Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Digital Evidence and Computer Crime

      • 3rd Edition
      • April 12, 2011
      • Eoghan Casey
      • English
      • Paperback
        9 7 8 0 1 2 8 1 0 3 2 8 9
      • Hardback
        9 7 8 0 1 2 3 7 4 2 6 8 1
      • eBook
        9 7 8 0 0 8 0 9 2 1 4 8 8
      Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks. This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks. New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides. This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).
    • Network Simulation Experiments Manual

      • 3rd Edition
      • March 3, 2011
      • Emad Aboelela
      • English
      • Paperback
        9 7 8 0 1 2 3 8 5 2 1 0 6
      • eBook
        9 7 8 0 1 2 3 8 5 2 1 1 3
      Network Simulation Experiments Manual, Third Edition, is a practical tool containing detailed, simulation-based experiments to help students and professionals learn about key concepts in computer networking. It allows the networking professional to visualize how computer networks work with the aid of a software tool called OPNET to simulate network function. OPNET provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies. It can be downloaded free of charge and is easy to install.The book’s simulation approach provides a virtual environment for a wide range of desirable features, such as modeling a network based on specified criteria and analyzing its performance under different scenarios. The experiments include the basics of using OPNET IT Guru Academic Edition; operation of the Ethernet network; partitioning of a physical network into separate logical networks using virtual local area networks (VLANs); and the basics of network design. Also covered are congestion control algorithms implemented by the Transmission Control Protocol (TCP); the effects of various queuing disciplines on packet delivery and delay for different services; and the role of firewalls and virtual private networks (VPNs) in providing security to shared public networks. Each experiment in this updated edition is accompanied by review questions, a lab report, and exercises.Networking designers and professionals as well as graduate students will find this manual extremely helpful.
    • Distributed and Cloud Computing

      • 1st Edition
      • October 17, 2011
      • Kai Hwang + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 8 5 8 8 0 1
      • eBook
        9 7 8 0 1 2 8 0 0 2 0 4 9
      Distributed and Cloud Computing: From Parallel Processing to the Internet of Things offers complete coverage of modern distributed computing technology including clusters, the grid, service-oriented architecture, massively parallel processors, peer-to-peer networking, and cloud computing. It is the first modern, up-to-date distributed systems textbook; it explains how to create high-performance, scalable, reliable systems, exposing the design principles, architecture, and innovative applications of parallel, distributed, and cloud computing systems. Topics covered by this book include: facilitating management, debugging, migration, and disaster recovery through virtualization; clustered systems for research or ecommerce applications; designing systems as web services; and social networking systems using peer-to-peer computing. The principles of cloud computing are discussed using examples from open-source and commercial applications, along with case studies from the leading distributed computing vendors such as Amazon, Microsoft, and Google. Each chapter includes exercises and further reading, with lecture slides and more available online. This book will be ideal for students taking a distributed systems or distributed computing class, as well as for professional system designers and engineers looking for a reference to the latest distributed technologies including cloud, P2P and grid computing.
    • Computer Organization and Design

      • 4th Edition
      • October 13, 2011
      • David A. Patterson + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 7 5 0 1
      • eBook
        9 7 8 0 0 8 0 8 8 6 1 3 8
      Computer Organization and Design, Fourth Edition, has been updated with new exercises and improvements throughout suggested by instructors teaching from the book. It covers the revolutionary change from sequential to parallel computing, with a chapter on parallelism and sections in every chapter highlighting parallel hardware and software topics. It includes an appendix by the Chief Scientist and the Director of Architecture of NVIDIA covering the emergence and importance of the modern GPU, describing in detail for the first time the highly parallel, highly multithreaded multiprocessor optimized for visual computing. A companion CD provides a toolkit of simulators and compilers along with tutorials for using them, as well as advanced content for further study and a search utility for finding content on the CD and in the printed text. For the convenience of readers who have purchased an ebook edition or who may have misplaced the CD-ROM, all CD content is available as a download at bit.ly/nFXcLq. This book is recommended for professional digital system designers, programmers, application developers, and system software developers; and undergraduate students in Computer Science, Computer Engineering and Electrical Engineering courses in Computer Organization, Computer Design, ranging from Sophomore required courses to Senior Electives.
    • Advances in Computers

