Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Joe Celko's SQL for Smarties

      • 4th Edition
      • October 18, 2010
      • Joe Celko
      • English
      • Paperback
        9 7 8 0 1 2 3 8 2 0 2 2 8
      • eBook
        9 7 8 0 1 2 3 8 2 0 2 3 5
      Joe Celkos SQL for Smarties: Advanced SQL Programming offers tips and techniques in advanced programming. This book is the fourth edition and it consists of 39 chapters, starting with a comparison between databases and file systems. It covers transactions and currency control, schema level objects, locating data and schema numbers, base tables, and auxiliary tables. Furthermore, procedural, semi-procedural, and declarative programming are explored in this book. The book also presents the different normal forms in database normalization, including the first, second, third, fourth, fifth, elementary key, domain-key, and Boyce-Codd normal forms. It also offers practical hints for normalization and denormalization. The book discusses different data types, such as the numeric, temporal and character data types; the different predicates; and the simple and advanced SELECT statements. In addition, the book presents virtual tables, and it discusses data partitions in queries; grouping operations; simple aggregate functions; and descriptive statistics, matrices and graphs in SQL. The book concludes with a discussion about optimizing SQL. It will be of great value to SQL programmers.
    • The Practitioner's Guide to Data Quality Improvement

      • 1st Edition
      • October 15, 2010
      • David Loshin
      • English
      • Paperback
        9 7 8 0 1 2 3 7 3 7 1 7 5
      • eBook
        9 7 8 0 0 8 0 9 2 0 3 4 4
      The Practitioner's Guide to Data Quality Improvement offers a comprehensive look at data quality for business and IT, encompassing people, process, and technology. It shares the fundamentals for understanding the impacts of poor data quality, and guides practitioners and managers alike in socializing, gaining sponsorship for, planning, and establishing a data quality program. It demonstrates how to institute and run a data quality program, from first thoughts and justifications to maintenance and ongoing metrics. It includes an in-depth look at the use of data quality tools, including business case templates, and tools for analysis, reporting, and strategic planning. This book is recommended for data management practitioners, including database analysts, information analysts, data administrators, data architects, enterprise architects, data warehouse engineers, and systems analysts, and their managers.
    • Citrix XenDesktop Implementation

      • 1st Edition
      • September 27, 2010
      • Gareth R. James
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 8 2 0
      • eBook
        9 7 8 1 5 9 7 4 9 5 8 3 7
      Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop Client Settings. This book briefly discusses the work of desktop delivery controller mechanisms followed by its installation process, integration process of XenDesktop with Microsoft Active Directory, and the configuration of the desktop delivery controller. It then examines the process of installing the virtual desktop onto the server infrastructure, and it follows the installation and integration onto Xen Server, Hyper-V, and VMware hypervisors. Furthermore, it discusses the advanced configuration settings. The book covers the installation of the Citrix Provisioning Server and its fundamental configuration. It also explores the configuration of Citrix XenApp for Application provisioning, the integration of virtual applications, and the implementation of virtual profiles into the virtual desktop. The book concludes by explaining the advanced XenDesktop client settings on audio, video, and peripherals.
    • News Search, Blogs and Feeds

      • 1st Edition
      • September 27, 2010
      • Lars Vage + 1 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 0 2 9
      • eBook
        9 7 8 1 7 8 0 6 3 1 8 1 3
      This book is about news search and monitoring. Aimed at professionals with a strategic need of monitoring the surrounding world, users with a need to find the best news sources, monitoring services and news search strategies and techniques will benefit from reading this book. The main purpose is to present a practical handbook with an analysis of readily available tools, blending with passages of a theoretical nature. It is also useful for students at LIS programmes and related information programmes and for librarians and information professionals. The authors aim to aid the reader in reaching a greater understanding of the core in news search and monitoring.
    • A Practical Guide to Electronic Resources in the Humanities

      • 1st Edition
      • September 25, 2010
      • Ana Dubnjakovic + 1 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 9 7 8
      • eBook
        9 7 8 1 7 8 0 6 3 0 4 7 2
      From full-text article databases to digitized collections of primary source materials, newly emerging electronic resources have radically impacted how research in the humanities is conducted and discovered. This book, covering high-quality, up-to-date electronic resources for the humanities, is an easy–to-use annotated guide for the librarian, student, and scholar alike. It covers online databases, indexes, archives, and many other critical tools in key humanities disciplines including philosophy, religion, languages and literature, and performing and visual arts. Succinct overviews of key emerging trends in electronic resources accompany each chapter.
    • Building a Digital Repository Program with Limited Resources

      • 1st Edition
      • September 24, 2010
      • Abby Clobridge
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 9 6 1
      • eBook
        9 7 8 1 7 8 0 6 3 0 4 5 8
      Whether you are just starting to create a digital repository or your institution already has a fully-developed program, this book provides strategies for building and maintaining a high-use, cohesive, and fiscally-responsible repository with collections that showcase your institution. The book explains how to strategically select projects tied to your institution’s goals, create processes and workflows designed to support a fully-functioning program, and creatively utilize existing resources. The benefits of taking a holistic approach to creating a digital repository program rather than focusing only on individual collections are discussed. Case studies and best practices from various institutions round out the author’s practical suggestions.
    • Security for Microsoft Windows System Administrators

      • 1st Edition
      • September 23, 2010
      • Derrick Rountree
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 9 4 3
      • eBook
        9 7 8 1 5 9 7 4 9 5 9 5 0
      Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.
    • Securing the Smart Grid

      • 1st Edition
      • September 23, 2010
      • Tony Flick + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 7 0 7
      • eBook
        9 7 8 1 5 9 7 4 9 5 7 1 4
      Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and utility companies can use to minimize the risk associated with the smart grid. It explains the smart grid components in detail so readers can understand how the confidentiality, integrity, and availability of these components can be secured or compromised. This book will be a valuable reference for readers who secure the networks of smart grid deployments, as well as consumers who use smart grid devices.
    • Ninja Hacking

      • 1st Edition
      • September 23, 2010
      • Thomas Wilhelm + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 8 8 2
      • eBook
        9 7 8 1 5 9 7 4 9 5 8 9 9
      Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.
    • Design Patterns for Embedded Systems in C

      • 1st Edition
      • September 23, 2010
      • Bruce Powel Douglass
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 7 0 7 8
      • eBook
        9 7 8 0 0 8 0 9 5 9 7 1 9
      A recent survey stated that 52% of embedded projects are late by 4-5 months. This book can help get those projects in on-time with design patterns. The author carefully takes into account the special concerns found in designing and developing embedded applications specifically concurrency, communication, speed, and memory usage. Patterns are given in UML (Unified Modeling Language) with examples including ANSI C for direct and practical application to C code. A basic C knowledge is a prerequisite for the book while UML notation and terminology is included. General C programming books do not include discussion of the contraints found within embedded system design. The practical examples give the reader an understanding of the use of UML and OO (Object Oriented) designs in a resource-limited environment. Also included are two chapters on state machines. The beauty of this book is that it can help you today. .