Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Probabilities and Potential, B

      • 1st Edition
      • Volume 72
      • August 18, 2011
      • C. Dellacherie + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 5 7 6 3 6
      • eBook
        9 7 8 0 0 8 0 8 7 1 8 3 7
    • Probabilities and Potential, C

      • 1st Edition
      • Volume 151
      • August 18, 2011
      • C. Dellacherie + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 5 7 0 7 0
      • eBook
        9 7 8 0 0 8 0 8 7 2 6 2 9
      This third volume of the monograph examines potential theory. The first chapter develops potential theory with respect to a single kernel (or discrete time semigroup). All the essential ideas of the theory are presented: excessive functions, reductions, sweeping, maximum principle. The second chapter begins with a study of the notion of reduction in the most general situation possible - the ``gambling house'' of Dubins and Savage. The beautiful results presented have never been made accessible to a wide public. These are then connected with the theory of sweeping with respect to a cone of continuous functions, and the integral representation in compact convex sets. The third chapter presents new or little-known results, with the aim of illustrating the effectiveness of capacitary methods in the most varied fields. The last two chapters are concerned with the theory of resolvents.The fourth and last part of the English edition will be devoted to the theory of Markov processes.
    • Theories of Computational Complexity

      • 1st Edition
      • Volume 35
      • August 18, 2011
      • C. Calude
      • English
      • Paperback
        9 7 8 0 4 4 4 5 5 7 0 4 9
      • Hardback
        9 7 8 0 4 4 4 7 0 3 5 6 9
      • eBook
        9 7 8 0 0 8 0 8 6 7 7 5 5
      This volume presents four machine-independent theories of computational complexity, which have been chosen for their intrinsic importance and practical relevance. The book includes a wealth of results - classical, recent, and others which have not been published before.In developing the mathematics underlying the size, dynamic and structural complexity measures, various connections with mathematical logic, constructive topology, probability and programming theories are established. The facts are presented in detail. Extensive examples are provided, to help clarify notions and constructions. The lists of exercises and problems include routine exercises, interesting results, as well as some open problems.
    • Heterogeneous Computing with OpenCL

      • 1st Edition
      • August 17, 2011
      • Benedict Gaster + 4 more
      • English
      • eBook
        9 7 8 0 1 2 3 8 7 7 6 7 3
      Heterogeneous Computing with OpenCL teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology. Designed to work on multiple platforms and with wide industry support, OpenCL will help you more effectively program for a heterogeneous future. Written by leaders in the parallel computing and OpenCL communities, this book will give you hands-on OpenCL experience to address a range of fundamental parallel algorithms. The authors explore memory spaces, optimization techniques, graphics interoperability, extensions, and debugging and profiling. Intended to support a parallel programming course, Heterogeneous Computing with OpenCL includes detailed examples throughout, plus additional online exercises and other supporting materials.
    • Industrial Network Security

      • 1st Edition
      • August 15, 2011
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 4 5 2
      • eBook
        9 7 8 1 5 9 7 4 9 6 4 6 9
      Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. It also discusses common pitfalls and mistakes and how to avoid them. After reading this book, students will understand and address the unique security concerns that face the world's most important networks. This book examines the unique protocols and applications that are the foundation of industrial control systems and provides comprehensive guidelines for their protection. Divided into 11 chapters, it explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also explores industrial networks as they relate to "critical infrastructure" and cyber security; potential risks and consequences of a cyber attack against an industrial control system; compliance controls in relation to network security practices; industrial network protocols such as Modbus and DNP3; assessment of vulnerabilities and risk; how to secure enclaves; regulatory compliance standards applicable to industrial network security; and common pitfalls and mistakes, like complacency and deployment errors. This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines. It will also appeal to IT and security professionals working on networks and control systems operations.
    • IMS Application Developer's Handbook

      • 1st Edition
      • July 20, 2011
      • Rogier Noldus + 5 more
      • English
      • Hardback
        9 7 8 0 1 2 3 8 2 1 9 2 8
      • Paperback
        9 7 8 0 0 8 1 0 1 6 0 1 5
      • eBook
        9 7 8 0 1 2 3 8 2 1 9 3 5
      IMS Application Developer’s Handbook gives a hands-on view of exactly what needs to be done by IMS application developers to develop an application and take it "live" on an operator’s network. It offers practical guidance on building innovative applications using the features and capabilities of the IMS network, and shows how the rapidly changing development environment is impacting on the business models employed in the industry and how existing network solutions can be moved towards IMS. Elaborating on how IMS applies basic VoIP principles and techniques to realize a true multi-access, and multimedia network, this book ensures that developers know how to use IMS most effectively for applications. Written by established experts in the IMS core network and IMS service layer, with roots in ISDN and GSM, with experience from working at Ericsson, who have been active in standardisation and technology development and who have been involved in many customer projects for the implementation of fixed mobile converged IMS network and service. The authors of this book bring their in-depth and extensive knowledge in the organizations involved in the IMS standardization and its architecture.
    • Penetration Tester's Open Source Toolkit

      • 3rd Edition
      • July 18, 2011
      • Jeremy Faircloth
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 6 2 8 5
      Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation. This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack. This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.
    • Deploying Next Generation Multicast-enabled Applications

      • 1st Edition
      • July 15, 2011
      • Vinod Joseph + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 8 4 9 2 3 6
      • eBook
        9 7 8 0 1 2 3 8 4 9 2 4 3
      Deploying Next Generation Multicast-Enabled Applications: Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet provides a comprehensive discussion of Multicast and MVPN standards—next-gener... Multicast-based standards, Multicast Applications, and case studies with detailed configurations. Focusing on three vendors—Juniper, Cisco, and Alcatel-Lucent—the text features illustrations that contain configurations of JUNOS, TiMOS (Alcatel’s OS), or Cisco IOS, and each configuration is explained in great detail. Multiple- rather than single-vendor configurations were selected for the sake of diversity as well as to highlight the direction in which the overall industry is going rather than that of a specific vendor. Beginning with a discussion of the building blocks or basics of IP Multicast, the book then details applications and emerging trends, including vendor adoptions, as well as the future of Multicast.The book is written for engineers, technical managers, and visionaries engaged in the development of next-generation IP Multicast infrastructures.