Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Network Security: Know It All

      • 1st Edition
      • May 16, 2008
      • James Joshi
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 4 6 3 0
      • Paperback
        9 7 8 0 3 2 3 2 8 1 2 4 9
      • eBook
        9 7 8 0 0 8 0 5 6 0 1 5 1
      Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field’s leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.
    • Three-dimensional Integrated Circuit Design

      • 1st Edition
      • September 25, 2008
      • Vasilis F. Pavlidis + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 3 4 3 5
      • eBook
        9 7 8 0 0 8 0 9 2 1 8 6 0
      With vastly increased complexity and functionality in the "nanometer era" (i.e. hundreds of millions of transistors on one chip), increasing the performance of integrated circuits has become a challenging task. Connecting effectively (interconnect design) all of these chip elements has become the greatest determining factor in overall performance. 3-D integrated circuit design may offer the best solutions in the near future. This is the first book on 3-D integrated circuit design, covering all of the technological and design aspects of this emerging design paradigm, while proposing effective solutions to specific challenging problems concerning the design of 3-D integrated circuits. A handy, comprehensive reference or a practical design guide, this book provides a sound foundation for the design of 3-D integrated circuits.
    • Measuring the User Experience

      • 1st Edition
      • March 17, 2008
      • Bill Albert + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 5 5 8 2 6 4
      Measuring the User Experience provides the first single source of practical information to enable usability professionals and product developers to effectively measure the usability of any product by choosing the right metric, applying it, and effectively using the information it reveals. Authors Tullis and Albert organize dozens of metrics into six categories: performance, issues-based, self-reported, web navigation, derived, and behavioral/physiolog... They explore each metric, considering best methods for collecting, analyzing, and presenting the data. They provide step-by-step guidance for measuring the usability of any type of product using any type of technology. This book is recommended for usability professionals, developers, programmers, information architects, interaction designers, market researchers, and students in an HCI or HFE program.
    • MPLS: Next Steps

      • 1st Edition
      • Volume 1
      • April 17, 2008
      • Bruce S. Davie + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 4 0 0 5
      • Paperback
        9 7 8 0 3 2 3 2 8 1 2 0 1
      • eBook
        9 7 8 0 0 8 0 5 5 8 2 9 5
      Multiprotocol Label Switching (MPLS) is a data plane and control technology that is used in packet (that is Internet Protocol) networks. Now over ten years old, it has taken root firmly as a fundamental tool in many service provider networks. The last ten years have seen a considerable consolidation of MPLS techniques and protocols. This has resulted in the abandoning of some of the original features of MPLS, and the development of other new features. MPLS has moved from a prospective solution, to a grown-up technology. Now that MPLS has reached this level of maturity, these new tools and features allow more sophisticated services to the users of the network. These tools and features are discussed within various contexts throughout several networking-related books published by MK and this presents us with a unique publishing opportunity. The proposed book is a best-of-the-best collection of existing content from several books MK has published in recent years on MPLS technology (multi-label protocol switching). Individual chapters on MPLS technology are derived from a handful of MK books and are combined in one new volume in a way that makes sense as a reference work for those interested in new and developing aspects of this technology, i.e., network operators and designers who need to determine which aspects of their networks would benefit from MPLS technology and applications. It also serves as a definitive reference for engineers implementing MPLS-based products.This book represents a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources. Suitable and current content will be collected from the following titles: Evans, Deploying IP and MPLS QoS (2006); Farrel, GMPLS (2005); Ash, Traffic Engineering (2006); Vasseur, Network Recovery (2005); Farrel, The Internet and Its Protocols (2004); Nadeau, MPLS Management (2003); and Davie, MPLS Technology and Applications (2000). These chapters will be updated where necessary and two new chapters will be added at the beginning and the end of the book to bring the content into focus and discuss next generation developments.
    • Online Dispute Resolution

      • 1st Edition
      • September 30, 2008
      • Faye Wang
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 1 9 0
      • Hardback
        9 7 8 1 8 4 3 3 4 5 2 0 6
      • eBook
        9 7 8 1 7 8 0 6 3 1 7 0 7
      This book helps lawyers, practitioners, legislators and students understand and cope with the challenges of e-commerce, and to learn about the most up-to-date technology and regulation of Online Dispute Resolution (ODR). It introduces different forms of online dispute resolution, against the background of Alternative Dispute Resolution (ADR) developments in the off-line environment; crucially, it examines the current technology and legal status of ODR in the EU, US, Asia and Australia, and discusses the relations between the various parties in dispute resolutions, especially the Fifth party for the provider of the technology. It further analyses the four most successful examples, such as Michigan Cybercourt, WIPO-UDRP, eBay-SquareTrade and AAA-CyberSettle. Finally, a proposal for resolving e-contract disputes via ODR is provided, and a code of conduct recommended in order to regulate the electronic commerce market.
    • TCP/IP Sockets in Java

