Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • IMS Application Developer's Handbook

    Creating and Deploying Innovative IMS Applications
    • 1st Edition
    • Rogier Noldus + 5 more
    • English
    IMS Application Developer’s Handbook gives a hands-on view of exactly what needs to be done by IMS application developers to develop an application and take it "live" on an operator’s network. It offers practical guidance on building innovative applications using the features and capabilities of the IMS network, and shows how the rapidly changing development environment is impacting on the business models employed in the industry and how existing network solutions can be moved towards IMS. Elaborating on how IMS applies basic VoIP principles and techniques to realize a true multi-access, and multimedia network, this book ensures that developers know how to use IMS most effectively for applications. Written by established experts in the IMS core network and IMS service layer, with roots in ISDN and GSM, with experience from working at Ericsson, who have been active in standardisation and technology development and who have been involved in many customer projects for the implementation of fixed mobile converged IMS network and service. The authors of this book bring their in-depth and extensive knowledge in the organizations involved in the IMS standardization and its architecture.
  • Penetration Tester's Open Source Toolkit

    • 3rd Edition
    • Jeremy Faircloth
    • English
    Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation. This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack. This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.
  • Deploying Next Generation Multicast-enabled Applications

    Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet
    • 1st Edition
    • Vinod Joseph + 1 more
    • English
    Deploying Next Generation Multicast-Enabled Applications: Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet provides a comprehensive discussion of Multicast and MVPN standards—next-gener... Multicast-based standards, Multicast Applications, and case studies with detailed configurations. Focusing on three vendors—Juniper, Cisco, and Alcatel-Lucent—the text features illustrations that contain configurations of JUNOS, TiMOS (Alcatel’s OS), or Cisco IOS, and each configuration is explained in great detail. Multiple- rather than single-vendor configurations were selected for the sake of diversity as well as to highlight the direction in which the overall industry is going rather than that of a specific vendor. Beginning with a discussion of the building blocks or basics of IP Multicast, the book then details applications and emerging trends, including vendor adoptions, as well as the future of Multicast.The book is written for engineers, technical managers, and visionaries engaged in the development of next-generation IP Multicast infrastructures.
  • Computer Technology for Textiles and Apparel

    • 1st Edition
    • Jinlian Hu
    • English
    Computer technology has transformed textiles from their design through to their manufacture and has contributed to significant advances in the textile industry. Computer technology for textiles and apparel provides an overview of these innovative developments for a wide range of applications, covering topics including structure and defect analysis, modelling and simulation, and apparel design.The book is divided into three parts. Part one provides a review of different computer-based technologies suitable for textile materials, and includes chapters on computer technology for yarn and fabric structure analysis, defect analysis and measurement. Chapters in part two discuss modelling and simulation principles of fibres, yarns, textiles and garments, while part three concludes with a review of computer-based technologies specific to apparel and apparel design, with themes ranging from 3D body scanning to the teaching of computer-aided design to fashion students.With its distinguished editor and international team of expert contributors, Computer technology for textiles and apparel is an invaluable tool for a wide range of people involved in the textile industry, from designers and manufacturers to fibre scientists and quality inspectors.
  • Systems Thinking

    Managing Chaos and Complexity: A Platform for Designing Business Architecture
    • 3rd Edition
    • Jamshid Gharajedaghi
    • English
    Systems Thinking, Third Edition combines systems theory and interactive design to provide an operational methodology for defining problems and designing solutions in an environment increasingly characterized by chaos and complexity. This new edition has been updated to include all new chapters on self-organizing systems as well as holistic, operational, and design thinking. The book covers recent crises in financial systems and job markets, the housing bubble, and environment, assessing their impact on systems thinking. A companion website is available at interactdesign.com. This volume is ideal for senior executives as well as for chief information/operatin... officers and other executives charged with systems management and process improvement. It may also be a helpful resource for IT/MBA students and academics.
  • Information Dynamics in Virtual Worlds

    Gaming and Beyond
    • 1st Edition
    • Woody Evans
    • English
    Presents a broad examination of the nature of virtual worlds and the potential they provide in managing and expressing information practices through that medium, grounding information professionals and students of new media in the fundamental elements of virtual worlds and online gaming. The book details the practical issues in finding and using information in virtual environments and presents a general theory of librarianship as it relates to virtual gaming worlds. It is encompassed by a set of best practice methods that libraries can effectively execute in their own environments, meeting the needs of this new generation of library user, and explores ways in which information literacy can be approached in virtual worlds. Final chapters examine how conventional information evaluation skills work falls short in virtual worlds online.
  • The Basics of Information Security

    Understanding the Fundamentals of InfoSec in Theory and Practice
    • 1st Edition
    • Jason Andress
    • English
    The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use. The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom. This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field.
  • Data Mining: Concepts and Techniques

    • 3rd Edition
    • Jiawei Han + 2 more
    • English
    Data Mining: Concepts and Techniques provides the concepts and techniques in processing gathered data or information, which will be used in various applications. Specifically, it explains data mining and the tools used in discovering knowledge from the collected data. This book is referred as the knowledge discovery from data (KDD). It focuses on the feasibility, usefulness, effectiveness, and scalability of techniques of large data sets. After describing data mining, this edition explains the methods of knowing, preprocessing, processing, and warehousing data. It then presents information about data warehouses, online analytical processing (OLAP), and data cube technology. Then, the methods involved in mining frequent patterns, associations, and correlations for large data sets are described. The book details the methods for data classification and introduces the concepts and methods for data clustering. The remaining chapters discuss the outlier detection and the trends, applications, and research frontiers in data mining. This book is intended for Computer Science students, application developers, business professionals, and researchers who seek information on data mining.
  • Heuristic Search

    Theory and Applications
    • 1st Edition
    • Stefan Edelkamp + 1 more
    • English
    Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as pattern databases and search with efficient use of external memory and parallel processing units on main boards and graphics cards are detailed. Heuristic search as a problem solving tool is demonstrated in applications for puzzle solving, game playing, constraint satisfaction and machine learning. While no previous familiarity with heuristic search is necessary the reader should have a basic knowledge of algorithms, data structures, and calculus. Real-world case studies and chapter ending exercises help to create a full and realized picture of how search fits into the world of artificial intelligence and the one around us.
  • Security on the Web

    • 1st Edition
    • Volume 83
    • Marvin Zelkowitz
    • English
    Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field.