Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Brain Machine Interfaces for Space Applications: enhancing astronaut capabilities

      • 1st Edition
      • Volume 86
      • July 10, 2009
      • Dario Izzo + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 8 2 1 8
      • eBook
        9 7 8 0 0 8 0 8 8 8 6 4 4
      Among the most interesting fields in research are the emerging possibilities to interface the human brain directly with machines, e.g. with computers and robotic interfaces. The European Space Agency's Advanced Concept team as a multidisciplinary team from engineering, artificial intelligence, and neural engineering has been working on the cutting edge of exploring brain machine interfaces for application in space as solutions to limitations astronauts face in space, and this book for the first time presents the state-of-the-art-coh...
    • CompTIA Network+ Certification Study Guide: Exam N10-004

      • 2nd Edition
      • July 30, 2009
      • Robert Shimonski + 4 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 4 2 9 8
      • eBook
        9 7 8 1 5 9 7 4 9 4 8 8 5
      CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the CompTIA Network+ exam. The book begins with a brief history of the development of networks, including their origins and where they are heading. It describes network models such as centralized and decentralized, and distinguishes between a local area network (LAN) and a wide area network (WAN). The discussions include cable connections and termination for the Network+ exam; the meaning of convergence; and the most common network devices being used on small and large networks, including the Internet. The role of switches in improving network functionality and enhancing security is described. The book also contains chapters on wireless networking; Open Systems Interconnection (OSI) model; Transmission Control Protocol/Internet Protocol (TCP/IP); wide area network (WAN) technologies; network security; and network management and troubleshooting.
    • Mobile IPv6

      • 1st Edition
      • July 13, 2009
      • Qing Li + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 5 0 7 5 4
      • eBook
        9 7 8 0 1 2 3 7 8 5 6 8 8
      Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.).This book covers the IPv6 host mobility protocol known as "mobile IPv6" and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation. A sample configuration for a real Mobile IPv6 operation is provided at the end of the book.
    • Why Programs Fail

      • 2nd Edition
      • June 12, 2009
      • Andreas Zeller
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 5 1 5 6
      • eBook
        9 7 8 0 0 8 0 9 2 3 0 0 0
      Why Programs Fail: A Guide to Systematic Debugging is proof that debugging has graduated from a black art to a systematic discipline. It demystifies one of the toughest aspects of software programming, showing clearly how to discover what caused software failures, and fix them with minimal muss and fuss. The fully updated second edition includes 100+ pages of new material, including new chapters on Verifying Code, Predicting Erors, and Preventing Errors. Cutting-edge tools such as FindBUGS and AGITAR are explained, techniques from integrated environments like Jazz.net are highlighted, and all-new demos with ESC/Java and Spec#, Eclipse and Mozilla are included. This complete and pragmatic overview of debugging is authored by Andreas Zeller, the talented researcher who developed the GNU Data Display Debugger(DDD), a tool that over 250,000 professionals use to visualize the data structures of programs while they are running. Unlike other books on debugging, Zeller's text is product agnostic, appropriate for all programming languages and skill levels. The book explains best practices ranging from systematically tracking error reports, to observing symptoms, reproducing errors, and correcting defects. It covers a wide range of tools and techniques from hands-on observation to fully automated diagnoses, and also explores the author's innovative techniques for isolating minimal input to reproduce an error and for tracking cause and effect through a program. It even includes instructions on how to create automated debugging tools. The text includes exercises and extensive references for further study, and a companion website with source code for all examples and additional debugging resources is available.
    • Embedded Systems and Software Validation

      • 1st Edition
      • April 29, 2009
      • Abhik Roychoudhury
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 2 3 0 8
      • eBook
        9 7 8 0 0 8 0 9 2 1 2 5 9
      Modern embedded systems require high performance, low cost and low power consumption. Such systems typically consist of a heterogeneous collection of processors, specialized memory subsystems, and partially programmable or fixed-function components. This heterogeneity, coupled with issues such as hardware/software partitioning, mapping, scheduling, etc., leads to a large number of design possibilities, making performance debugging and validation of such systems a difficult problem. Embedded systems are used to control safety critical applications such as flight control, automotive electronics and healthcare monitoring. Clearly, developing reliable software/systems for such applications is of utmost importance. This book describes a host of debugging and verification methods which can help to achieve this goal.
    • Computer Animation Complete

      • 1st Edition
      • September 2, 2009
      • Rick Parent + 14 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 5 0 7 8 5
      • eBook
        9 7 8 0 1 2 3 7 8 5 6 4 0
      A compilation of key chapters from the top MK computer animation books available today - in the areas of motion capture, facial features, solid spaces, fluids, gases, biology, point-based graphics, and Maya. The chapters provide CG Animators with an excellent sampling of essential techniques that every 3D artist needs to create stunning and versatile images. Animators will be able to master myriad modeling, rendering, and texturing procedures with advice from MK's best and brightest authors. Divided into five parts (Introduction to Computer Animation and Technical Background, Motion Capture Techniques, Animating Substances, Alternate Methods, and Animating with MEL for MAYA), each one focusing on specific substances, tools, topics, and languages, this is a MUST-HAVE book for artists interested in proficiency with the top technology available today! Whether you're a programmer developing new animation functionality or an animator trying to get the most out of your current animation software, Computer Animation Complete: will help you work more efficiently and achieve better results. For programmers, this book provides a solid theoretical orientation and extensive practical instruction information you can put to work in any development or customization project. For animators, it provides crystal-clear guidance on determining which of your concepts can be realized using commercially available products, which demand custom programming, and what development strategies are likely to bring you the greatest success.
    • IPv6 Socket API Extensions: Programmer's Guide

      • 1st Edition
      • June 25, 2009
      • Qing Li + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 5 0 7 6 1
      • eBook
        9 7 8 0 1 2 3 7 8 5 6 9 5
      IPv6 Socket API Extensions: Programmer's Guide covers the IPv6 applicaton programming interfaces (API) extensions and enhancements that have been made to the socket APIs. The book begins with a brief overview of the API specifications along with sample code usage. Then an explanation of the internal kernel implementation that realizes the services offered by the API sets is detailed. Also descriptions of several standard user libraries that have been extended or created to support IPv6 are reviewed. Includes various examples which illustrate how to write portable applications that can run on either IPv4 or IPv6 networks. Succinct treatment of everything you need to know to get up and running with IPv6 socket programming in one affordable volume.
    • Combinatory Logic

      • 1st Edition
      • Volume 65
      • June 17, 2009
      • Lev D. Beklemishev
      • English
      • eBook
        9 7 8 0 0 8 0 9 5 4 7 7 6
    • SQL Injection Attacks and Defense

      • 2nd Edition
      • June 16, 2009
      • Justin Clarke-Salt
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 6 3 7
      • eBook
        9 7 8 1 5 9 7 4 9 9 7 3 6
      SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Attacks and Defense, Second Edition is the only book devoted exclusively to this long-established but recently growing threat. This is the definitive resource for understanding, finding, exploiting, and defending against this increasingly popular and particularly destructive type of Internet-based attack. SQL Injection Attacks and Defense, Second Edition includes all the currently known information about these attacks and significant insight from its team of SQL injection experts, who tell you about: Understanding SQL Injection – Understand what it is and how it works Find, confirm and automate SQL injection discovery Tips and tricks for finding SQL injection within code Create exploits for using SQL injection Design apps to avoid the dangers these attacks SQL injection on different databases SQL injection on different technologies SQL injection testing techniques Case Studies