Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Netcat Power Tools

      • 1st Edition
      • June 13, 2008
      • Jan Kanclirz
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 5 7 7
      • eBook
        9 7 8 0 0 8 0 5 5 8 7 3 8
      Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.
    • The Real MCTS/MCITP Exam 70-647 Prep Kit

      • 1st Edition
      • June 12, 2008
      • Anthony Piltzecker
      • English
      • eBook
        9 7 8 0 0 8 0 8 7 9 1 3 0
      This exam is designed to validate skills as a Windows Server 2008 Enterprise Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-647.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. A MCITP Enterprise Administrator is responsible for the overall IT environment and architecture, and translates business goals into technology decisions and designs mid-range to long-term strategies. The enterprise administrator is also responsible for infrastructure design and global configuration changes.
    • The Best Damn Windows Server 2008 Book Period

      • 2nd Edition
      • June 3, 2008
      • Anthony Piltzecker
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 7 3 7
      • eBook
        9 7 8 0 0 8 0 5 6 0 0 7 6
      Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.
    • Embedded DSP Processor Design

      • 1st Edition
      • Volume 2
      • May 30, 2008
      • Dake Liu
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 1 2 3 3
      • Paperback
        9 7 8 0 3 2 3 2 8 1 0 0 3
      • eBook
        9 7 8 0 0 8 0 5 6 9 8 7 1
      This book provides design methods for Digital Signal Processors and Application Specific Instruction set Processors, based on the author's extensive, industrial design experience. Top-down and bottom-up design methodologies are presented, providing valuable guidance for both students and practicing design engineers. Coverage includes design of internal-external data types, application specific instruction sets, micro architectures, including designs for datapath and control path, as well as memory sub systems. Integration and verification of a DSP-ASIP processor are discussed and reinforced with extensive examples.
    • The Real MCTS/MCITP Exam 70-620 Prep Kit

      • 1st Edition
      • May 23, 2008
      • Anthony Piltzecker
      • English
      • eBook
        9 7 8 0 0 8 0 9 4 9 0 9 3
      This exam is designed to validate proficieny supporting Windows Vista client. This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.The Microsoft Certified Technology Specialist (MCTS) on Windows Vista credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience in Tier 1 or Tier 2 phone support in an upper midsize organization or enterprise environment. MCTS candidates should have experience resolving issues concerning network connectivity, desktop operating systems, security, and applications. Their experience should also include addressing logon problems, performing password resets, and resolving most issues with desktop applications.
    • Securing Windows Server 2008

      • 1st Edition
      • May 23, 2008
      • Aaron Tiensivu
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 8 0 5
      • eBook
        9 7 8 0 0 8 0 5 6 9 9 7 0
      Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including: 1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.3. Protectio... of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.4. Protection against malicious software with User Account Control with a new authentication architecture.5. Incr... control over your user settings with Expanded Group Policy....to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.
    • Evaluating Children's Interactive Products

      • 1st Edition
      • May 22, 2008
      • Panos Markopoulos + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 1 1 1 0
      • eBook
        9 7 8 0 0 8 0 5 5 8 2 5 7
      Evaluating Children's Interactive Products directly addresses the need to ensure that interactive products designed for children — whether toys, games, educational products, or websites — are safe, effective, and entertaining. It presents an essential background in child development and child psychology, particularly as they relate to technology; captures best practices for observing and surveying children, training evaluators, and capturing the child user experience using audio and visual technology; and examines ethical and legal issues involved in working with children and offers guidelines for effective risk management. Based on the authors' workshops, conference courses, and own design experience and research, this highly practical book reads like a handbook, while being thoroughly grounded in the latest research. Throughout, the authors illustrate techniques and principles with numerous mini case studies and highlight practical information in tips and exercises and conclude with three in-depth case studies. This book is recommended for usability experts, product developers, and researchers in the field.
    • The Art and Science of Digital Compositing

      • 2nd Edition
      • May 21, 2008
      • Ron Brinkmann
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 6 3 8 6
      • eBook
        9 7 8 0 0 8 0 8 7 9 2 6 0
      The classic reference, with over 25,000 copies in print, has been massively expanded and thoroughly updated to include state-of-the-art methods and 400+ all-new full color images! "At ILM, compositing is one of the most important tools we use. If you want to learn more, this excellent 2nd-edition is detailed with hundreds of secrets that will help make your comps seamless. For beginners or experts, Ron walks you through the processes of analysis and workflows - linear thinking which will help you become deft and successfully tackle any shot." --Dennis Muren ASC, Senior Visual Effects Supervisor, Industrial Light & Magic "Ron Brinkman's book is the definitive work on digital compositing and we have depended on this book as a critical part of our in-house training program at Imageworks since the 1999 Edition. We use this book as a daily textbook and reference for our lighters, compositors and anyone working with digital imagery. It is wonderful to see a new edition being released and it will certainly be required reading for all our digital artists here at Imageworks." --Sande Scoredos, Executive Director of Training & Artist Development, Sony Pictures Imageworks The Art and Science of Digital Compositing is the only complete overview of the technical and artistic nature of digital compositing. It covers a wide range of topics from basic image creation, representation and manipulation, to a look at the visual cues that are necessary to create a believable composite. Designed as an introduction to the field, as well as an authoritative technical reference, this book provides essential information for novices and professionals alike. 17 new case-studies provide in-depth looks at the compositing work done on films such as Chronicles of Narnia: The Lion, the Witch and the Wardrobe, The Golden Compass, The Incredibles, King Kong, The Lord of the Rings: The Return of the King, Sin City, Spider-Man 2, Wallace and Gromit: The Curse of the Were-Rabbit, and Star Wars: Episode 3 – Revenge of the Sith. Includes new sections on 3D compositing, High Dynamic Range (HDR) imaging, Rotoscoping, and much more! All disc-based content for this title is now available on the Web.
    • The Student's Guide to VHDL

      • 2nd Edition
      • May 19, 2008
      • Peter J. Ashenden
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 8 6 5 8
      • eBook
        9 7 8 0 0 8 0 9 4 8 5 5 3
      The Student's Guide to VHDL is a condensed edition of The Designer's Guide to VHDL, the most widely used textbook on VHDL for digital system modeling. The Student's Guide is targeted as a supplemental reference book for computer organization and digital design courses.Since publication of the first edition of The Student's Guide, the IEEE VHDL and related standards have been revised. The Designer's Guide has been revised to reflect the changes, so it is appropriate that The Student's Guide also be revised. In The Student's Guide to VHDL, 2nd Edition, we have included a design case study illustrating an FPGA-based design flow. The aim is to show how VHDL modeling fits into a design flow, starting from high-level design and proceeding through detailed design and verification, synthesis, FPGA place and route, and final timing verification. Inclusion of the case study helps to better serve the educational market. Currently, most college courses do not formally address the details of design flow. Students may be given informal guidance on how to proceed with lab projects. In many cases, it is left to students to work it out for themselves. The case study in The Student's Guide provides a reference design flow that can be adapted to a variety of lab projects.
    • Network Security: Know It All

      • 1st Edition
      • May 16, 2008
      • James Joshi
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 4 6 3 0
      • Paperback
        9 7 8 0 3 2 3 2 8 1 2 4 9
      • eBook
        9 7 8 0 0 8 0 5 6 0 1 5 1
      Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field’s leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.