Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • VHDL 101

      • 1st Edition
      • December 22, 2010
      • William Kafig
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 7 0 4 7
      • eBook
        9 7 8 0 0 8 0 9 5 9 3 9 9
      VHDL 101 is written for Electrical Engineers and others wishing to break into FPGA design and assumes a basic knowledge of digital design and some experience with engineering ‘process’. Bill Kafig, industry expert, swiftly brings the reader up to speed on techniques and functions commonly used in VHDL (VHSIC Hardware Description Language) as well as commands and data types. Extensive simple, complete designs accompany the content for maximum comprehension. The book concludes with a section on design re-use, which is of utmost importance to today's engineer who needs to meet a deadline and lower costs per unit. *Gets you up to speed with VHDL fast, reducing time to market and driving down costs *Covers the basics including language concepts and includes complete design examples for ease of learning * Covers widely accepted industry nomenclature * Learn from "best design practices"
    • Citrix XenDesktop Implementation

      • 1st Edition
      • September 27, 2010
      • Gareth R. James
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 8 2 0
      • eBook
        9 7 8 1 5 9 7 4 9 5 8 3 7
      Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop Client Settings. This book briefly discusses the work of desktop delivery controller mechanisms followed by its installation process, integration process of XenDesktop with Microsoft Active Directory, and the configuration of the desktop delivery controller. It then examines the process of installing the virtual desktop onto the server infrastructure, and it follows the installation and integration onto Xen Server, Hyper-V, and VMware hypervisors. Furthermore, it discusses the advanced configuration settings. The book covers the installation of the Citrix Provisioning Server and its fundamental configuration. It also explores the configuration of Citrix XenApp for Application provisioning, the integration of virtual applications, and the implementation of virtual profiles into the virtual desktop. The book concludes by explaining the advanced XenDesktop client settings on audio, video, and peripherals.
    • Handbook of Blind Source Separation

      • 1st Edition
      • February 17, 2010
      • Pierre Comon + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 7 2 6 6
      • eBook
        9 7 8 0 0 8 0 8 8 4 9 4 3
      Edited by the people who were forerunners in creating the field, together with contributions from 34 leading international experts, this handbook provides the definitive reference on Blind Source Separation, giving a broad and comprehensive description of all the core principles and methods, numerical algorithms and major applications in the fields of telecommunications, biomedical engineering and audio, acoustic and speech processing. Going beyond a machine learning perspective, the book reflects recent results in signal processing and numerical analysis, and includes topics such as optimization criteria, mathematical tools, the design of numerical algorithms, convolutive mixtures, and time frequency approaches. This Handbook is an ideal reference for university researchers, R&D engineers and graduates wishing to learn the core principles, methods, algorithms, and applications of Blind Source Separation.
    • Security for Microsoft Windows System Administrators

      • 1st Edition
      • September 23, 2010
      • Derrick Rountree
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 9 4 3
      • eBook
        9 7 8 1 5 9 7 4 9 5 9 5 0
      Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.
    • Understanding Motion Capture for Computer Animation

      • 2nd Edition
      • December 15, 2010
      • Alberto Menache
      • English
      • Paperback
        9 7 8 0 1 2 3 8 1 4 9 6 8
      • eBook
        9 7 8 0 1 2 3 8 1 4 9 7 5
      Understanding Motion Capture for Computer Animation discusses the latest technology developments in digital design, film, games, medicine, sports, and security engineering. Motion capture records a live-motion event and translates it into a digital context. It is the technology that converts a live performance into a digital performance. In contrast, performance animation is the actual performance that brings life to the character, even without using technology. If motion capture is the collection of data that represents motion, performance animation is the character that a performer represents. The book offers extensive information about motion capture. It includes state-of-the-art technology, methodology, and developments in the current motion-capture industry. In particular, the different ways to capture motions are discussed, including using cameras or electromagnetic fields in tracking a group of sensors. This book will be useful for students taking a course about digital filming, as well as for anyone who is interested in this topic.
    • Securing SQL Server

      • 1st Edition
      • December 27, 2010
      • Denny Cherry
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 6 2 6 1
      Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.
    • Introduction to Pattern Recognition

      • 1st Edition
      • March 3, 2010
      • Sergios Theodoridis + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 4 8 6 9
      • eBook
        9 7 8 0 0 8 0 9 2 2 7 5 1
      Introduction to Pattern Recognition: A Matlab Approach is an accompanying manual to Theodoridis/Koutroum... Pattern Recognition. It includes Matlab code of the most common methods and algorithms in the book, together with a descriptive summary and solved examples, and including real-life data sets in imaging and audio recognition. This text is designed for electronic engineering, computer science, computer engineering, biomedical engineering and applied mathematics students taking graduate courses on pattern recognition and machine learning as well as R&D engineers and university researchers in image and signal processing/analyisis... and computer vision.
    • Developing High Quality Data Models

      • 1st Edition
      • December 30, 2010
      • Matthew West
      • English
      • Paperback
        9 7 8 0 1 2 3 7 5 1 0 6 5
      • eBook
        9 7 8 0 1 2 3 7 5 1 0 7 2
      Developing High Quality Data Models provides an introduction to the key principles of data modeling. It explains the purpose of data models in both developing an Enterprise Architecture and in supporting Information Quality; common problems in data model development; and how to develop high quality data models, in particular conceptual, integration, and enterprise data models. The book is organized into four parts. Part 1 provides an overview of data models and data modeling including the basics of data model notation; types and uses of data models; and the place of data models in enterprise architecture. Part 2 introduces some general principles for data models, including principles for developing ontologically based data models; and applications of the principles for attributes, relationship types, and entity types. Part 3 presents an ontological framework for developing consistent data models. Part 4 provides the full data model that has been in development throughout the book. The model was created using Jotne EPM Technologys EDMVisualExpress data modeling tool. This book was designed for all types of modelers: from those who understand data modeling basics but are just starting to learn about data modeling in practice, through to experienced data modelers seeking to expand their knowledge and skills and solve some of the more challenging problems of data modeling.
    • Ninja Hacking

      • 1st Edition
      • September 23, 2010
      • Thomas Wilhelm + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 8 8 2
      • eBook
        9 7 8 1 5 9 7 4 9 5 8 9 9
      Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.
    • Soft Computing in Textile Engineering

      • 1st Edition
      • November 29, 2010
      • Abhijit Majumdar
      • English
      • Paperback
        9 7 8 0 0 8 1 0 1 4 7 6 9
      • eBook
        9 7 8 0 8 5 7 0 9 0 8 1 2
      Soft computing refers to a collection of computational techniques which study, model and analyse complex phenomena. As many textile engineering problems are inherently complex in nature, soft computing techniques have often provided optimum solutions to these cases. Although soft computing has several facets, it mainly revolves around three techniques; artificial neural networks, fuzzy logic and genetic algorithms. The book is divided into five parts, covering the entire process of textile production, from fibre manufacture to garment engineering. These include soft computing techniques in yarn manufacture and modelling, fabric and garment manufacture, textile properties and applications and textile quality evaluation.