Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Information Dynamics in Virtual Worlds

    Gaming and Beyond
    • 1st Edition
    • June 15, 2011
    • Woody Evans
    • English
    Presents a broad examination of the nature of virtual worlds and the potential they provide in managing and expressing information practices through that medium, grounding information professionals and students of new media in the fundamental elements of virtual worlds and online gaming. The book details the practical issues in finding and using information in virtual environments and presents a general theory of librarianship as it relates to virtual gaming worlds. It is encompassed by a set of best practice methods that libraries can effectively execute in their own environments, meeting the needs of this new generation of library user, and explores ways in which information literacy can be approached in virtual worlds. Final chapters examine how conventional information evaluation skills work falls short in virtual worlds online.
  • The Basics of Information Security

    Understanding the Fundamentals of InfoSec in Theory and Practice
    • 1st Edition
    • June 10, 2011
    • Jason Andress
    • English
    The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use. The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom. This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field.
  • Data Mining: Concepts and Techniques

    • 3rd Edition
    • June 9, 2011
    • Jiawei Han + 2 more
    • English
    Data Mining: Concepts and Techniques provides the concepts and techniques in processing gathered data or information, which will be used in various applications. Specifically, it explains data mining and the tools used in discovering knowledge from the collected data. This book is referred as the knowledge discovery from data (KDD). It focuses on the feasibility, usefulness, effectiveness, and scalability of techniques of large data sets. After describing data mining, this edition explains the methods of knowing, preprocessing, processing, and warehousing data. It then presents information about data warehouses, online analytical processing (OLAP), and data cube technology. Then, the methods involved in mining frequent patterns, associations, and correlations for large data sets are described. The book details the methods for data classification and introduces the concepts and methods for data clustering. The remaining chapters discuss the outlier detection and the trends, applications, and research frontiers in data mining. This book is intended for Computer Science students, application developers, business professionals, and researchers who seek information on data mining.
  • Heuristic Search

    Theory and Applications
    • 1st Edition
    • May 31, 2011
    • Stefan Edelkamp + 1 more
    • English
    Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as pattern databases and search with efficient use of external memory and parallel processing units on main boards and graphics cards are detailed. Heuristic search as a problem solving tool is demonstrated in applications for puzzle solving, game playing, constraint satisfaction and machine learning. While no previous familiarity with heuristic search is necessary the reader should have a basic knowledge of algorithms, data structures, and calculus. Real-world case studies and chapter ending exercises help to create a full and realized picture of how search fits into the world of artificial intelligence and the one around us.
  • Security on the Web

    • 1st Edition
    • Volume 83
    • May 24, 2011
    • Marvin Zelkowitz
    • English
    Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field.
  • Semantic Web for the Working Ontologist

    Effective Modeling in RDFS and OWL
    • 2nd Edition
    • May 20, 2011
    • Dean Allemang + 1 more
    • English
    Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL, Second Edition, discusses the capabilities of Semantic Web modeling languages, such as RDFS (Resource Description Framework Schema) and OWL (Web Ontology Language). Organized into 16 chapters, the book provides examples to illustrate the use of Semantic Web technologies in solving common modeling problems. It uses the life and works of William Shakespeare to demonstrate some of the most basic capabilities of the Semantic Web. The book first provides an overview of the Semantic Web and aspects of the Web. It then discusses semantic modeling and how it can support the development from chaotic information gathering to one characterized by information sharing, cooperation, and collaboration. It also explains the use of RDF to implement the Semantic Web by allowing information to be distributed over the Web, along with the use of SPARQL to access RDF data. Moreover, the reader is introduced to components that make up a Semantic Web deployment and how they fit together, the concept of inferencing in the Semantic Web, and how RDFS differs from other schema languages. Finally, the book considers the use of SKOS (Simple Knowledge Organization System) to manage vocabularies by taking advantage of the inferencing structure of RDFS-Plus. This book is intended for the working ontologist who is trying to create a domain model on the Semantic Web.
  • Do You Web 2.0?

    Public Libraries and Social Networking
    • 1st Edition
    • May 3, 2011
    • Linda Berube
    • English
    Web 2.0 technology is a hot topic at the moment, and public librarians in particular are beginning to feel the pressure to apply these tools. Indeed, Web 2.0 has the potential to transform library services, but only if the policy and strategy for those services are ready to be transformed. The author not only reviews these tools and provides practical advice and case studies on how they can be applied in the public library setting, but also recommends the policies and business cases that begin to create a new strategy for public libraries.
  • User Experience Management

    Essential Skills for Leading Effective UX Teams
    • 1st Edition
    • April 28, 2011
    • Arnie Lund
    • English
    User Experience Management: Essential Skills for Leading Effective UX Teams deals with specific issues associated with managing diverse user experience (UX) skills, often in corporations with a largely engineering culture. Part memoir and part handbook, it explains what it means to lead a UX team and examines the management issues of hiring, inheriting, terminating, layoffs, interviewing and candidacy, and downsizing. The book offers guidance on building and creating a UX team, as well as equipping and focusing the team. It also considers ways of nurturing the team, from coaching and performance reviews to conflict management and creating work-life balance. Furthermore, it discusses the essential skills needed in leading an effective team and developing a communication plan. This book will be valuable to new managers and leaders, more experienced managers, and anyone who is leading or managing UX groups or who is interested in assuming a leadership role in the future.
  • Digital Evidence and Computer Crime

    Forensic Science, Computers, and the Internet
    • 3rd Edition
    • April 12, 2011
    • Eoghan Casey
    • English
    Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks. This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks. New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides. This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).
  • Brave NUI World

    Designing Natural User Interfaces for Touch and Gesture
    • 1st Edition
    • April 5, 2011
    • Daniel Wigdor + 1 more
    • English
    Brave NUI World is the first practical guide for designing touch- and gesture-based user interfaces. Written by the team from Microsoft that developed the multi-touch, multi-user Surface® tabletop product, it introduces the reader to natural user interfaces (NUI). It gives readers the necessary tools and information to integrate touch and gesture practices into daily work, presenting scenarios, problem solving, metaphors, and techniques intended to avoid making mistakes. This book considers diverse user needs and context, real world successes and failures, and the future of NUI. It presents thirty scenarios, giving practitioners a multitude of considerations for making informed design decisions and helping to ensure that missteps are never made again. The book will be of value to game designers as well as practitioners, researchers, and students interested in learning about user experience design, user interface design, interaction design, software design, human computer interaction, human factors, information design, and information architecture.