0 1 2 3 8 5 0 5 2 2
      Writing Effective Business Rules moves beyond the fundamental dilemma of system design: defining business rules either in natural language, intelligible but often ambiguous, or program code (or rule engine instructions), unambiguous but unintelligible to stakeholders. Designed to meet the needs of business analysts, this book provides an exhaustive analysis of rule types and a set of syntactic templates from which unambiguous natural language rule statements of each type can be generated. A user guide to the SBVR specification, it explains how to develop an appropriate business vocabulary and generate quality rule statements using the appropriate templates and terms from the vocabulary. The resulting rule statements can be reviewed by business stakeholders for relevance and correctness, providing for a high level of confidence in their successful implementation.
    • Content Strategy at Work

      • 1st Edition
      • January 25, 2012
      • Margot Bloomstein
      • English
      • Paperback
        9 7 8 0 1 2 3 9 1 9 2 2 9
      • eBook
        9 7 8 0 1 2 3 9 1 9 2 9 8
      Content is king… and the new kingmaker… and your message needs to align with your model and metrics and other mumbo jumbo, right? Whether you’re slogging through theory or buzzwords, there’s no denying content strategy is coming of age. But what’s in it for you? And if you’re not a content strategist, why should you care? Because even if content strategy isn’t your job, content’s probably your problem—and probably more than you think. You or your business has a message you want to deliver, right? You can deliver that message through various channels and content types, from Tweets to testimonials and photo galleries galore, and your audience has just as many ways of engaging with it. So many ways, so much content… so where’s the problem? That is the problem. And you can measure it in time, creativity, money, lost opportunity, and the sobs you hear equally from creative directors, project managers, and search engine marketing specialists. The solution is content strategy, and this book offers real-world examples and approaches you can adopt, no matter your role on the team. Put content strategy to work for you by gathering this book into your little hands and gobbling up never-before seen case studies from teams at Johns Hopkins Medicine, MINI, Icebreaker, and more. Content Strategy at Work is a book for designers, information architects, copywriters, project managers, and anyone who works with visual or verbal content. It discusses how you can communicate and forge a plan that will enable you, your company, or your client get that message across and foster better user experiences.
    • The UX Book

      • 1st Edition
      • January 25, 2012
      • Rex Hartson + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 8 5 2 4 1 0
      • eBook
        9 7 8 0 1 2 3 8 5 2 4 2 7
      The UX Book: Process and Guidelines for Ensuring a Quality User Experience aims to help readers learn how to create and refine interaction designs that ensure a quality user experience (UX). The book seeks to expand the concept of traditional usability to a broader notion of user experience; to provide a hands-on, practical guide to best practices and established principles in a UX lifecycle; and to describe a pragmatic process for managing the overall development effort. The book provides an iterative and evaluation-centered UX lifecycle template, called the Wheel, for interaction design. Key concepts discussed include contextual inquiry and analysis; extracting interaction design requirements; constructing design-informing models; design production; UX goals, metrics, and targets; prototyping; UX evaluation; the interaction cycle and the user action framework; and UX design guidelines. This book will be useful to anyone interested in learning more about creating interaction designs to ensure a quality user experience. These include interaction designers, graphic designers, usability analysts, software engineers, programmers, systems analysts, software quality-assurance specialists, human factors engineers, cognitive psychologists, cosmic psychics, trainers, technical writers, documentation specialists, marketing personnel, and project managers.
    • Modern Embedded Computing

      • 1st Edition
      • January 25, 2012
      • Peter Barry + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 1 4 9 0 3
      • eBook
        9 7 8 0 1 2 3 9 4 4 0 7 8
      Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems provides a thorough understanding of the platform architecture of modern embedded computing systems that drive mobile devices. The book offers a comprehensive view of developing a framework for embedded systems-on-chips. Examples feature the Intel Atom processor, which is used in high-end mobile devices such as e-readers, Internet-enabled TVs, tablets, and net books. This is a unique book in terms of its approach – moving towards consumer. It teaches readers how to design embedded processors for systems that support gaming, in-vehicle infotainment, medical records retrieval, point-of-sale purchasing, networking, digital storage, and many more retail, consumer and industrial applications. Beginning with a discussion of embedded platform architecture and Intel Atom-specific architecture, modular chapters cover system boot-up, operating systems, power optimization, graphics and multi-media, connectivity, and platform tuning. Companion lab materials complement the chapters, offering hands-on embedded design experience. This text will appeal not only to professional embedded system designers but also to students in computer architecture, electrical engineering, and embedded system design.
    • Digital Video and HD

