Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Joe Celko's SQL for Smarties

    Advanced SQL Programming
    • 4th Edition
    • October 18, 2010
    • Joe Celko
    • English
    Joe Celkos SQL for Smarties: Advanced SQL Programming offers tips and techniques in advanced programming. This book is the fourth edition and it consists of 39 chapters, starting with a comparison between databases and file systems. It covers transactions and currency control, schema level objects, locating data and schema numbers, base tables, and auxiliary tables. Furthermore, procedural, semi-procedural, and declarative programming are explored in this book. The book also presents the different normal forms in database normalization, including the first, second, third, fourth, fifth, elementary key, domain-key, and Boyce-Codd normal forms. It also offers practical hints for normalization and denormalization. The book discusses different data types, such as the numeric, temporal and character data types; the different predicates; and the simple and advanced SELECT statements. In addition, the book presents virtual tables, and it discusses data partitions in queries; grouping operations; simple aggregate functions; and descriptive statistics, matrices and graphs in SQL. The book concludes with a discussion about optimizing SQL. It will be of great value to SQL programmers.
  • The Practitioner's Guide to Data Quality Improvement

    • 1st Edition
    • October 15, 2010
    • David Loshin
    • English
    The Practitioner's Guide to Data Quality Improvement offers a comprehensive look at data quality for business and IT, encompassing people, process, and technology. It shares the fundamentals for understanding the impacts of poor data quality, and guides practitioners and managers alike in socializing, gaining sponsorship for, planning, and establishing a data quality program. It demonstrates how to institute and run a data quality program, from first thoughts and justifications to maintenance and ongoing metrics. It includes an in-depth look at the use of data quality tools, including business case templates, and tools for analysis, reporting, and strategic planning. This book is recommended for data management practitioners, including database analysts, information analysts, data administrators, data architects, enterprise architects, data warehouse engineers, and systems analysts, and their managers.
  • News Search, Blogs and Feeds

    A Toolkit
    • 1st Edition
    • September 27, 2010
    • Lars Vage + 1 more
    • English
    This book is about news search and monitoring. Aimed at professionals with a strategic need of monitoring the surrounding world, users with a need to find the best news sources, monitoring services and news search strategies and techniques will benefit from reading this book. The main purpose is to present a practical handbook with an analysis of readily available tools, blending with passages of a theoretical nature. It is also useful for students at LIS programmes and related information programmes and for librarians and information professionals. The authors aim to aid the reader in reaching a greater understanding of the core in news search and monitoring.
  • Citrix XenDesktop Implementation

    A Practical Guide for IT Professionals
    • 1st Edition
    • September 27, 2010
    • Gareth R. James
    • English
    Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop Client Settings. This book briefly discusses the work of desktop delivery controller mechanisms followed by its installation process, integration process of XenDesktop with Microsoft Active Directory, and the configuration of the desktop delivery controller. It then examines the process of installing the virtual desktop onto the server infrastructure, and it follows the installation and integration onto Xen Server, Hyper-V, and VMware hypervisors. Furthermore, it discusses the advanced configuration settings. The book covers the installation of the Citrix Provisioning Server and its fundamental configuration. It also explores the configuration of Citrix XenApp for Application provisioning, the integration of virtual applications, and the implementation of virtual profiles into the virtual desktop. The book concludes by explaining the advanced XenDesktop client settings on audio, video, and peripherals.
  • A Practical Guide to Electronic Resources in the Humanities

    • 1st Edition
    • September 25, 2010
    • Ana Dubnjakovic + 1 more
    • English
    From full-text article databases to digitized collections of primary source materials, newly emerging electronic resources have radically impacted how research in the humanities is conducted and discovered. This book, covering high-quality, up-to-date electronic resources for the humanities, is an easy–to-use annotated guide for the librarian, student, and scholar alike. It covers online databases, indexes, archives, and many other critical tools in key humanities disciplines including philosophy, religion, languages and literature, and performing and visual arts. Succinct overviews of key emerging trends in electronic resources accompany each chapter.
  • Building a Digital Repository Program with Limited Resources

    • 1st Edition
    • September 24, 2010
    • Abby Clobridge
    • English
    Whether you are just starting to create a digital repository or your institution already has a fully-developed program, this book provides strategies for building and maintaining a high-use, cohesive, and fiscally-responsible repository with collections that showcase your institution. The book explains how to strategically select projects tied to your institution’s goals, create processes and workflows designed to support a fully-functioning program, and creatively utilize existing resources. The benefits of taking a holistic approach to creating a digital repository program rather than focusing only on individual collections are discussed. Case studies and best practices from various institutions round out the author’s practical suggestions.
  • Introduction to Multimedia Systems

    • 1st Edition
    • September 23, 2010
    • Urbashi Mitra
    • English
  • Ninja Hacking

    Unconventional Penetration Testing Tactics and Techniques
    • 1st Edition
    • September 23, 2010
    • Thomas Wilhelm + 1 more
    • English
    Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.
  • Securing the Smart Grid

    Next Generation Power Grid Security
    • 1st Edition
    • September 23, 2010
    • Tony Flick + 1 more
    • English
    Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and utility companies can use to minimize the risk associated with the smart grid. It explains the smart grid components in detail so readers can understand how the confidentiality, integrity, and availability of these components can be secured or compromised. This book will be a valuable reference for readers who secure the networks of smart grid deployments, as well as consumers who use smart grid devices.
  • Security for Microsoft Windows System Administrators

    Introduction to Key Information Security Concepts
    • 1st Edition
    • September 23, 2010
    • Derrick Rountree
    • English
    Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.