Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Designing Storage for Exchange 2007 SP1

      • 1st Edition
      • August 15, 2008
      • Pierre Bijaoui + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 0 8 8
      • eBook
        9 7 8 0 0 8 0 5 6 0 0 3 8
      Designing Storage for Exchange 2007 SP1 will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange Server from a 32-bit application to the 64-bit world reduced the I/O footprint on the storage subsystem. This allows users to consider shared storage deployments or go the opposite way and focus on direct attached storage. Supporting large mailboxes is now possible, but how do you back up and recover the increased amount of data? Exchange Server 2007 Continuous Replication and new features in Windows Server 2008 Failover Clustering provides interesting possibilities for geographically dispersed deployments. This book explains these new built-in features of Exchange Server 2007 and compares them with application independent data replication solutions provided by high-end storage subsystems. It is critical to understand these key technologies to make the right decision which storage solution best fits your business needs. The authors share their experience from large scale deployments and depict configurations used during their projects.
    • Forms that Work

      • 1st Edition
      • November 7, 2008
      • Steve Krug + 2 more
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 7 1 0 1
      • eBook
        9 7 8 0 0 8 0 9 4 8 4 8 5
      Forms that Work: Designing Web Forms for Usability clearly explains exactly how to design great forms for the web. The book provides proven and practical advice that will help you avoid pitfalls, and produce forms that are aesthetically pleasing, efficient and cost-effective. It features invaluable design methods, tips, and tricks to help ensure accurate data and satisfied customers. It includes dozens of examples - from nitty-gritty details (label alignment, mandatory fields) to visual designs (creating good grids, use of color). This book isn’t just about colons and choosing the right widgets. It’s about the whole process of making good forms, which has a lot more to do with making sure you’re asking the right questions in a way that your users can answer than it does with whether you use a drop-down list or radio buttons. In an easy-to-read format with lots of examples, the authors present their three-layer model - relationship, conversation, appearance. You need all three for a successful form - a form that looks good, flows well, asks the right questions in the right way, and, most important of all, gets people to fill it out. Liberally illustrated with full-color examples, this book guides readers on how to define requirements, how to write questions that users will understand and want to answer, and how to deal with instructions, progress indicators and errors. This book is essential reading for HCI professionals, web designers, software developers, user interface designers, HCI academics and students, market research professionals, and financial professionals.
    • Programming Lego Mindstorms NXT

      • 1st Edition
      • June 16, 2008
      • Owen Bishop
      • English
      • eBook
        9 7 8 0 0 8 0 5 6 9 9 6 3
      Teach your robot new tricks! With this projects-based approach you can program your Mindstorms NXT robot to solve a maze, build a house, run an obstacle course, and many other activities. Along the way you will learn the basics of programming structures and techniques using NXT-G and Microsoft VPL. For hobbyists, and students working on robot projects, Bishop provides the background and tools to program your robot for tasks that go beyond the simple routines provided with the robot kit. The programs range in complexity from simple contact avoidance and path following, to programs generating some degree of artificial intelligence
    • Netcat Power Tools

      • 1st Edition
      • June 13, 2008
      • Jan Kanclirz
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 5 7 7
      • eBook
        9 7 8 0 0 8 0 5 5 8 7 3 8
      Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.
    • Nmap in the Enterprise

      • 1st Edition
      • February 29, 2008
      • Angela Orebaugh + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 4 1 6
      • eBook
        9 7 8 0 0 8 0 5 5 8 7 4 5
      Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.
    • The Art and Science of Digital Compositing

