Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Engineering a Compiler

      • 2nd Edition
      • January 18, 2011
      • Keith D. Cooper + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 9 1 6 6 1 3
      This entirely revised second edition of Engineering a Compiler is full of technical updates and new material covering the latest developments in compiler technology. In this comprehensive text you will learn important techniques for constructing a modern compiler. Leading educators and researchers Keith Cooper and Linda Torczon combine basic principles with pragmatic insights from their experience building state-of-the-art compilers. They will help you fully understand important techniques such as compilation of imperative and object-oriented languages, construction of static single assignment forms, instruction scheduling, and graph-coloring register allocation.
    • Heuristic Search

      • 1st Edition
      • May 31, 2011
      • Stefan Edelkamp + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 2 5 1 2 7
      • eBook
        9 7 8 0 0 8 0 9 1 9 7 3 7
      Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as pattern databases and search with efficient use of external memory and parallel processing units on main boards and graphics cards are detailed. Heuristic search as a problem solving tool is demonstrated in applications for puzzle solving, game playing, constraint satisfaction and machine learning. While no previous familiarity with heuristic search is necessary the reader should have a basic knowledge of algorithms, data structures, and calculus. Real-world case studies and chapter ending exercises help to create a full and realized picture of how search fits into the world of artificial intelligence and the one around us.
    • Probabilities and Potential, B

      • 1st Edition
      • Volume 72
      • August 18, 2011
      • C. Dellacherie + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 5 7 6 3 6
      • eBook
        9 7 8 0 0 8 0 8 7 1 8 3 7
    • Digital Forensics for Legal Professionals

      • 1st Edition
      • September 2, 2011
      • Larry Daniel + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 4 3 8
      • eBook
        9 7 8 1 5 9 7 4 9 6 4 4 5
      Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors’ years of experience in working with attorneys as digital forensics experts, common questions arise again and again: "What do I ask for?" "Is the evidence relevant?" "What does this item in the forensic report mean?" "What should I ask the other expert?" "What should I ask you?" "Can you explain that to a jury?" This book answers many of those questions in clear language that is understandable by non-technical people. With many illustrations and diagrams that will be usable in court, it explains technical concepts such as unallocated space, forensic copies, timeline artifacts and metadata in simple terms that make these concepts accessible to both attorneys and juries. The book also explains how to determine what evidence to ask for, evidence that might be discoverable, and furthermore, it provides an overview of the current state of digital forensics, the right way to select a qualified expert, what to expect from that expert, and how to properly use experts before and during trial. With this book, readers will clearly understand different types of digital evidence and examples of direct and cross examination questions. It includes a reference of definitions of digital forensic terms, relevant case law, and resources. This book will be a valuable resource for attorneys, judges, paralegals, and digital forensic professionals.
    • Probabilities and Potential, C

      • 1st Edition
      • Volume 151
      • August 18, 2011
      • C. Dellacherie + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 5 7 0 7 0
      • eBook
        9 7 8 0 0 8 0 8 7 2 6 2 9
      This third volume of the monograph examines potential theory. The first chapter develops potential theory with respect to a single kernel (or discrete time semigroup). All the essential ideas of the theory are presented: excessive functions, reductions, sweeping, maximum principle. The second chapter begins with a study of the notion of reduction in the most general situation possible - the ``gambling house'' of Dubins and Savage. The beautiful results presented have never been made accessible to a wide public. These are then connected with the theory of sweeping with respect to a cone of continuous functions, and the integral representation in compact convex sets. The third chapter presents new or little-known results, with the aim of illustrating the effectiveness of capacitary methods in the most varied fields. The last two chapters are concerned with the theory of resolvents.The fourth and last part of the English edition will be devoted to the theory of Markov processes.
    • An Introduction to Parallel Programming

      • 1st Edition
      • January 7, 2011
      • Peter Pacheco
      • English
      • eBook
        9 7 8 0 0 8 0 9 2 1 4 4 0
      An Introduction to Parallel Programming is the first undergraduate text to directly address compiling and running parallel programs on the new multi-core and cluster architecture. It explains how to design, debug, and evaluate the performance of distributed and shared-memory programs. The author Peter Pacheco uses a tutorial approach to show students how to develop effective parallel programs with MPI, Pthreads, and OpenMP, starting with small programming examples and building progressively to more challenging ones. The text is written for students in undergraduate parallel programming or parallel computing courses designed for the computer science major or as a service course to other departments; professionals with no background in parallel computing.
    • Industrial Network Security

      • 1st Edition
      • August 15, 2011
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 4 5 2
      • eBook
        9 7 8 1 5 9 7 4 9 6 4 6 9
      Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. It also discusses common pitfalls and mistakes and how to avoid them. After reading this book, students will understand and address the unique security concerns that face the world's most important networks. This book examines the unique protocols and applications that are the foundation of industrial control systems and provides comprehensive guidelines for their protection. Divided into 11 chapters, it explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also explores industrial networks as they relate to "critical infrastructure" and cyber security; potential risks and consequences of a cyber attack against an industrial control system; compliance controls in relation to network security practices; industrial network protocols such as Modbus and DNP3; assessment of vulnerabilities and risk; how to secure enclaves; regulatory compliance standards applicable to industrial network security; and common pitfalls and mistakes, like complacency and deployment errors. This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines. It will also appeal to IT and security professionals working on networks and control systems operations.
    • Architecture and Patterns for IT Service Management, Resource Planning, and Governance

      • 2nd Edition
      • September 23, 2011
      • Charles T. Betz
      • English
      • Paperback
        9 7 8 0 1 2 3 8 5 0 1 7 1
      • eBook
        9 7 8 0 1 2 3 8 5 0 1 8 8
      Information technology supports efficient operations, enterprise integration, and seamless value delivery, yet itself is too often inefficient, un-integrated, and of unclear value. This completely rewritten version of the bestselling Architecture and Patterns for IT Service Management, Resource Planning and Governance retains the original (and still unique) approach: apply the discipline of enterprise architecture to the business of large scale IT management itself. Author Charles Betz applies his deep practitioner experience to a critical reading of ITIL 2011, COBIT version 4, the CMMI suite, the IT portfolio management literature, and the Agile/Lean IT convergence, and derives a value stream analysis, IT semantic model, and enabling systems architecture (covering current topics such as CMDB/CMS, Service Catalog, and IT Portfolio Management). Using the concept of design patterns, the book then presents dozens of visual models documenting challenging problems in integrating IT management, showing how process, data, and IT management systems must work together to enable IT and its business partners. The edition retains the fundamental discipline of traceable process, data, and system analysis that has made the first edition a favored desk reference for IT process analysts around the world. This best seller is a must read for anyone charged with enterprise architecture, IT planning, or IT governance and management.