Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Building a Digital Repository Program with Limited Resources

    • 1st Edition
    • Abby Clobridge
    • English
    Whether you are just starting to create a digital repository or your institution already has a fully-developed program, this book provides strategies for building and maintaining a high-use, cohesive, and fiscally-responsible repository with collections that showcase your institution. The book explains how to strategically select projects tied to your institution’s goals, create processes and workflows designed to support a fully-functioning program, and creatively utilize existing resources. The benefits of taking a holistic approach to creating a digital repository program rather than focusing only on individual collections are discussed. Case studies and best practices from various institutions round out the author’s practical suggestions.
  • Design Patterns for Embedded Systems in C

    An Embedded Software Engineering Toolkit
    • 1st Edition
    • Bruce Powel Douglass
    • English
    A recent survey stated that 52% of embedded projects are late by 4-5 months. This book can help get those projects in on-time with design patterns. The author carefully takes into account the special concerns found in designing and developing embedded applications specifically concurrency, communication, speed, and memory usage. Patterns are given in UML (Unified Modeling Language) with examples including ANSI C for direct and practical application to C code. A basic C knowledge is a prerequisite for the book while UML notation and terminology is included. General C programming books do not include discussion of the contraints found within embedded system design. The practical examples give the reader an understanding of the use of UML and OO (Object Oriented) designs in a resource-limited environment. Also included are two chapters on state machines. The beauty of this book is that it can help you today. .
  • Introduction to Multimedia Systems

    • 1st Edition
    • Urbashi Mitra
    • English
  • Ninja Hacking

    Unconventional Penetration Testing Tactics and Techniques
    • 1st Edition
    • Thomas Wilhelm + 1 more
    • English
    Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.
  • Securing the Smart Grid

    Next Generation Power Grid Security
    • 1st Edition
    • Tony Flick + 1 more
    • English
    Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and utility companies can use to minimize the risk associated with the smart grid. It explains the smart grid components in detail so readers can understand how the confidentiality, integrity, and availability of these components can be secured or compromised. This book will be a valuable reference for readers who secure the networks of smart grid deployments, as well as consumers who use smart grid devices.
  • Security for Microsoft Windows System Administrators

    Introduction to Key Information Security Concepts
    • 1st Edition
    • Derrick Rountree
    • English
    Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.
  • Television Versus the Internet

    Will TV Prosper or Perish as the World Moves Online?
    • 1st Edition
    • Barrie Gunter
    • English
    This book will explore the questions raised by the technological developments that have encouraged the multiplication of TV channels. TV is moving through a period of rapid change. Governments around the world are switching from analogue to digital forms of transmission to further expand the amount of content that TV signals can carry. At the same time, competition for eyeballs has also grown from outside that traditional marketplace with the emergence of the Internet. The roll-out of broadband and increased bandwidth has had the greatest impact on television because online technology can readily convey the same content. All these changes have created a great deal more competition for viewers within the traditional TV marketplace. The Internet has proven to be especially popular with young people who have adopted its applications to a far greater extent than their elders, though even the latter have now begun to take up online activities in significant numbers. Are these audiences the same? Do people make a choice between these two media or do they use them both at different times and for different reasons? Can television utilise the Internet in profitable ways to enhance its market position? Will television have to evolve from its current state to provide the kinds of content reception services to which people have become accustomed in the online world? If it does need to change to survive, will this nevertheless mean a radical new configuration of content and the disappearance of ‘channels’ with fixed, pre-determined programme schedules?
  • Analyzing Social Media Networks with NodeXL

    Insights from a Connected World
    • 1st Edition
    • Derek Hansen + 2 more
    • English
    Analyzing Social Media Networks with NodeXL offers backgrounds in information studies, computer science, and sociology. This book is divided into three parts: analyzing social media, NodeXL tutorial, and social-media network analysis case studies. Part I provides background in the history and concepts of social media and social networks. Also included here is social network analysis, which flows from measuring, to mapping, and modeling collections of connections. The next part focuses on the detailed operation of the free and open-source NodeXL extension of Microsoft Excel, which is used in all exercises throughout this book. In the final part, each chapter presents one form of social media, such as e-mail, Twitter, Facebook, Flickr, and Youtube. In addition, there are descriptions of each system, the nature of networks when people interact, and types of analysis for identifying people, documents, groups, and events.
  • Smart Things

    Ubiquitous Computing User Experience Design
    • 1st Edition
    • Mike Kuniavsky
    • English
    The world of smart shoes, appliances, and phones is already here, but the practice of user experience (UX) design for ubiquitous computing is still relatively new. Design companies like IDEO and frogdesign are regularly asked to design products that unify software interaction, device design and service design -- which are all the key components of ubiquitous computing UX -- and practicing designers need a way to tackle practical challenges of design. Theory is not enough for them -- luckily the industry is now mature enough to have tried and tested best practices and case studies from the field. Smart Things presents a problem-solving approach to addressing designers' needs and concentrates on process, rather than technological detail, to keep from being quickly outdated. It pays close attention to the capabilities and limitations of the medium in question and discusses the tradeoffs and challenges of design in a commercial environment. Divided into two sections, frameworks and techniques, the book discusses broad design methods and case studies that reflect key aspects of these approaches. The book then presents a set of techniques highly valuable to a practicing designer. It is intentionally not a comprehensive tutorial of user-centered design'as that is covered in many other books'but it is a handful of techniques useful when designing ubiquitous computing user experiences. In short, Smart Things gives its readers both the "why" of this kind of design and the "how," in well-defined chunks.
  • Embedded Systems Design with Platform FPGAs

    Principles and Practices
    • 1st Edition
    • Ronald Sass + 1 more
    • English
    Embedded Systems Design with Platform FPGAs introduces professional engineers and students alike to system development using Platform FPGAs. The focus is on embedded systems but it also serves as a general guide to building custom computing systems. The text describes the fundamental technology in terms of hardware, software, and a set of principles to guide the development of Platform FPGA systems. The goal is to show how to systematically and creatively apply these principles to the construction of application-specific embedded system architectures. There is a strong focus on using free and open source software to increase productivity. Each chapter is organized into two parts. The white pages describe concepts, principles, and general knowledge. The gray pages provide a technical rendition of the main issues of the chapter and show the concepts applied in practice. This includes step-by-step details for a specific development board and tool chain so that the reader can carry out the same steps on their own. Rather than try to demonstrate the concepts on a broad set of tools and boards, the text uses a single set of tools (Xilinx Platform Studio, Linux, and GNU) throughout and uses a single developer board (Xilinx ML-510) for the examples.