      • 2nd Edition
      • May 21, 2008
      • Ron Brinkmann
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 6 3 8 6
      • eBook
        9 7 8 0 0 8 0 8 7 9 2 6 0
      The classic reference, with over 25,000 copies in print, has been massively expanded and thoroughly updated to include state-of-the-art methods and 400+ all-new full color images! "At ILM, compositing is one of the most important tools we use. If you want to learn more, this excellent 2nd-edition is detailed with hundreds of secrets that will help make your comps seamless. For beginners or experts, Ron walks you through the processes of analysis and workflows - linear thinking which will help you become deft and successfully tackle any shot." --Dennis Muren ASC, Senior Visual Effects Supervisor, Industrial Light & Magic "Ron Brinkman's book is the definitive work on digital compositing and we have depended on this book as a critical part of our in-house training program at Imageworks since the 1999 Edition. We use this book as a daily textbook and reference for our lighters, compositors and anyone working with digital imagery. It is wonderful to see a new edition being released and it will certainly be required reading for all our digital artists here at Imageworks." --Sande Scoredos, Executive Director of Training & Artist Development, Sony Pictures Imageworks The Art and Science of Digital Compositing is the only complete overview of the technical and artistic nature of digital compositing. It covers a wide range of topics from basic image creation, representation and manipulation, to a look at the visual cues that are necessary to create a believable composite. Designed as an introduction to the field, as well as an authoritative technical reference, this book provides essential information for novices and professionals alike. 17 new case-studies provide in-depth looks at the compositing work done on films such as Chronicles of Narnia: The Lion, the Witch and the Wardrobe, The Golden Compass, The Incredibles, King Kong, The Lord of the Rings: The Return of the King, Sin City, Spider-Man 2, Wallace and Gromit: The Curse of the Were-Rabbit, and Star Wars: Episode 3 – Revenge of the Sith. Includes new sections on 3D compositing, High Dynamic Range (HDR) imaging, Rotoscoping, and much more! All disc-based content for this title is now available on the Web.
    • Broadband Cable Access Networks

      • 1st Edition
      • October 17, 2008
      • David Large + 1 more
      • English
      • Paperback
        9 7 8 0 3 2 3 2 8 1 2 1 8
      • Hardback
        9 7 8 0 1 2 3 7 4 4 0 1 2
      • eBook
        9 7 8 0 0 8 0 9 2 2 1 4 0
      Broadband Cable Access Networks focuses on broadband distribution and systems architecture and concentrates on practical concepts that will allow the reader to do their own design, improvement, and troubleshooting work. The objective is to enhance the skill sets of a large population that designs and builds broadband cable plants, as well as those maintaining and troubleshooting it. A large cross-section of technical personnel who need to learn these skills design, maintain, and service HFC systems from signal creation through transmission to reception and processing at the customer end point. In addition, data/voice and video specialists need to master and reference the basics of HFC design and distribution before contending with the intricacies of their own unique services. This book serves as an essential reference to all cable engineers—those who specifically design and maintain the HFC distribution plant as well as those primarily concerned with data/voice technology as well as video technology.
    • Instant Messaging Reference

      • 1st Edition
      • January 31, 2008
      • Rachel Bridgewater + 1 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 3 5 7 8
      • Hardback
        9 7 8 1 8 4 3 3 4 3 5 8 5
      • eBook
        9 7 8 1 7 8 0 6 3 1 2 3 3
      Virtual reference is a vital component in twenty-first century reference service and the time for debate over its virtues and necessity has passed. This book focuses on the practical implementation of instant messaging (IM), including privacy and security and its future potential. Targeting busy practitioners who are looking for comprehensive answers about instant messaging in particular, rather than virtual reference in general, this book addresses questions from the basics of what IM is and how it operates to the more complicated issues such as privacy and security to its future potential as a strong candidate in the virtual reference arena.
    • GFI Network Security and PCI Compliance Power Tools

      • 1st Edition
      • September 22, 2008
      • Brien Posey
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 8 5 0
      • eBook
        9 7 8 0 0 8 0 9 4 9 1 5 4
      Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports.
    • Managing Electronic Resources

      • 1st Edition
      • September 30, 2008
      • Peter J. Webster
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 3 6 9 1
      • Paperback
        9 7 8 1 8 4 3 3 4 3 6 8 4
      • eBook
        9 7 8 1 7 8 0 6 3 1 4 0 0
      The on going movement to electronic collections presents many exciting new service opportunities for libraries, as well as creating materials management, resource, and service challenges. This book looks at how online resources are causing the roles and practices of libraries to change.