      • 2nd Edition
      • January 24, 2012
      • Charles Poynton
      • English
      • Hardback
        9 7 8 0 1 2 3 9 1 9 2 6 7
      • eBook
        9 7 8 0 1 2 3 9 1 9 3 2 8
      Digital Video and HD: Algorithms and Interfaces provides a one-stop shop for the theory and engineering of digital video systems. Equally accessible to video engineers and those working in computer graphics, Charles Poynton’s revision to his classic text covers emergent compression systems, including H.264 and VP8/WebM, and augments detailed information on JPEG, DVC, and MPEG-2 systems. This edition also introduces the technical aspects of file-based workflows and outlines the emerging domain of metadata, placing it in the context of digital video processing.
    • Joe Celko's Trees and Hierarchies in SQL for Smarties

      • 2nd Edition
      • January 20, 2012
      • Joe Celko
      • English
      • Paperback
        9 7 8 0 1 2 3 8 7 7 3 3 8
      • eBook
        9 7 8 0 1 2 3 8 7 7 5 6 7
      The demand for SQL information and training continues to grow with the need for a database behind every website capable of offering web-based information queries. SQL is the de facto standard for database retrieval, and if you need to access, update, or utilize data in a modern database management system, you will need SQL to do it. The Second Edition of Joe Celko's Trees and Hierarchies in SQL for Smarties covers two new sets of extensions over three entirely new chapters and expounds upon the changes that have occurred in SQL standards since the previous edition's publication. Benefit from mastering the challenging aspects of these database applications in SQL as taught by Joe Celko, one of the most-read SQL authors in the world.
    • Tcl/Tk

      • 3rd Edition
      • January 17, 2012
      • Clif Flynt
      • English
      • Paperback
        9 7 8 0 1 2 3 8 4 7 1 7 1
      • eBook
        9 7 8 0 1 2 3 8 4 7 1 8 8
      Newly updated with over 150 pages of material on the latest Tcl extensions, Tcl/Tk: A Developer’s Guide is a unique practical tutorial for professional programmers and beginners alike. Starting with a clear picture of the basics, Tcl/Tk covers the variety of tools in this "Swiss army knife" of programming languages, giving you the ability to enhance your programs, extend your application's capabilities, and become a more effective programmer. This updated edition covers all of the new features of version 8.6, including object-oriented programming and the creation of megawidgets, existing data structure implementations, themed widgets and virtual events. Extensive code snippets and online tutorials in various languages will give you a firm grasp on how to use the Tcl/Tk libraries and interpreters and, most importantly, on what constitutes an effective strategy for using Tcl/Tk.
    • Low Tech Hacking

      • 1st Edition
      • December 13, 2011
      • Terry Gudaitis + 4 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 6 5 0
      • eBook
        9 7 8 1 5 9 7 4 9 6 6 6 7
      Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
    • Lifelong Learning for Engineers and Scientists in the Information Age

      • 1st Edition
      • December 6, 2011
      • Ashok Naimpally + 2 more
      • English
      • Paperback
        9 7 8 0 3 2 3 1 6 5 2 1 1
      • Hardback
        9 7 8 0 1 2 3 8 5 2 1 4 4
      • eBook
        9 7 8 0 1 2 3 8 5 2 1 5 1
      The book provides a comprehensive review of lifelong learning, information literacy and internships including assessment techniques for lifelong learning, teamwork and information literacy as defined by the ABET criteria. It also discusses critical thinking skills for scientists and engineers and their role in lifelong learning in the information age. It will be invaluable for: Engineering educators including librarians interested in developing programs to satisfy the ABET criteria for lifelong learning and teamwork. Engineering librarians developing programs and assessment tools for information literacy using online databases and the Internet. Engineering educators and career advisors interested in developing internship programs in engineering. An internship is defined as work performed in an industrial setting that provides practical experience and adds value to the classroom and research learning processes. This book will cover all aspects involved in administering internship and cooperative education programs. Employers of interns will find useful information on needs assessment, program development, evaluation and the importance of lifelong learning; and, Science and engineering educators interested in developing critical thinking skills in their students as an aid to developing lifelong learning skills especially given the challenges in the digital age.