Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • An Introduction to Parallel Programming

    • 1st Edition
    • Peter Pacheco
    • English
    An Introduction to Parallel Programming is the first undergraduate text to directly address compiling and running parallel programs on the new multi-core and cluster architecture. It explains how to design, debug, and evaluate the performance of distributed and shared-memory programs. The author Peter Pacheco uses a tutorial approach to show students how to develop effective parallel programs with MPI, Pthreads, and OpenMP, starting with small programming examples and building progressively to more challenging ones. The text is written for students in undergraduate parallel programming or parallel computing courses designed for the computer science major or as a service course to other departments; professionals with no background in parallel computing.
  • Data Mining

    Practical Machine Learning Tools and Techniques
    • 3rd Edition
    • Ian H. Witten + 2 more
    • English
    Data Mining: Practical Machine Learning Tools and Techniques, Third Edition, offers a thorough grounding in machine learning concepts as well as practical advice on applying machine learning tools and techniques in real-world data mining situations. This highly anticipated third edition of the most acclaimed work on data mining and machine learning will teach you everything you need to know about preparing inputs, interpreting outputs, evaluating results, and the algorithmic methods at the heart of successful data mining. Thorough updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including new material on Data Transformations, Ensemble Learning, Massive Data Sets, Multi-instance Learning, plus a new version of the popular Weka machine learning software developed by the authors. Witten, Frank, and Hall include both tried-and-true techniques of today as well as methods at the leading edge of contemporary research. The book is targeted at information systems practitioners, programmers, consultants, developers, information technology managers, specification writers, data analysts, data modelers, database R&D professionals, data warehouse engineers, data mining professionals. The book will also be useful for professors and students of upper-level undergraduate and graduate-level data mining and machine learning courses who want to incorporate data mining as part of their data management knowledge base and expertise.
  • Thoughts on Interaction Design

    • 2nd Edition
    • Jon Kolko
    • English
    Thoughts on Interaction Design, Second Edition, contemplates and contributes to the theory of Interaction Design by exploring the semantic connections that live between technology and form that are brought to life when someone uses a product. It defines Interaction Design in a way that emphasizes the intellectual and cultural facets of the discipline. This edition explores how changes in the economic climate, increased connectivity, and international adoption of technology affect designing for behavior and the nature of design itself. Ultimately, the text exists to provide a definition that encompasses the intellectual facets of the field, the conceptual underpinnings of interaction design as a legitimate human-centered field, and the particular methods used by practitioners in their day-to-day experiences. This text is recommended for practicing designers: interaction designers, industrial designers, UX practitioners, graphic designers, interface designers, and managers.
  • Windows Registry Forensics

    Advanced Digital Forensic Analysis of the Windows Registry
    • 1st Edition
    • Harlan Carvey
    • English
    Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques are presented that take the student and analyst beyond the current use of viewers and into real analysis of data contained in the Registry, demonstrating the forensic value of the Registry. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this book is packed with real-world examples using freely available open source tools. It also includes case studies and a CD containing code and author-created tools discussed in the book. This book will appeal to computer forensic and incident response professionals, including federal government and commercial/private sector contractors, consultants, etc.
  • Developing High Quality Data Models

    • 1st Edition
    • Matthew West
    • English
    Developing High Quality Data Models provides an introduction to the key principles of data modeling. It explains the purpose of data models in both developing an Enterprise Architecture and in supporting Information Quality; common problems in data model development; and how to develop high quality data models, in particular conceptual, integration, and enterprise data models. The book is organized into four parts. Part 1 provides an overview of data models and data modeling including the basics of data model notation; types and uses of data models; and the place of data models in enterprise architecture. Part 2 introduces some general principles for data models, including principles for developing ontologically based data models; and applications of the principles for attributes, relationship types, and entity types. Part 3 presents an ontological framework for developing consistent data models. Part 4 provides the full data model that has been in development throughout the book. The model was created using Jotne EPM Technologys EDMVisualExpress data modeling tool. This book was designed for all types of modelers: from those who understand data modeling basics but are just starting to learn about data modeling in practice, through to experienced data modelers seeking to expand their knowledge and skills and solve some of the more challenging problems of data modeling.
  • Securing SQL Server

    Protecting Your Database from Attackers
    • 1st Edition
    • Denny Cherry
    • English
    Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.
  • Using Robots in Hazardous Environments

    Landmine Detection, De-Mining and Other Applications
    • 1st Edition
    • Y Baudoin + 1 more
    • English
    There have been major recent advances in robotic systems that can replace humans in undertaking hazardous activities in demanding or dangerous environments. Published in association with the CLAWAR (Climbing and Walking Robots and Associated Technologies Association) (www.clawar.org), this important book reviews the development of robotic systems for de-mining and other risky activities such as fire-fighting.Part one provides an overview of the use of robots for humanitarian de-mining work. Part two discusses the development of sensors for mine detection whilst Part thee reviews developments in both teleoperated and autonomous robots. Building on the latter, Part four concentrates on robot autonomous navigation. The final part of the book reviews research on multi-agent-systems (MAS) and the multi-robotics-syste... (MRS), promising tools that take into account modular design of mobile robots and the use of several robots in multi-task missions.With its distinguished editors and international team of contributors, Using robots in hazardous environments: landmine detection, de-mining and other applications is a standard reference for all those researching the use of robots in hazardous environments as well as government and other agencies wishing to use robots for dangerous tasks such as landmine detection and disposal.
  • Handbook of Logic and Language

    • 2nd Edition
    • Johan F.A.K. van Benthem + 1 more
    • English
    The logical study of language is becoming more interdisciplinary, playing a role in fields such as computer science, artificial intelligence, cognitive science and game theory. This new edition, written by the leading experts in the field, presents an overview of the latest developments at the interface of logic and linguistics as well as a historical perspective. It is divided into three parts covering Frameworks, General Topics and Descriptive Themes.
  • Understanding Motion Capture for Computer Animation

    • 2nd Edition
    • Alberto Menache
    • English
    Understanding Motion Capture for Computer Animation discusses the latest technology developments in digital design, film, games, medicine, sports, and security engineering. Motion capture records a live-motion event and translates it into a digital context. It is the technology that converts a live performance into a digital performance. In contrast, performance animation is the actual performance that brings life to the character, even without using technology. If motion capture is the collection of data that represents motion, performance animation is the character that a performer represents. The book offers extensive information about motion capture. It includes state-of-the-art technology, methodology, and developments in the current motion-capture industry. In particular, the different ways to capture motions are discussed, including using cameras or electromagnetic fields in tracking a group of sensors. This book will be useful for students taking a course about digital filming, as well as for anyone who is interested in this topic.
  • Web Application Obfuscation

    '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'
    • 1st Edition
    • Mario Heiderich + 3 more
    • English
    Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.