Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Network Quality of Service Know It All

      • 1st Edition
      • October 23, 2008
      • Adrian Farrel
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 5 9 7 2
      • Paperback
        9 7 8 0 3 2 3 2 8 1 8 7 4
      • eBook
        9 7 8 0 0 8 0 9 2 3 4 1 3
      The term Quality of Service, abbreviated QoS, refers to network resource control mechanisms. Quality of Service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. This book brings all of the elements of network quality of service (QoS) together in a single volume, saving the reader the time and expense of making multiple purchases. It introduces network QoS, explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field. It is a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.
    • Database Design: Know It All

      • 1st Edition
      • October 23, 2008
      • Toby J. Teorey + 16 more
      • English
      • Paperback
        9 7 8 0 3 2 3 2 8 1 2 9 4
      • Hardback
        9 7 8 0 1 2 3 7 4 6 3 0 6
      • eBook
        9 7 8 0 0 8 0 8 7 7 8 9 1
      This book brings all of the elements of database design together in a single volume, saving the reader the time and expense of making multiple purchases. It consolidates both introductory and advanced topics, thereby covering the gamut of database design methodology ? from ER and UML techniques, to conceptual data modeling and table transformation, to storing XML and querying moving objects databases. The proposed book expertly combines the finest database design material from the Morgan Kaufmann portfolio. Individual chapters are derived from a select group of MK books authored by the best and brightest in the field. These chapters are combined into one comprehensive volume in a way that allows it to be used as a reference work for those interested in new and developing aspects of database design. This book represents a quick and efficient way to unite valuable content from leading database design experts, thereby creating a definitive, one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.
    • Broadband Cable Access Networks

      • 1st Edition
      • October 17, 2008
      • David Large + 1 more
      • English
      • Paperback
        9 7 8 0 3 2 3 2 8 1 2 1 8
      • Hardback
        9 7 8 0 1 2 3 7 4 4 0 1 2
      • eBook
        9 7 8 0 0 8 0 9 2 2 1 4 0
      Broadband Cable Access Networks focuses on broadband distribution and systems architecture and concentrates on practical concepts that will allow the reader to do their own design, improvement, and troubleshooting work. The objective is to enhance the skill sets of a large population that designs and builds broadband cable plants, as well as those maintaining and troubleshooting it. A large cross-section of technical personnel who need to learn these skills design, maintain, and service HFC systems from signal creation through transmission to reception and processing at the customer end point. In addition, data/voice and video specialists need to master and reference the basics of HFC design and distribution before contending with the intricacies of their own unique services. This book serves as an essential reference to all cable engineers—those who specifically design and maintain the HFC distribution plant as well as those primarily concerned with data/voice technology as well as video technology.
    • Network Management Know It All

      • 1st Edition
      • October 16, 2008
      • Adrian Farrel
      • English
      • Paperback
        9 7 8 0 3 2 3 2 8 1 2 7 0
      • Hardback
        9 7 8 0 1 2 3 7 4 5 9 8 9
      • eBook
        9 7 8 0 0 8 0 9 2 3 4 2 0
      Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems, which includes controlling, planning, allocating, deploying, coordinating, and monitoring the resources of a network. This book brings all of the elements of network management together in a single volume, saving the reader the time and expense of making multiple purchases. It introduces network management, explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field. It is a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.
    • Online Dispute Resolution

      • 1st Edition
      • September 30, 2008
      • Faye Wang
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 1 9 0
      • Hardback
        9 7 8 1 8 4 3 3 4 5 2 0 6
      • eBook
        9 7 8 1 7 8 0 6 3 1 7 0 7
      This book helps lawyers, practitioners, legislators and students understand and cope with the challenges of e-commerce, and to learn about the most up-to-date technology and regulation of Online Dispute Resolution (ODR). It introduces different forms of online dispute resolution, against the background of Alternative Dispute Resolution (ADR) developments in the off-line environment; crucially, it examines the current technology and legal status of ODR in the EU, US, Asia and Australia, and discusses the relations between the various parties in dispute resolutions, especially the Fifth party for the provider of the technology. It further analyses the four most successful examples, such as Michigan Cybercourt, WIPO-UDRP, eBay-SquareTrade and AAA-CyberSettle. Finally, a proposal for resolving e-contract disputes via ODR is provided, and a code of conduct recommended in order to regulate the electronic commerce market.
    • Managing Electronic Resources

      • 1st Edition
      • September 30, 2008
      • Peter J. Webster
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 3 6 9 1
      • Paperback
        9 7 8 1 8 4 3 3 4 3 6 8 4
      • eBook
        9 7 8 1 7 8 0 6 3 1 4 0 0
      The on going movement to electronic collections presents many exciting new service opportunities for libraries, as well as creating materials management, resource, and service challenges. This book looks at how online resources are causing the roles and practices of libraries to change.
    • Building the Agile Enterprise

      • 1st Edition
      • September 26, 2008
      • Fred A. Cummins
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 4 4 5 6
      • eBook
        9 7 8 0 0 8 0 5 6 0 0 8 3
      In the last ten years IT has brought fundamental changes to the way the world works. Not only has it increased the speed of operations and communications, but it has also undermined basic assumptions of traditional business models and increased the number of variables. Today, the survival of major corporations is challenged by a world-wide marketplace, international operations, outsourcing, global communities, a changing workforce, security threats, business continuity, web visibility, and customer expectations. Enterprises must constantly adapt or they will be unable to compete. Fred Cummins, an EDS Fellow, presents IT as a key enabler of the agile enterprise. He demonstrates how the convergence of key technologies—includi... SOA, BPM and emerging enterprise and data models—can be harnessed to transform the enterprise. Cummins mines his 25 years experience to provide IT leaders, as well as enterprise architects and management consultants, with the critical information, skills, and insights they need to partner with management and redesign the enterprise for continuous change. No other book puts IT at the center of this transformation, nor integrates these technologies for this purpose.
    • Three-dimensional Integrated Circuit Design

      • 1st Edition
      • September 25, 2008
      • Vasilis F. Pavlidis + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 3 4 3 5
      • eBook
        9 7 8 0 0 8 0 9 2 1 8 6 0
      With vastly increased complexity and functionality in the "nanometer era" (i.e. hundreds of millions of transistors on one chip), increasing the performance of integrated circuits has become a challenging task. Connecting effectively (interconnect design) all of these chip elements has become the greatest determining factor in overall performance. 3-D integrated circuit design may offer the best solutions in the near future. This is the first book on 3-D integrated circuit design, covering all of the technological and design aspects of this emerging design paradigm, while proposing effective solutions to specific challenging problems concerning the design of 3-D integrated circuits. A handy, comprehensive reference or a practical design guide, this book provides a sound foundation for the design of 3-D integrated circuits.
    • GFI Network Security and PCI Compliance Power Tools

      • 1st Edition
      • September 22, 2008
      • Brien Posey
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 8 5 0
      • eBook
        9 7 8 0 0 8 0 9 4 9 1 5 4
      Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports.
    • Master Data Management

      • 1st Edition
      • September 16, 2008
      • David Loshin
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 2 2 5 4
      • eBook
        9 7 8 0 0 8 0 9 2 1 2 1 1
      The key to a successful MDM initiative isn’t technology or methods, it’s people: the stakeholders in the organization and their complex ownership of the data that the initiative will affect.Master Data Management equips you with a deeply practical, business-focused way of thinking about MDM—an understanding that will greatly enhance your ability to communicate with stakeholders and win their support. Moreover, it will help you deserve their support: you’ll master all the details involved in planning and executing an MDM project that leads to measurable improvements in business productivity and effectiveness.