Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Mathematical Models in Environmental Problems

    • 1st Edition
    • Volume 16
    • August 18, 2011
    • G.I. Marchuk
    • English
  • Probabilities and Potential, B

    Theory of Martingales
    • 1st Edition
    • Volume 72
    • August 18, 2011
    • C. Dellacherie + 1 more
    • English
  • Probabilities and Potential, C

    Potential Theory for Discrete and Continuous Semigroups
    • 1st Edition
    • Volume 151
    • August 18, 2011
    • C. Dellacherie + 1 more
    • English
    This third volume of the monograph examines potential theory. The first chapter develops potential theory with respect to a single kernel (or discrete time semigroup). All the essential ideas of the theory are presented: excessive functions, reductions, sweeping, maximum principle. The second chapter begins with a study of the notion of reduction in the most general situation possible - the ``gambling house'' of Dubins and Savage. The beautiful results presented have never been made accessible to a wide public. These are then connected with the theory of sweeping with respect to a cone of continuous functions, and the integral representation in compact convex sets. The third chapter presents new or little-known results, with the aim of illustrating the effectiveness of capacitary methods in the most varied fields. The last two chapters are concerned with the theory of resolvents.The fourth and last part of the English edition will be devoted to the theory of Markov processes.
  • Theories of Computational Complexity

    • 1st Edition
    • Volume 35
    • August 18, 2011
    • C. Calude
    • English
    This volume presents four machine-independent theories of computational complexity, which have been chosen for their intrinsic importance and practical relevance. The book includes a wealth of results - classical, recent, and others which have not been published before.In developing the mathematics underlying the size, dynamic and structural complexity measures, various connections with mathematical logic, constructive topology, probability and programming theories are established. The facts are presented in detail. Extensive examples are provided, to help clarify notions and constructions. The lists of exercises and problems include routine exercises, interesting results, as well as some open problems.
  • Industrial Network Security

    Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
    • 1st Edition
    • August 15, 2011
    • Eric D. Knapp + 1 more
    • English
    Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. It also discusses common pitfalls and mistakes and how to avoid them. After reading this book, students will understand and address the unique security concerns that face the world's most important networks. This book examines the unique protocols and applications that are the foundation of industrial control systems and provides comprehensive guidelines for their protection. Divided into 11 chapters, it explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also explores industrial networks as they relate to "critical infrastructure" and cyber security; potential risks and consequences of a cyber attack against an industrial control system; compliance controls in relation to network security practices; industrial network protocols such as Modbus and DNP3; assessment of vulnerabilities and risk; how to secure enclaves; regulatory compliance standards applicable to industrial network security; and common pitfalls and mistakes, like complacency and deployment errors. This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines. It will also appeal to IT and security professionals working on networks and control systems operations.
  • IMS Application Developer's Handbook

    Creating and Deploying Innovative IMS Applications
    • 1st Edition
    • July 20, 2011
    • Rogier Noldus + 5 more
    • English
    IMS Application Developer’s Handbook gives a hands-on view of exactly what needs to be done by IMS application developers to develop an application and take it "live" on an operator’s network. It offers practical guidance on building innovative applications using the features and capabilities of the IMS network, and shows how the rapidly changing development environment is impacting on the business models employed in the industry and how existing network solutions can be moved towards IMS. Elaborating on how IMS applies basic VoIP principles and techniques to realize a true multi-access, and multimedia network, this book ensures that developers know how to use IMS most effectively for applications. Written by established experts in the IMS core network and IMS service layer, with roots in ISDN and GSM, with experience from working at Ericsson, who have been active in standardisation and technology development and who have been involved in many customer projects for the implementation of fixed mobile converged IMS network and service. The authors of this book bring their in-depth and extensive knowledge in the organizations involved in the IMS standardization and its architecture.
  • Penetration Tester's Open Source Toolkit

    • 3rd Edition
    • July 18, 2011
    • Jeremy Faircloth
    • English
    Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation. This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack. This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.
  • Deploying Next Generation Multicast-enabled Applications

    Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet
    • 1st Edition
    • July 15, 2011
    • Vinod Joseph + 1 more
    • English
    Deploying Next Generation Multicast-Enabled Applications: Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet provides a comprehensive discussion of Multicast and MVPN standards—next-gener... Multicast-based standards, Multicast Applications, and case studies with detailed configurations. Focusing on three vendors—Juniper, Cisco, and Alcatel-Lucent—the text features illustrations that contain configurations of JUNOS, TiMOS (Alcatel’s OS), or Cisco IOS, and each configuration is explained in great detail. Multiple- rather than single-vendor configurations were selected for the sake of diversity as well as to highlight the direction in which the overall industry is going rather than that of a specific vendor. Beginning with a discussion of the building blocks or basics of IP Multicast, the book then details applications and emerging trends, including vendor adoptions, as well as the future of Multicast.The book is written for engineers, technical managers, and visionaries engaged in the development of next-generation IP Multicast infrastructures.
  • Computer Technology for Textiles and Apparel

    • 1st Edition
    • July 14, 2011
    • Jinlian Hu
    • English
    Computer technology has transformed textiles from their design through to their manufacture and has contributed to significant advances in the textile industry. Computer technology for textiles and apparel provides an overview of these innovative developments for a wide range of applications, covering topics including structure and defect analysis, modelling and simulation, and apparel design.The book is divided into three parts. Part one provides a review of different computer-based technologies suitable for textile materials, and includes chapters on computer technology for yarn and fabric structure analysis, defect analysis and measurement. Chapters in part two discuss modelling and simulation principles of fibres, yarns, textiles and garments, while part three concludes with a review of computer-based technologies specific to apparel and apparel design, with themes ranging from 3D body scanning to the teaching of computer-aided design to fashion students.With its distinguished editor and international team of expert contributors, Computer technology for textiles and apparel is an invaluable tool for a wide range of people involved in the textile industry, from designers and manufacturers to fibre scientists and quality inspectors.
  • Systems Thinking

    Managing Chaos and Complexity: A Platform for Designing Business Architecture
    • 3rd Edition
    • June 29, 2011
    • Jamshid Gharajedaghi
    • English
    Systems Thinking, Third Edition combines systems theory and interactive design to provide an operational methodology for defining problems and designing solutions in an environment increasingly characterized by chaos and complexity. This new edition has been updated to include all new chapters on self-organizing systems as well as holistic, operational, and design thinking. The book covers recent crises in financial systems and job markets, the housing bubble, and environment, assessing their impact on systems thinking. A companion website is available at interactdesign.com. This volume is ideal for senior executives as well as for chief information/operatin... officers and other executives charged with systems management and process improvement. It may also be a helpful resource for IT/MBA students and academics.