Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Towards A Semantic Web

      • 1st Edition
      • January 14, 2011
      • Bill Cope + 2 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 0 1 2
      • eBook
        9 7 8 1 7 8 0 6 3 1 7 4 5
      This book addresses the question of how knowledge is currently documented, and may soon be documented in the context of what it calls ‘semantic publishing’. This takes two forms: a more narrowly and technically defined ‘semantic web’; as well as a broader notion of semantic publishing. This book examines the ways in which knowledge is represented in journal articles and books. By contrast, it goes on to explore the potential impacts of semantic publishing on academic research and authorship. It sets this in the context of changing knowledge ecologies: the way research is done; the way knowledge is represented and; the modes of knowledge access used by researchers, students and the general public.
    • Do You Web 2.0?

      • 1st Edition
      • May 3, 2011
      • Linda Berube
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 4 3 6 0
      • Hardback
        9 7 8 1 8 4 3 3 4 4 3 7 7
      • eBook
        9 7 8 1 7 8 0 6 3 2 5 6 8
      Web 2.0 technology is a hot topic at the moment, and public librarians in particular are beginning to feel the pressure to apply these tools. Indeed, Web 2.0 has the potential to transform library services, but only if the policy and strategy for those services are ready to be transformed. The author not only reviews these tools and provides practical advice and case studies on how they can be applied in the public library setting, but also recommends the policies and business cases that begin to create a new strategy for public libraries.
    • Computer Technology for Textiles and Apparel

      • 1st Edition
      • July 14, 2011
      • Jinlian Hu
      • English
      • Paperback
        9 7 8 0 0 8 1 0 1 7 0 3 6
      • Hardback
        9 7 8 1 8 4 5 6 9 7 2 9 7
      • eBook
        9 7 8 0 8 5 7 0 9 3 6 0 8
      Computer technology has transformed textiles from their design through to their manufacture and has contributed to significant advances in the textile industry. Computer technology for textiles and apparel provides an overview of these innovative developments for a wide range of applications, covering topics including structure and defect analysis, modelling and simulation, and apparel design.The book is divided into three parts. Part one provides a review of different computer-based technologies suitable for textile materials, and includes chapters on computer technology for yarn and fabric structure analysis, defect analysis and measurement. Chapters in part two discuss modelling and simulation principles of fibres, yarns, textiles and garments, while part three concludes with a review of computer-based technologies specific to apparel and apparel design, with themes ranging from 3D body scanning to the teaching of computer-aided design to fashion students.With its distinguished editor and international team of expert contributors, Computer technology for textiles and apparel is an invaluable tool for a wide range of people involved in the textile industry, from designers and manufacturers to fibre scientists and quality inspectors.
    • Managing Image Collections

      • 1st Edition
      • February 3, 2011
      • Margot Note
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 9 9 2
      • eBook
        9 7 8 1 7 8 0 6 3 0 5 6 4
      This book explores issues surrounding all aspects of visual collection management, taken from real-world experience in creating management systems and digitizing core content. Readers will gain the knowledge to manage the digitization process from beginning to end, assess and define the needs of their particular project, and evaluate digitization options. Additionally, they will select strategies which best meet current and future needs, acquire the knowledge to select the best images for digitization, and understand the legal issues surrounding digitization of visual collections.
    • Cybercrime and Espionage

      • 1st Edition
      • January 7, 2011
      • Will Gragido + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 1 3 1
      • eBook
        9 7 8 1 5 9 7 4 9 6 1 4 8
      Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.
    • Windows Registry Forensics

      • 1st Edition
      • January 3, 2011
      • Harlan Carvey
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 5 8 1 3
      Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques are presented that take the student and analyst beyond the current use of viewers and into real analysis of data contained in the Registry, demonstrating the forensic value of the Registry. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this book is packed with real-world examples using freely available open source tools. It also includes case studies and a CD containing code and author-created tools discussed in the book. This book will appeal to computer forensic and incident response professionals, including federal government and commercial/private sector contractors, consultants, etc.
    • Theories of Computational Complexity

      • 1st Edition
      • Volume 35
      • August 18, 2011
      • C. Calude
      • English
      • Paperback
        9 7 8 0 4 4 4 5 5 7 0 4 9
      • Hardback
        9 7 8 0 4 4 4 7 0 3 5 6 9
      • eBook
        9 7 8 0 0 8 0 8 6 7 7 5 5
      This volume presents four machine-independent theories of computational complexity, which have been chosen for their intrinsic importance and practical relevance. The book includes a wealth of results - classical, recent, and others which have not been published before.In developing the mathematics underlying the size, dynamic and structural complexity measures, various connections with mathematical logic, constructive topology, probability and programming theories are established. The facts are presented in detail. Extensive examples are provided, to help clarify notions and constructions. The lists of exercises and problems include routine exercises, interesting results, as well as some open problems.
    • Penetration Tester's Open Source Toolkit

      • 3rd Edition
      • July 18, 2011
      • Jeremy Faircloth
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 6 2 8 5
      Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation. This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack. This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.
    • Building Your Library Career with Web 2.0

      • 1st Edition
      • November 9, 2011
      • Julia Gross
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 5 1 7
      • eBook
        9 7 8 1 7 8 0 6 3 2 8 9 6
      Many professionals in the Library and Information Services (LIS) area are using Web 2.0 to deliver content and reaching out to connect with library users. This book applies these technologies to help shape your own career development plan. Increased online connectivity has opened up new opportunities for professionals to network, learn and grow in their careers; in an online world, where many of us have a digital footprint already, new rules apply. This readable guide builds on the solid foundation of previous library career books. The social networking tools described will supplement the traditional methods of career development. Chapters provide advice and practical examples, showing how to use Web 2.0 technologies in our careers including: ways to enhance your skills; building professional networks; developing a positive online presence.