Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Three-dimensional Integrated Circuit Design

    • 1st Edition
    • Vasilis F. Pavlidis + 1 more
    • English
    With vastly increased complexity and functionality in the "nanometer era" (i.e. hundreds of millions of transistors on one chip), increasing the performance of integrated circuits has become a challenging task. Connecting effectively (interconnect design) all of these chip elements has become the greatest determining factor in overall performance. 3-D integrated circuit design may offer the best solutions in the near future. This is the first book on 3-D integrated circuit design, covering all of the technological and design aspects of this emerging design paradigm, while proposing effective solutions to specific challenging problems concerning the design of 3-D integrated circuits. A handy, comprehensive reference or a practical design guide, this book provides a sound foundation for the design of 3-D integrated circuits.
  • GFI Network Security and PCI Compliance Power Tools

    • 1st Edition
    • Brien Posey
    • English
    Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports.
  • Master Data Management

    • 1st Edition
    • David Loshin
    • English
    The key to a successful MDM initiative isn’t technology or methods, it’s people: the stakeholders in the organization and their complex ownership of the data that the initiative will affect.Master Data Management equips you with a deeply practical, business-focused way of thinking about MDM—an understanding that will greatly enhance your ability to communicate with stakeholders and win their support. Moreover, it will help you deserve their support: you’ll master all the details involved in planning and executing an MDM project that leads to measurable improvements in business productivity and effectiveness.
  • Technical, Commercial and Regulatory Challenges of QoS

    An Internet Service Model Perspective
    • 1st Edition
    • XiPeng Xiao
    • English
    Technical, Commerical and Regulatory Challenges of QoS provides a comprehensive examination of Internet QoS theory, standards, vendor implementation and network deployment from the practitioner's point of view, including extensive discussion of related economic and regulatory issues. Written in a technology-light way so that a variety of professionals and researchers in the information and networking industries can easily grasp the material. Includes case studies based on real-world experiences from industry. The author starts by discussing the economic, regulatory and technical challenges of the existing QoS model. Key coverage includes defining a clear business model for selling and buying QoS in relation to current and future direction of government regulation and QoS interoperability (or lack thereof) between carriers and networking devices. The author then demonstrates how to improve the current QoS model to create a clear selling point, less regulation uncertainty, and higher chance of deployment success. This includes discussion of QoS re-packaging to end-users; economic and regulatory benefits of the re-packaging; and the overall benefits of an improved technical approach. Finally, the author discusses the future evolution of QoS from an Internet philosophy perspective and lets the reader draw the conclusions. This book is the first QoS book to provide in depth coverage on the commercial and regulatory aspects of QoS, in addition to the technical aspect. From that, readers can grasp the commercial and regulatory issues of QoS and their implications on the overall QoS business model. This book is also the first QoS book to provide case studies of real world QoS deployments, contributed by the people who did the actual deployments. From that, readers can grasp the practical issues of QoS in real world. This book is also the first QoS book to cover both wireline QoS and wireless QoS. Readers can grasp the QoS issues in the wireless world. The book was reviewed and endorsed by a long list of prominent industrial and academic figures.
  • Building Intelligent Interactive Tutors

    Student-centered Strategies for Revolutionizing E-learning
    • 1st Edition
    • Beverly Park Woolf
    • English
    Building Intelligent Interactive Tutors discusses educational systems that assess a student's knowledge and are adaptive to a student's learning needs. The impact of computers has not been generally felt in education due to lack of hardware, teacher training, and sophisticated software. and because current instructional software is neither truly responsive to student needs nor flexible enough to emulate teaching. Dr. Woolf taps into 20 years of research on intelligent tutors to bring designers and developers a broad range of issues and methods that produce the best intelligent learning environments possible, whether for classroom or life-long learning. The book describes multidisciplinary approaches to using computers for teaching, reports on research, development, and real-world experiences, and discusses intelligent tutors, web-based learning systems, adaptive learning systems, intelligent agents and intelligent multimedia. It is recommended for professionals, graduate students, and others in computer science and educational technology who are developing online tutoring systems to support e-learning, and who want to build intelligence into the system.
  • Learning Processing

