Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Windows Registry Forensics

      • 1st Edition
      • January 3, 2011
      • Harlan Carvey
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 5 8 1 3
      Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques are presented that take the student and analyst beyond the current use of viewers and into real analysis of data contained in the Registry, demonstrating the forensic value of the Registry. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this book is packed with real-world examples using freely available open source tools. It also includes case studies and a CD containing code and author-created tools discussed in the book. This book will appeal to computer forensic and incident response professionals, including federal government and commercial/private sector contractors, consultants, etc.
    • Developing High Quality Data Models

      • 1st Edition
      • December 30, 2010
      • Matthew West
      • English
      • Paperback
        9 7 8 0 1 2 3 7 5 1 0 6 5
      • eBook
        9 7 8 0 1 2 3 7 5 1 0 7 2
      Developing High Quality Data Models provides an introduction to the key principles of data modeling. It explains the purpose of data models in both developing an Enterprise Architecture and in supporting Information Quality; common problems in data model development; and how to develop high quality data models, in particular conceptual, integration, and enterprise data models. The book is organized into four parts. Part 1 provides an overview of data models and data modeling including the basics of data model notation; types and uses of data models; and the place of data models in enterprise architecture. Part 2 introduces some general principles for data models, including principles for developing ontologically based data models; and applications of the principles for attributes, relationship types, and entity types. Part 3 presents an ontological framework for developing consistent data models. Part 4 provides the full data model that has been in development throughout the book. The model was created using Jotne EPM Technologys EDMVisualExpress data modeling tool. This book was designed for all types of modelers: from those who understand data modeling basics but are just starting to learn about data modeling in practice, through to experienced data modelers seeking to expand their knowledge and skills and solve some of the more challenging problems of data modeling.
    • Securing SQL Server

      • 1st Edition
      • December 27, 2010
      • Denny Cherry
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 6 2 6 1
      Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.
    • Using Robots in Hazardous Environments

      • 1st Edition
      • December 20, 2010
      • Y Baudoin + 1 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 1 5 0 3 2
      • eBook
        9 7 8 0 8 5 7 0 9 0 2 0 1
      There have been major recent advances in robotic systems that can replace humans in undertaking hazardous activities in demanding or dangerous environments. Published in association with the CLAWAR (Climbing and Walking Robots and Associated Technologies Association) (www.clawar.org), this important book reviews the development of robotic systems for de-mining and other risky activities such as fire-fighting.Part one provides an overview of the use of robots for humanitarian de-mining work. Part two discusses the development of sensors for mine detection whilst Part thee reviews developments in both teleoperated and autonomous robots. Building on the latter, Part four concentrates on robot autonomous navigation. The final part of the book reviews research on multi-agent-systems (MAS) and the multi-robotics-syste... (MRS), promising tools that take into account modular design of mobile robots and the use of several robots in multi-task missions.With its distinguished editors and international team of contributors, Using robots in hazardous environments: landmine detection, de-mining and other applications is a standard reference for all those researching the use of robots in hazardous environments as well as government and other agencies wishing to use robots for dangerous tasks such as landmine detection and disposal.
    • Understanding Motion Capture for Computer Animation

      • 2nd Edition
      • December 15, 2010
      • Alberto Menache
      • English
      • Paperback
        9 7 8 0 1 2 3 8 1 4 9 6 8
      • eBook
        9 7 8 0 1 2 3 8 1 4 9 7 5
      Understanding Motion Capture for Computer Animation discusses the latest technology developments in digital design, film, games, medicine, sports, and security engineering. Motion capture records a live-motion event and translates it into a digital context. It is the technology that converts a live performance into a digital performance. In contrast, performance animation is the actual performance that brings life to the character, even without using technology. If motion capture is the collection of data that represents motion, performance animation is the character that a performer represents. The book offers extensive information about motion capture. It includes state-of-the-art technology, methodology, and developments in the current motion-capture industry. In particular, the different ways to capture motions are discussed, including using cameras or electromagnetic fields in tracking a group of sensors. This book will be useful for students taking a course about digital filming, as well as for anyone who is interested in this topic.
    • Web Application Obfuscation

      • 1st Edition
      • December 10, 2010
      • Mario Heiderich + 3 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 0 4 9
      • eBook
        9 7 8 1 5 9 7 4 9 6 0 5 6
      Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.
    • E-books in Academic Libraries

      • 1st Edition
      • December 8, 2010
      • Ksenija Mincic-Obradovic
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 8 6 2
      • eBook
        9 7 8 1 7 8 0 6 3 0 5 0 2
      Written from the perspective of a librarian, this book offers a comprehensive overview of the impact of e-books on academic libraries. The author discusses advantages to both researchers and librarians and provides current examples of innovative uses of e-books in academic contexts. This book reviews the current situation in e-book publishing, and describes problems in managing e-books in libraries caused by the variety of purchase models and varying formats available, and the lack of standardisation. It discusses solutions for providing access and maintaining bibliographic control, looks at various initiatives to publicise and promote e-books, and compares e-book usage surveys to track changes in user preferences and behaviour over the last decade. E-books have already had a huge impact on academic libraries, and major advances in technology will bring further changes. There is a need for collaboration between libraries and publishers. The book concludes with reflections on the future of e-books in academic libraries.
    • Entity Resolution and Information Quality

      • 1st Edition
      • December 8, 2010
      • John R. Talburt
      • English
      • Paperback
        9 7 8 0 1 2 3 8 1 9 7 2 7
      • eBook
        9 7 8 0 1 2 3 8 1 9 7 3 4
      Entity Resolution and Information Quality presents topics and definitions, and clarifies confusing terminologies regarding entity resolution and information quality. It takes a very wide view of IQ, including its six-domain framework and the skills formed by the International Association for Information and Data Quality {IAIDQ). The book includes chapters that cover the principles of entity resolution and the principles of Information Quality, in addition to their concepts and terminology. It also discusses the Fellegi-Sunter theory of record linkage, the Stanford Entity Resolution Framework, and the Algebraic Model for Entity Resolution, which are the major theoretical models that support Entity Resolution. In relation to this, the book briefly discusses entity-based data integration (EBDI) and its model, which serve as an extension of the Algebraic Model for Entity Resolution. There is also an explanation of how the three commercial ER systems operate and a description of the non-commercial open-source system known as OYSTER. The book concludes by discussing trends in entity resolution research and practice. Students taking IT courses and IT professionals will find this book invaluable.
    • System Assurance

      • 1st Edition
      • December 6, 2010
      • Nikolai Mansourov + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 8 1 4 1 4 2
      • eBook
        9 7 8 0 1 2 3 8 1 4 1 5 9
      System Assurance teaches students how to use Object Management Group’s (OMG) expertise and unique standards to obtain accurate knowledge about existing software and compose objective metrics for system assurance. OMG’s Assurance Ecosystem provides a common framework for discovering, integrating, analyzing, and distributing facts about existing enterprise software. Its foundation is the standard protocol for exchanging system facts, defined as the OMG Knowledge Discovery Metamodel (KDM). In addition, the Semantics of Business Vocabularies and Business Rules (SBVR) defines a standard protocol for exchanging security policy rules and assurance patterns. Using these standards together, students will learn how to leverage the knowledge of the cybersecurity community and bring automation to protect systems. This book includes an overview of OMG Software Assurance Ecosystem protocols that integrate risk, architecture, and code analysis guided by the assurance argument. A case study illustrates the steps of the System Assurance Methodology using automated tools. This book is recommended for technologists from a broad range of software companies and related industries; security analysts, computer systems analysts, computer software engineers-systems software, computer software engineers- applications, computer and information systems managers, network systems and data communication analysts.
    • Usability Testing Essentials

      • 1st Edition
      • October 22, 2010
      • Carol M. Barnum
      • English
      • Paperback
        9 7 8 0 1 2 3 7 5 0 9 2 1
      • eBook
        9 7 8 0 1 2 3 7 8 5 5 3 4
      Usability Testing Essentials provides readers with the tools and techniques needed to begin usability testing or to advance their knowledge in this area. The book begins by presenting the essentials of usability testing, which include focusing on the user and not the product; knowing when to conduct small or large studies; and thinking of usability as hill climbing. It then reviews testing options and places usability testing into the context of a user-centered design (UCD). It goes on to discuss the planning, preparation, and implementation of a usability test. The remaining chapters cover the analysis and reporting of usability test findings, and the unique aspects of international usability testing. This book will be useful to anyone else involved in the development or support of any type of product, such as software or web developers, engineers, interaction designers, information architects, technical communicators, visual or graphic designers, trainers, user-assistance specialists, and instructional technologists.