Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • The Essential Persona Lifecycle

      • 1st Edition
      • March 20, 2010
      • Tamara Adlin + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 8 1 4 1 8 0
      • eBook
        9 7 8 0 1 2 3 8 1 4 1 9 7
      The Essential Persona Lifecycle: Your Guide to Building and Using Personas offers a practical guide to the creation and use of personas, which can help product designers, their team, and their organization become more user focused. This book is for people who just need to know what to do and what order to do it in. It is completely focused on practical tools and methods, without much explanation on why the particular tool or method is the right one. The book discusses the five phases of persona lifecycle: Family planning — Basic ideas and a few tools that will help one get organized Conception and gestation — Step-by-step instructions to move from assumptions to completed personas Birth and maturation — Strategic techniques to get the right information about ones personas out to ones your teammates at the right time Adulthood — Specific tools that will ensure that ones personas are used by the right people at the right times and in the right ways during the product development cycle Lifetime achievement and retirement — Basic ideas and a few tools to you measure the success of the persona effort and prepare for the next one
    • Agile Development and Business Goals

      • 1st Edition
      • June 4, 2010
      • Bill Holtsnider + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 3 8 1 5 2 0 0
      • eBook
        9 7 8 0 1 2 3 8 1 5 2 1 7
      Agile Development and Business Goals: The Six-Week Solution is a guide for the software development process, which can be challenging, difficult, and time-consuming. This process, called the “Agile” process, is unique, and it features several aspects that distinguish it from the classical methods of software development. The book offers readers information about the design, implementation, and management of the different methods of creating world-class software. The book discusses the various reasons that the development of software is a difficult process, and it addresses how software development sometimes fails and why it seldom aligns with business needs. It further examines the risk associated with software creation and the different ways to mitigate them. This book is relevant to software development managers responsible for creating quality software products, and managing software development teams.
    • The Practitioner's Guide to Data Quality Improvement

      • 1st Edition
      • October 15, 2010
      • David Loshin
      • English
      • Paperback
        9 7 8 0 1 2 3 7 3 7 1 7 5
      • eBook
        9 7 8 0 0 8 0 9 2 0 3 4 4
      The Practitioner's Guide to Data Quality Improvement offers a comprehensive look at data quality for business and IT, encompassing people, process, and technology. It shares the fundamentals for understanding the impacts of poor data quality, and guides practitioners and managers alike in socializing, gaining sponsorship for, planning, and establishing a data quality program. It demonstrates how to institute and run a data quality program, from first thoughts and justifications to maintenance and ongoing metrics. It includes an in-depth look at the use of data quality tools, including business case templates, and tools for analysis, reporting, and strategic planning. This book is recommended for data management practitioners, including database analysts, information analysts, data administrators, data architects, enterprise architects, data warehouse engineers, and systems analysts, and their managers.
    • Microsoft Windows Server 2008 R2 Administrator's Reference

      • 1st Edition
      • July 6, 2010
      • Dustin Hannifin
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 7 8 3
      • eBook
        9 7 8 1 5 9 7 4 9 5 7 9 0
      Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions; and discusses its deployment. After introducing Windows Server 2008 R2, the book explains its installation and configuration processes followed by its networking. It also examines different features, such as the active directory, internet information services 7.5, Hyper-V, and PowerShell V2. It discusses securing Windows Server 2008 R2 files and its print services, remote desktop services, high-availability and recovery features, and monitoring and troubleshooting; in addition, their delta changes are discussed in the final chapter. The book also explores the features that influence both Windows Server 2008 R2 and Windows 7. These features allow the server operating system to work with Windows 7. One feature is the BranchCache, which offers users who open files across a Wide Area Network a better end-user experience by caching copy in the branch office when a document or intranet Web site is opened for the first time. Another feature is DirectAccess, which is the new remote connectivity solution for Windows networks.
    • Web Application Obfuscation

      • 1st Edition
      • December 10, 2010
      • Mario Heiderich + 3 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 0 4 9
      • eBook
        9 7 8 1 5 9 7 4 9 6 0 5 6
      Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.
    • Information Systems Transformation

      • 1st Edition
      • February 4, 2010
      • William M. Ulrich + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 9 1 3 0
      • eBook
        9 7 8 0 0 8 0 9 5 7 1 0 4
      Every major enterprise has a significant installed base of existing software systems that reflect the tangled IT architectures that result from decades of patches and failed replacements. Most of these systems were designed to support business architectures that have changed dramatically. At best, these systems hinder agility and competitiveness and, at worst, can bring critical business functions to a halt. Architecture-Driven Modernization (ADM) restores the value of entrenched systems by capturing and retooling various aspects of existing application environments, allowing old infrastructures to deliver renewed value and align effectively with enterprise strategies and business architectures. Information Systems Transformation provides a practical guide to organizations seeking ways to understand and leverage existing systems as part of their information management strategies. It includes an introduction to ADM disciplines, tools, and standards as well as a series of scenarios outlining how ADM is applied to various initiatives. Drawing upon lessons learned from real modernization projects, it distills the theory and explains principles, processes, and best practices for every industry.
    • System Assurance

