Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • User-Generated Content and its Impact On Web-Based Library Services

      • 1st Edition
      • March 31, 2009
      • Kay Cahill
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 3 4 3
      • Hardback
        9 7 8 1 8 4 3 3 4 5 3 5 0
      • eBook
        9 7 8 1 7 8 0 6 3 0 0 8 3
      User-Generated Content and its Impact on Web-Based Library Services examines the impact of user-generated content on web-based library services. It begins with an overview of Web 2.0 tools and technologies and a brief look at the emerging semantic tools of Web 3.0 and their implications for libraries. The book investigates the changing role of the end user as both a creator and consumer of web content and what this means for society’s perception and understanding of information. The author addresses the advantages and challenges of using these tools to bring community expertise and opinion into the library, from reinvention of the library website as a community rather than a collection to the issues of moderating user-generated content. The book also explores the notion of ‘low-fidelity authority’, understanding that by acknowledging the value in content that does not necessarily meet traditional definition of authority, it creates the potential to achieve a much greater level of relevance and engagement with users. Throughout the book, conceptual discussion is illustrated with real-world examples and practical suggestions for library practitioners.
    • Up and Running with Autodesk Inventor Simulation 2010

      • 1st Edition
      • May 21, 2009
      • Wasim Younis
      • English
      • eBook
        9 7 8 0 0 8 0 9 5 9 1 4 6
      Inventor Simulation is an essential part of the Autodesk Digital Prototyping process. It allows engineers and designers to explore and test components and products virtually, visualizing and simulating real-world performance. Up and Running with Autodesk Inventor Simulation 2010 is dedicated to the requirements of Inventor users who need to quickly learn or refresh their skills, and apply the dynamic simulation, assembly analysis and optimization capabilities of Inventor Simulation 2010.
    • Scalable VoIP Mobility

      • 1st Edition
      • July 30, 2009
      • Joseph Epstein
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 5 0 8 1
      • eBook
        9 7 8 0 0 8 0 9 4 9 5 1 2
      Provides practical advice on breaking down the implementation and deployment of voice mobility networks within the office, across the campus, and on the road. Offers a complete primer on enterprise-grade Wi-Fi networking for voice mobility at scale, whether as a single-mode or dual-mode network, including information on the newest 802.11n standard and how these standards directly impact voice mobility. Includes methods of integrating existing or new VoIP networks with 3G+, CDMA 2000, WCDMA, HSPA, and WiMAX cellular networks using fixed/mobile convergence (FMC). This book provides a comprehensive examination of IP-based voice mobility, covering every step in deploying multimodal voice mobility networks. Each segment of the entire voice mobility solution is described with an eye towards the inherent problems of high-scale mobility, from wired infrastructure to end device, across multiple networks and technologies. Voice mobility is introduced and defined at a basic level before the book examines the high-level components of a scalable voice mobility solution. Chapters focus on several types of transport networks in greater depth, including voice quality metrics and testing, high-density enterprise Wi-Fi voice networks, cellular networks, and high-level networking technologies. The security of VoIP networks is also considered. The book explores standalone VoIP networks and finally provides an investigation of the current and upcoming set of fixed/mobile convergence approaches. This book is an invaluable guide for anyone looking towards voice mobility as a solution to real-world business problems: IT managers and executives looking to understand the potential for converting offices to all-wireless; network designers and architects planning on rolling out a fully-mobile voice network; and administrators operating or troubleshooting voice mobility networks.
    • Enveloping Algebras

      • 1st Edition
      • Volume 14
      • February 10, 2009
      • Diximier
      • English
      • eBook
        9 7 8 0 0 8 0 9 6 0 0 9 8
      • eBook
        9 7 8 0 4 4 4 1 1 0 7 7 0
    • Manual of Engineering Drawing