      • 1st Edition
      • Volume 82
      • March 31, 2011
      • Marvin Zelkowitz
      • English
      • Hardback
        9 7 8 0 1 2 3 8 5 5 1 2 1
      • eBook
        9 7 8 0 1 2 3 8 5 5 1 3 8
      This series, since its first volume in 1960 and now the oldest series still being published, covers new developments in computer technology. Each volume contains 5 to 7 chapters, and 3 volumes are produced annually. Most chapters present an overview of a current subfield within computer science, including many citations and often new developments in the field by the authors of the individual chapters. Topics include hardware, software, web technology, communications, theoretic underpinnings of computing and novel applications of computers. The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume, as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described.
    • The Internet and Mobile Technology

      • 1st Edition
      • Volume 81
      • March 9, 2011
      • Marvin Zelkowitz
      • English
      • Hardback
        9 7 8 0 1 2 3 8 5 5 1 4 5
      • eBook
        9 7 8 0 1 2 3 8 5 5 1 5 2
      This series, since its first volume in 1960 and now the oldest series still being published, covers new developments in computer technology. Each volume contains from 5 to 7 chapters and 3 volumes are produced annually. Most chapters present an overview of a current subfield within computer science, include many citations, and often new developments in the field by the authors of the individual chapters. Topics include hardware, software, web technology, communications, theoretical underpinnings of computing, and novel applications of computers. The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described.
    • Cyber Warfare

      • 1st Edition
      • June 1, 2011
      • Jason Andress + 1 more
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 6 3 8 4
      Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The concepts discussed will give students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It considers relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Starting with a definition of cyber warfare, the book’s 15 chapters discuss the following topics: the cyberspace battlefield; cyber doctrine; cyber warriors; logical, physical, and psychological weapons; computer network exploitation; computer network attack and defense; non-state actors in computer network operations; legal system impacts; ethics in cyber warfare; cyberspace challenges; and the future of cyber war. This book is a valuable resource to those involved in cyber warfare activities, including policymakers, penetration testers, security professionals, network and systems administrators, and college instructors. The information provided on cyber tactics and attacks can also be used to assist in developing improved and more efficient procedures and technical defenses. Managers will find the text useful in improving the overall risk management strategies for their organizations.
    • The Basics of Information Security

      • 1st Edition
      • June 10, 2011
      • Jason Andress
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 5 3 7
      • eBook
        9 7 8 1 5 9 7 4 9 6 5 4 4
      The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use. The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom. This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field.
    • Securing the Cloud

      • 1st Edition
      • April 21, 2011
      • Vic (J.R.) Winkler
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 9 2 9
      • eBook
        9 7 8 1 5 9 7 4 9 5 9 3 6
      Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The cloud offers flexibility, adaptability, scalability, and in the case of security - resilience. Securing the Cloud explains how to make the move to the cloud, detailing the strengths and weaknesses of securing a company's information with different cloud approaches. It offers a clear and concise framework to secure a business' assets while making the most of this new technology.This book considers alternate approaches for securing a piece of the cloud, such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust. It discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery. It also describes the benefits of moving to the cloud - solving for limited availability of space, power, and storage.This book will appeal to network and security IT staff and management responsible for design, implementation and management of IT structures from admins to CSOs, CTOs, CIOs and CISOs.
    • Low Tech Hacking

      • 1st Edition
      • December 13, 2011
      • Terry Gudaitis + 4 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 6 5 0
      • eBook
        9 7 8 1 5 9 7 4 9 6 6 6 7
      Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.