    A Beginner's Guide to Programming Images, Animation, and Interaction
    • 1st Edition
    • Daniel Shiffman
    • English
    The free, open-source Processing programming language environment was created at MIT for people who want to develop images, animation, and sound. Based on the ubiquitous Java, it provides an alternative to daunting languages and expensive proprietary software. This book gives graphic designers, artists and illustrators of all stripes a jump start to working with processing by providing detailed information on the basic principles of programming with the language, followed by careful, step-by-step explanations of select advanced techniques.The author teaches computer graphics at NYU's Tisch School of the Arts, and his book has been developed with a supportive learning experience at its core. From algorithms and data mining to rendering and debugging, it teaches object-oriented programming from the ground up within the fascinating context of interactive visual media.Previously announced as "Pixels, Patterns, and Processing"
  • Designing Storage for Exchange 2007 SP1

    • 1st Edition
    • Pierre Bijaoui + 1 more
    • English
    Designing Storage for Exchange 2007 SP1 will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange Server from a 32-bit application to the 64-bit world reduced the I/O footprint on the storage subsystem. This allows users to consider shared storage deployments or go the opposite way and focus on direct attached storage. Supporting large mailboxes is now possible, but how do you back up and recover the increased amount of data? Exchange Server 2007 Continuous Replication and new features in Windows Server 2008 Failover Clustering provides interesting possibilities for geographically dispersed deployments. This book explains these new built-in features of Exchange Server 2007 and compares them with application independent data replication solutions provided by high-end storage subsystems. It is critical to understand these key technologies to make the right decision which storage solution best fits your business needs. The authors share their experience from large scale deployments and depict configurations used during their projects.
  • Handbook of Cognitive Science

    An Embodied Approach
    • 1st Edition
    • Paco Calvo + 1 more
    • English
    The Handbook of Cognitive Science provides an overview of recent developments in cognition research, relying upon non-classical approaches. Cognition is explained as the continuous interplay between brain, body, and environment, without relying on classical notions of computations and representation to explain cognition. The handbook serves as a valuable companion for readers interested in foundational aspects of cognitive science, and neuroscience and the philosophy of mind. The handbook begins with an introduction to embodied cognitive science, and then breaks up the chapters into separate sections on conceptual issues, formal approaches, embodiment in perception and action, embodiment from an artificial perspective, embodied meaning, and emotion and consciousness. Contributors to the book represent research overviews from around the globe including the US, UK, Spain, Germany, Switzerland, France, Sweden, and the Netherlands.
  • A Practical Guide to SysML

    The Systems Modeling Language
    • 1st Edition
    • Sanford Friedenthal + 2 more
    • English
    Systems engineers must understand how all the parts of a digital system work together, including hardware AND software. SysML is the first design language to cover both hardware and software, allowing engineers to consider how all the parts of a system will successfully interact, from the very beginning of a project. This can prevent huge problems and delays down the line. Therefore, SysML use is becoming a widespread phenomenon, and many companies, especially in the defense, automotive, aerospace, medical device and telecommunications industries, are already using SysML, or are planning to switch over in the near future. Until now, little consolidated information has been available on the market regarding SysML. However, this book changes all that! It provides the hundreds of thousands of new users with a comprehensive guide to SysML, including a full description of the language itself, detailed instructions on how to implement it, exercises to help readers gain practical experience working with SysML, and extensive, real-world examples of actual successful projects, demonstrating all the benefits SysML can provide.
  • Network Processors

    Architecture, Programming, and Implementation
    • 1st Edition
    • Ran Giladi
    • English
    Network processors are the basic building blocks of today's high-speed, high-demand, quality-oriented communication networks. Designing and implementing network processors requires a new programming paradigm and an in-depth understanding of network processing requirements. This book leads the reader through the requirements and the underlying theory of networks, network processing, and network processors. It covers implementation of network processors and intergrates EZchip Microcode Development Environment so that you can gain hands-on experience in writing high-speed networking applications. By the end of the book, the reader will be able to write and test applications on a simulated network processor.