      • 3rd Edition
      • March 24, 2009
      • Colin H. Simmons + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 9 4 3 6 2 6
      The Manual of Engineering Drawing has long been the recognised as a guide for practicing and student engineers to producing engineering drawings and annotated 3D models that comply with the latest British and ISO Standards of Technical Product Specifications and Documentation.This new edition has been updated to include the requirements of BS8888 2008 and the relevant ISO Standards, and is ideal for International readership; it includes a guide to the fundamental differences between the ISO and ASME Standards relating to Technical Product Specification and Documentation. Equally applicable to CAD and manual drawing it includes the latest development in 3D annotation and the specification of surface texture. The Duality Principle is introduced as this important concept is still very relevant in the new world of 3D Technical Product Specification.Writte... by members of BSI and ISO committees and a former college lecturer, the Manual of Engineering Drawing combines up to the minute technical information with clear, readable explanations and numerous diagrams and traditional geometrical construction techniques rarely taught in schools and colleges. This approach makes this manual an ideal companion for students studying vocational courses in Technical Product Specification, undergraduates studying engineering or product design and any budding engineer beginning a career in design.The comprehensive scope of this new edition encompasses topics such as orthographic and pictorial projections, dimensional, geometrical and surface tolerancing, 3D annotation and the duality principle, along with numerous examples of electrical and hydraulic diagrams with symbols and applications of cams, bearings, welding and adhesives.
    • The Internet, Power and Society

      • 1st Edition
      • August 30, 2009
      • Marcus Leaning
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 4 5 2 0
      • Hardback
        9 7 8 1 8 4 3 3 4 4 5 3 7
      • eBook
        9 7 8 1 7 8 0 6 3 1 6 8 4
      An exciting challenge to how the internet and ICT have been understood in academia and popular culture and shows how important ‘cultural’ assumptions are in how we understand technology. The Internet, Power and Society argues that the way in which we view technology such as the internet owes much to older, historic views of the media and to ‘issues’ in contemporary society. Such perspectives are deeply rooted in a Western view of technology and the book concludes by offering a radically new perspective as to how the internet can change a society that is truly global in its application.
    • Web Application Design Patterns

      • 1st Edition
      • February 23, 2009
      • Pawan Vora
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 2 6 5 0
      • eBook
        9 7 8 0 0 8 0 9 2 1 4 5 7
      Ever notice that—in spite of their pervasiveness—design... web applications is still challenging? While their benefits motivate their creation, there are no well-established guidelines for design. This often results in inconsistent behaviors and appearances, even among web applications created by the same company. Design patterns for web applications, similar in concept to those for web sites and software design, offer an effective solution. In Web Application Design Patterns, Pawan Vora documents design patterns for web applications by not only identifying design solutions for user interaction problems, but also by examining the rationale for their effectiveness, and by presenting how they should be applied.
    • Joe Celko's Data, Measurements and Standards in SQL

      • 1st Edition
      • September 17, 2009
      • Joe Celko
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 7 2 2 8
      • eBook
        9 7 8 0 0 8 0 8 8 4 4 5 5
      Joe Celko has looked deep into the code of SQL programmers and found a consistent and troubling pattern - a frightening lack of consistency between their individual encoding schemes and those of the industries in which they operate. This translates into a series of incompatible databases, each one an island unto itself that is unable to share information with others in an age of internationalization and business interdependence. Such incompatibility severely hinders information flow and the quality of company data.Data, Measurements and Standards in SQL reveals the shift these programmers need to make to overcome this deadlock. By collecting and detailing the diverse standards of myriad industries, and then giving a declaration for the units that can be used in an SQL schema, Celko enables readers to write and implement portable data that can interface to any number of external application systems! This book doesn't limit itself to one subject, but serves as a detailed synopsis of measurement scales and data standards for all industries, thereby giving RDBMS programmers and designers the knowledge and know-how they need to communicate effectively across business boundaries.
    • Design to Thrive

      • 1st Edition
      • December 8, 2009
      • Tharon Howard
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 9 2 1 5
      • eBook
        9 7 8 0 0 8 0 9 5 7 2 0 3
      Social networks and online communities are reshaping the way people communicate, both in their personal and professional lives. What makes some succeed and others fail? What draws a user in? What makes them join? What keeps them coming back? Entrepreneurs and businesses are turning to user experience practitioners to figure this out. Though they are well-equipped to evaluate and create a variety of interfaces, social networks require a different set of design principles and ways of thinking about the user in order to be successful. Design to Thrive presents tried and tested design methodologies, based on the author’s decades of research, to ensure successful and sustainable online communities -- whether a wiki for employees to share procedures and best practices or for the next Facebook. The book describes four criteria, called "RIBS," which are necessary to the design of a successful and sustainable online community. These concepts provide designers with the tools they need to generate informed creative and productive design ideas, to think proactively about the communities they are building or maintaining, and to design communities that encourage users to actively contribute.
    • Computer and Information Security Handbook

      • 1st Edition
      • May 4, 2009
      • John Vacca
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 3 5 4 1
      • eBook
        9 7 8 0 0 8 0 9 2 1 9 4 5
      Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.