      • 1st Edition
      • December 6, 2010
      • Nikolai Mansourov + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 8 1 4 1 4 2
      • eBook
        9 7 8 0 1 2 3 8 1 4 1 5 9
      System Assurance teaches students how to use Object Management Group’s (OMG) expertise and unique standards to obtain accurate knowledge about existing software and compose objective metrics for system assurance. OMG’s Assurance Ecosystem provides a common framework for discovering, integrating, analyzing, and distributing facts about existing enterprise software. Its foundation is the standard protocol for exchanging system facts, defined as the OMG Knowledge Discovery Metamodel (KDM). In addition, the Semantics of Business Vocabularies and Business Rules (SBVR) defines a standard protocol for exchanging security policy rules and assurance patterns. Using these standards together, students will learn how to leverage the knowledge of the cybersecurity community and bring automation to protect systems. This book includes an overview of OMG Software Assurance Ecosystem protocols that integrate risk, architecture, and code analysis guided by the assurance argument. A case study illustrates the steps of the System Assurance Methodology using automated tools. This book is recommended for technologists from a broad range of software companies and related industries; security analysts, computer systems analysts, computer software engineers-systems software, computer software engineers- applications, computer and information systems managers, network systems and data communication analysts.
    • Handbook of Image and Video Processing

      • 2nd Edition
      • July 21, 2010
      • Alan C. Bovik
      • English
      • eBook
        9 7 8 0 0 8 0 5 3 3 6 1 2
      55% new material in the latest edition of this “must-have” for students and practitioners of image & video processing!This Handbook is intended to serve as the basic reference point on image and video processing, in the field, in the research laboratory, and in the classroom. Each chapter has been written by carefully selected, distinguished experts specializing in that topic and carefully reviewed by the Editor, Al Bovik, ensuring that the greatest depth of understanding be communicated to the reader. Coverage includes introductory, intermediate and advanced topics and as such, this book serves equally well as classroom textbook as reference resource. • Provides practicing engineers and students with a highly accessible resource for learning and using image/video processing theory and algorithms • Includes a new chapter on image processing education, which should prove invaluable for those developing or modifying their curricula • Covers the various image and video processing standards that exist and are emerging, driving today’s explosive industry • Offers an understanding of what images are, how they are modeled, and gives an introduction to how they are perceived • Introduces the necessary, practical background to allow engineering students to acquire and process their own digital image or video data • Culminates with a diverse set of applications chapters, covered in sufficient depth to serve as extensible models to the reader’s own potential applications About the Editor… Al Bovik is the Cullen Trust for Higher Education Endowed Professor at The University of Texas at Austin, where he is the Director of the Laboratory for Image and Video Engineering (LIVE). He has published over 400 technical articles in the general area of image and video processing and holds two U.S. patents. Dr. Bovik was Distinguished Lecturer of the IEEE Signal Processing Society (2000), received the IEEE Signal Processing Society Meritorious Service Award (1998), the IEEE Third Millennium Medal (2000), and twice was a two-time Honorable Mention winner of the international Pattern Recognition Society Award. He is a Fellow of the IEEE, was Editor-in-Chief, of the IEEE Transactions on Image Processing (1996-2002), has served on and continues to serve on many other professional boards and panels, and was the Founding General Chairman of the IEEE International Conference on Image Processing which was held in Austin, Texas in 1994.
    • Analyzing Social Media Networks with NodeXL

      • 1st Edition
      • August 27, 2010
      • Derek Hansen + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 8 2 2 2 9 1
      • eBook
        9 7 8 0 1 2 3 8 2 2 3 0 7
      Analyzing Social Media Networks with NodeXL offers backgrounds in information studies, computer science, and sociology. This book is divided into three parts: analyzing social media, NodeXL tutorial, and social-media network analysis case studies. Part I provides background in the history and concepts of social media and social networks. Also included here is social network analysis, which flows from measuring, to mapping, and modeling collections of connections. The next part focuses on the detailed operation of the free and open-source NodeXL extension of Microsoft Excel, which is used in all exercises throughout this book. In the final part, each chapter presents one form of social media, such as e-mail, Twitter, Facebook, Flickr, and Youtube. In addition, there are descriptions of each system, the nature of networks when people interact, and types of analysis for identifying people, documents, groups, and events.
    • Usability Testing Essentials

      • 1st Edition
      • October 22, 2010
      • Carol M. Barnum
      • English
      • Paperback
        9 7 8 0 1 2 3 7 5 0 9 2 1
      • eBook
        9 7 8 0 1 2 3 7 8 5 5 3 4
      Usability Testing Essentials provides readers with the tools and techniques needed to begin usability testing or to advance their knowledge in this area. The book begins by presenting the essentials of usability testing, which include focusing on the user and not the product; knowing when to conduct small or large studies; and thinking of usability as hill climbing. It then reviews testing options and places usability testing into the context of a user-centered design (UCD). It goes on to discuss the planning, preparation, and implementation of a usability test. The remaining chapters cover the analysis and reporting of usability test findings, and the unique aspects of international usability testing. This book will be useful to anyone else involved in the development or support of any type of product, such as software or web developers, engineers, interaction designers, information architects, technical communicators, visual or graphic designers, trainers, user-assistance specialists, and instructional technologists.