Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • The Best Damn Exchange, SQL and IIS Book Period

      • 1st Edition
      • December 18, 2007
      • Henrik Walther + 2 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 1 9 5
      • eBook
        9 7 8 0 0 8 0 5 5 6 8 8 8
      Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support "anywhere access" present IT professionals with a steep learning curve. Making certain that these products are configured to meet regulatory compliance requirements adds addtionaly complexity to day-to-day management network management. The Best Damn Exchange, SQL and IIS Book Period delivers an all-in-one reference for Windows System Administrators deploying the 2007 releases of these core Microsoft servers. The coverage is comprehensive, and provides users with just about everything they need to manage a Windows enterprise server. Special Bonus coverage includes how to gather and analyze the many log files generated by these servers.
    • How to Cheat at Configuring VmWare ESX Server

      • 1st Edition
      • December 17, 2007
      • David Rule
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 9 4 5
      • eBook
        9 7 8 0 0 8 0 5 5 5 3 5 5
      A virtual evolution in IT shops large and small has begun. VMware’s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress’ proven “How to Cheat” methodology to configure and build VMware’s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz!This book will detail the default and custom installation of VMware’s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.
    • Perl Scripting for Windows Security

      • 1st Edition
      • December 12, 2007
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 7 3 0
      • eBook
        9 7 8 0 0 8 0 5 5 5 6 3 8
      I decided to write this book for a couple of reasons. One was that I’ve now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay…I’ll come clean…I used nothing but Perl in both books! What I’ve seen as a result of this is that many readers want to use the tools, but don’t know how…they simply aren’t familiar with Perl, with interpreted (or scripting) languages in general, and may not be entirely comfortable with running tools at the command line. This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.
    • Digital Modeling of Material Appearance

      • 1st Edition
      • December 6, 2007
      • Julie Dorsey + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 4 4 2 4
      • Hardback
        9 7 8 0 1 2 2 2 1 1 8 1 2
      • eBook
        9 7 8 0 0 8 0 5 5 6 7 1 0
      Computer graphics systems are capable of generating stunningly realistic images of objects that have never physically existed. In order for computers to create these accurately detailed images, digital models of appearance must include robust data to give viewers a credible visual impression of the depicted materials. In particular, digital models demonstrating the nuances of how materials interact with light are essential to this capability. Digital Modeling of Material Appearance is the first comprehensive work on the digital modeling of material appearance: it explains how models from physics and engineering are combined with keen observation skills for use in computer graphics rendering. Written by the foremost experts in appearance modeling and rendering, this book is for practitioners who want a general framework for understanding material modeling tools, and also for researchers pursuing the development of new modeling techniques. The text is not a "how to" guide for a particular software system. Instead, it provides a thorough discussion of foundations and detailed coverage of key advances. Practitioners and researchers in applications such as architecture, theater, product development, cultural heritage documentation, visual simulation and training, as well as traditional digital application areas such as feature film, television, and computer games, will benefit from this much needed resource. ABOUT THE AUTHORSJulie Dorsey and Holly Rushmeier are professors in the Computer Science Department at Yale University and co-directors of the Yale Computer Graphics Group. François Sillion is a senior researcher with INRIA (Institut National de Recherche en Informatique et Automatique), and director of its Grenoble Rhône-Alpes research center.
    • Microsoft SharePoint 2007 Technologies

      • 1st Edition
      • December 6, 2007
      • Kevin Laahs + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 3 6 1 6 1
      • eBook
        9 7 8 0 0 8 0 5 5 6 6 8 0
      SharePoint provides a vital service to businesses--content sharing over Intranet and Internet sites. Microsoft is investing tons of research and development money into content sharing technologies: SharePoint is the "next big thing" for MS Office users, especially in a world where many work teams are becoming geographically dispersed. SharePoint 2007 is a big improvement over former releases, due to enhanced security, better search capabilities, and more robust functionality. Lots of change means that users will have to come up to speed on the new enhancements. With Microsoft SharePoint 2007 Technologies, readers will gain a working knowledge of the architecture, administration, and end user features offered by SharePoint 2007. This book also provides practical techniques to help IT professionals integrate Sharepoint with other MS products such as Exchange Server. The expertise of the authors, who have helped many businesses leverage Microsoft technologies, makes this book an invaluable tool to anyone interested in deploying Sharepoint '07.
    • VHDL-2008

      • 1st Edition
      • November 26, 2007
      • Peter J. Ashenden + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 2 4 9 0
      • eBook
        9 7 8 0 0 8 0 5 5 7 5 7 1
      VHDL-2008: Just the New Stuff, as its title says, introduces the new features added to the latest revision of the IEEE standard for the VHDL hardware description language. Written by the Chair and Technical Editor of the IEEE working group, the book is an authoritative guide to how the new features work and how to use them to improve design productivity. It will be invaluable for early adopters of the new language version, for tool implementers, and for those just curious about where VHDL is headed.
    • The Best Damn Server Virtualization Book Period

      • 1st Edition
      • November 20, 2007
      • Rogier Dittner + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 1 7 1
      • eBook
        9 7 8 0 0 8 0 5 5 6 6 5 9
      Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtualization allows you to consolidate many servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs. Readers of this book will easily be able to plan and deploy VMware, Microsoft Virtual Server, and Xen.
    • Digital Watermarking and Steganography

      • 2nd Edition
      • November 13, 2007
      • Ingemar Cox + 4 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 4 7 6 9
      • Hardback
        9 7 8 0 1 2 3 7 2 5 8 5 1
      • eBook
        9 7 8 0 0 8 0 5 5 5 8 0 5
      Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
    • Practical Oracle Security

      • 1st Edition
      • November 12, 2007
      • Josh Shaul + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 9 8 3
      • eBook
        9 7 8 0 0 8 0 5 5 5 6 6 9
      This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database.
    • Handbook of Network and System Administration

      • 1st Edition
      • November 9, 2007
      • Jan Bergstra + 1 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 1 9 8 9
      • eBook
        9 7 8 0 0 8 0 5 5 3 5 8 0
      System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.