      • 2nd Edition
      • February 8, 2008
      • Kenneth L. Calvert + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 2 5 5 1
      • eBook
        9 7 8 0 0 8 0 5 6 8 7 8 2
      The networking capabilities of the Java platform have been extended considerably since the first edition of the book. This new edition covers version 1.5-1.7, the most current iterations, as well as making the following improvements:The API (application programming interface) reference sections in each chapter, which describe the relevant parts of each class, have been replaced with (i) a summary section that lists the classes and methods used in the code, and (ii) a "gotchas" section that mentions nonobvious or poorly-documented aspects of the objects. In addition, the book covers several new classes and capabilities introduced in the last few revisions of the Java platform. New abstractions to be covered include NetworkInterface, InterfaceAddress, Inet4/6Address, SocketAddress/InetSo... Executor, and others; extended access to low-level network information; support for IPv6; more complete access to socket options; and scalable I/O. The example code is also modified to take advantage of new language features such as annotations, enumerations, as well as generics and implicit iterators where appropriate.Most Internet applications use sockets to implement network communication protocols. This book's focused, tutorial-based approach helps the reader master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Chapter 1 provides a general overview of networking concepts to allow readers to synchronize the concepts with terminology. Chapter 2 introduces the mechanics of simple clients and servers. Chapter 3 covers basic message construction and parsing. Chapter 4 then deals with techniques used to build more robust clients and servers. Chapter 5 (NEW) introduces the scalable interface facilities which were introduced in Java 1.5, including the buffer and channel abstractions. Chapter 6 discusses the relationship between the programming constructs and the underlying protocol implementations in more detail. Programming concepts are introduced through simple program examples accompanied by line-by-line code commentary that describes the purpose of every part of the program. No other resource presents so concisely or so effectively the material necessary to get up and running with Java sockets programming.
    • Information Modeling and Relational Databases

      • 2nd Edition
      • March 3, 2008
      • Terry Halpin + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 3 5 6 8 3
      • eBook
        9 7 8 0 0 8 0 5 6 8 7 3 7
      Information Modeling and Relational Databases, Second Edition, provides an introduction to ORM (Object-Role Modeling)and much more. In fact, it is the only book to go beyond introductory coverage and provide all of the in-depth instruction you need to transform knowledge from domain experts into a sound database design. This book is intended for anyone with a stake in the accuracy and efficacy of databases: systems analysts, information modelers, database designers and administrators, and programmers. Terry Halpin, a pioneer in the development of ORM, blends conceptual information with practical instruction that will let you begin using ORM effectively as soon as possible. Supported by examples, exercises, and useful background information, his step-by-step approach teaches you to develop a natural-language-bas... ORM model, and then, where needed, abstract ER and UML models from it. This book will quickly make you proficient in the modeling technique that is proving vital to the development of accurate and efficient databases that best meet real business objectives.
    • Visual Thinking for Design

      • 1st Edition
      • April 4, 2008
      • Colin Ware
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 8 9 6 0
      • eBook
        9 7 8 0 0 8 0 5 5 8 4 1 7
      Visual Thinking brings the science of perception to the art of design. Designers increasingly need to present information in ways that aid their audience’s thinking process. Fortunately, results from the relatively new science of human visual perception provide valuable guidance. In this book, Colin Ware takes what we now know about perception, cognition, and attention and transforms it into concrete advice that designers can directly apply. He demonstrates how designs can be considered as tools for cognition – extensions of the viewer’s brain in much the same way that a hammer is an extension of the user’s hand. The book includes hundreds of examples, many in the form of integrated text and full-color diagrams. Experienced professional designers and students alike will learn how to maximize the power of the information tools they design for the people who use them.
    • Next Generation SSH2 Implementation

      • 1st Edition
      • November 12, 2008
      • Dale Liu
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 8 3 6
      • eBook
        9 7 8 0 0 8 0 5 7 0 0 0 6
      New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA... SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.
    • P2P Networking and Applications

      • 1st Edition
      • December 12, 2008
      • John Buford + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 2 1 4 8
      • eBook
        9 7 8 0 0 8 0 9 2 1 1 9 8
      Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, the book explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models and also provides the means to improve upon these models with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practitioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology.