Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • The Basics of Hacking and Penetration Testing

      • 1st Edition
      • July 21, 2011
      • Patrick Engebretson
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 6 5 6 8
      The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is required. It shows how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. With a simple and clean explanation of how to effectively utilize these tools – as well as the introduction to a four-step methodology for conducting a penetration test or hack – the book provides students with the know-how required to jump start their careers and gain a better understanding of offensive security. The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class. This book is an ideal reference for security consultants, beginning InfoSec professionals, and students.
    • Coding for Penetration Testers

      • 1st Edition
      • September 23, 2011
      • Jason Andress + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 7 2 9 9
      • eBook
        9 7 8 1 5 9 7 4 9 7 3 0 5
      Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting. It guides the student through specific examples of custom tool development that can be incorporated into a tester's toolkit as well as real-world scenarios where such tools might be used. This book is divided into 10 chapters that explores topics such as command shell scripting; Python, Perl, and Ruby; Web scripting with PHP; manipulating Windows with PowerShell; scanner scripting; information gathering; exploitation scripting; and post-exploitation scripting. This book will appeal to penetration testers, information security practitioners, and network and system administrators.
    • Migrating to the Cloud

      • 1st Edition
      • October 3, 2011
      • Tom Laszewski + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 4 7 6
      • eBook
        9 7 8 1 5 9 7 4 9 6 4 8 3
      Migrating to the Cloud: Oracle Client/Server Modernization is a reference guide for migrating client/server applications to the Oracle cloud. Organized into 14 chapters, the book offers tips on planning, determining effort and budget, designing the Oracle cloud infrastructure, implementing the migration, and moving the Oracle cloud environment into production. Aside from Oracle application and database cloud offerings, the book looks at various tools and technologies that can facilitate migration to the cloud. It includes useful code snippets and step-by-step instructions in database migration, along with four case studies that highlight service enablement of DOS-based applications, Sybase to Oracle, PowerBuilder to APEX, and Forms to Java EE. Finally, it considers current challenges and future trends in cloud computing and client/server migration. This book will be useful to IT professionals, such as developers, architects, database administrators, IT project managers, and executives, in developing migration strategies and best practices, as well as finding appropriate solutions.
    • A Practical Guide to SysML

      • 2nd Edition
      • October 17, 2011
      • Sanford Friedenthal + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 8 5 2 0 6 9
      • eBook
        9 7 8 0 1 2 3 8 5 2 0 7 6
      A Practical Guide to SysML: The Systems Modeling Language is a comprehensive guide for understanding and applying SysML to model systems. The Object Management Group’s OMG SysML is a general-purpose graphical modeling language for representing systems that may include combinations of hardware, software, data, people, facilities, and natural objects. SysML supports the practice of model-based systems engineering (MBSE) used to develop system solutions in response to complex and often technologically challenging problems. The book is organized into four parts. Part I provides an overview of systems engineering, a summary of key MBSE concepts, a chapter on getting started with SysML, and a sample problem highlighting the basic features of SysML. Part II presents a detailed description of the SysML language, while Part III illustrates how SysML can support different model-based methods. Part IV discusses how to transition MBSE with SysML into an organization. This book can serve as an introduction and reference for industry practitioners, and as a text for courses in systems modeling and model-based systems engineering. Because SysML reuses many Unified Modeling Language (UML) concepts, software engineers familiar with UML can use this information as a basis for understanding systems engineering concepts.
    • Advances in Computers

      • 1st Edition
      • Volume 79
      • March 13, 2010
      • Marvin Zelkowitz
      • English
      • Hardback
        9 7 8 0 1 2 3 8 1 0 2 7 4
      • eBook
        9 7 8 0 1 2 3 8 1 0 2 8 1
      This is volume 79 of Advances in Computers. This series, which began publication in 1960, is the oldest continuously published anthology that chronicles the ever- changing information technology field. In these volumes we publish from 5 to 7 chapters, three times per year, that cover the latest changes to the design, development, use and implications of computer technology on society today.
    • Embedded Systems Design with Platform FPGAs

      • 1st Edition
      • July 28, 2010
      • Ronald Sass + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 3 3 3 6
      • Paperback
        9 7 8 0 1 2 8 1 0 2 1 1 4
      • eBook
        9 7 8 0 0 8 0 9 2 1 7 8 5
      Embedded Systems Design with Platform FPGAs introduces professional engineers and students alike to system development using Platform FPGAs. The focus is on embedded systems but it also serves as a general guide to building custom computing systems. The text describes the fundamental technology in terms of hardware, software, and a set of principles to guide the development of Platform FPGA systems. The goal is to show how to systematically and creatively apply these principles to the construction of application-specific embedded system architectures. There is a strong focus on using free and open source software to increase productivity. Each chapter is organized into two parts. The white pages describe concepts, principles, and general knowledge. The gray pages provide a technical rendition of the main issues of the chapter and show the concepts applied in practice. This includes step-by-step details for a specific development board and tool chain so that the reader can carry out the same steps on their own. Rather than try to demonstrate the concepts on a broad set of tools and boards, the text uses a single set of tools (Xilinx Platform Studio, Linux, and GNU) throughout and uses a single developer board (Xilinx ML-510) for the examples.
    • Programming Massively Parallel Processors

      • 1st Edition
      • January 22, 2010
      • David B. Kirk + 1 more
      • English
      • eBook
        9 7 8 0 1 2 3 8 1 4 7 3 9
      Programming Massively Parallel Processors discusses the basic concepts of parallel programming and GPU architecture. Various techniques for constructing parallel programs are explored in detail. Case studies demonstrate the development process, which begins with computational thinking and ends with effective and efficient parallel programs. This book describes computational thinking techniques that will enable students to think about problems in ways that are amenable to high-performance parallel computing. It utilizes CUDA (Compute Unified Device Architecture), NVIDIA's software development tool created specifically for massively parallel environments. Studies learn how to achieve both high-performance and high-reliability using the CUDA programming model as well as OpenCL. This book is recommended for advanced students, software engineers, programmers, and hardware engineers.
    • Up and Running with AutoCAD 2011

      • 1st Edition
      • August 10, 2010
      • Elliot J. Gindis
      • English
      • Paperback
        9 7 8 0 1 2 3 7 5 7 1 7 3
      • eBook
        9 7 8 0 1 2 3 7 5 7 1 8 0
      Up and Running with AutoCAD 2011: 2D and 3D Drawing and Modeling provides an introduction to the fundamental concepts of AutoCAD. These concepts have been distilled down to basic, easy to understand explanations for the benefit of beginner students. Each chapter explains the new concept or command and why it is important. Readers are given the chance to apply just-learned knowledge to a real-life exercise, drawing, or model. They can also test their knowledge with end-of-chapter quizzes and drawing exercises. The book is organized into three parts: Level 1, Level 2, and Level 3. Level 1 offers a wide breadth of knowledge on many topics. Its chapters comprise the complete essential knowledge set of an intermediate user. Students can then work on, if not necessarily set up and manage, moderate to complex drawings. Level 2 is meant for advanced users who are CAD managers, full-time AutoCAD draftspersons, architects, or self-employed and must do everything themselves. The goal here is depth, and several features not deemed critically important in Level 1 are revisited to explore additional advanced options. Also introduced are advanced topics necessary to set up and manage complex drawings. Level 3 is all about 3D. Solid knowledge of the previous two levels is highly recommended before starting these chapters. The 3D material covers all aspects of AutoCAD solid modeling, including lights and rendering.
    • Why Blog?

      • 1st Edition
      • June 9, 2010
      • Sarah Pedersen
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 8 3 1
      • eBook
        9 7 8 1 7 8 0 6 3 1 7 1 4
      'Weblogging' or ‘blogging’ has joined e-mail and Internet home pages as one of the most popular uses of the Internet. This book focuses on the British blogosphere, comparing British bloggers to the more researched US. Motivations covered include the desire to connect with others online, the need to express opinions or blow off steam, or to share experiences, and a growing financial motivation in the blogosphere. Other motivations explored include a desire to become a ‘citizen journalist’, a need for validation, the commercial possibilities of blogging and the possibility of turning your blog into a published ‘book’.
    • Securing the Smart Grid

      • 1st Edition
      • September 23, 2010
      • Tony Flick + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 7 0 7
      • eBook
        9 7 8 1 5 9 7 4 9 5 7 1 4
      Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and utility companies can use to minimize the risk associated with the smart grid. It explains the smart grid components in detail so readers can understand how the confidentiality, integrity, and availability of these components can be secured or compromised. This book will be a valuable reference for readers who secure the networks of smart grid deployments, as well as consumers who use smart grid devices.