Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Moderating Usability Tests

      • 1st Edition
      • February 29, 2008
      • Joseph S. Dumas + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 3 9 3 3 9
      • eBook
        9 7 8 0 0 8 0 5 5 8 2 7 1
      Moderating Usability Tests provides insight and guidance for usability testing. To a large extent, successful usability testing depends on the skills of the person facilitating the test. However, most usability specialists still learn how to conduct tests through an apprentice system with little formal training. This book is the resource for new and experienced moderators to learn about the rules and practices for interacting. Authors Dumas and Loring draw on their combined 40 years of usability testing experience to develop and present the most effective principles and practices – both practical and ethical – for moderating successful usability tests. The videos are available from the publisher's companion web site.
    • MATLAB for Neuroscientists

      • 1st Edition
      • October 29, 2008
      • Pascal Wallisch + 5 more
      • English
      • eBook
        9 7 8 0 0 8 0 9 2 3 2 8 4
      MATLAB for Neuroscientists: An Introduction to Scientific Computing in MATLAB is the first comprehensive teaching resource and textbook for the teaching of MATLAB in the Neurosciences and in Psychology. MATLAB is unique in that it can be used to learn the entire empirical and experimental process, including stimulus generation, experimental control, data collection, data analysis and modeling. Thus a wide variety of computational problems can be addressed in a single programming environment. The idea is to empower advanced undergraduates and beginning graduate students by allowing them to design and implement their own analytical tools. As students advance in their research careers, they will have achieved the fluency required to understand and adapt more specialized tools as opposed to treating them as "black boxes". Virtually all computational approaches in the book are covered by using genuine experimental data that are either collected as part of the lab project or were collected in the labs of the authors, providing the casual student with the look and feel of real data. In some cases, published data from classical papers are used to illustrate important concepts, giving students a computational understanding of critically important research.
    • Systems Engineering with SysML/UML

      • 1st Edition
      • February 12, 2008
      • Tim Weilkiens
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 2 7 4 2
      • eBook
        9 7 8 0 0 8 0 5 5 8 3 1 8
      UML, the Universal Modeling Language, was the first programming language designed to fulfill the requirement for "universality." However, it is a software-specific language, and does not support the needs of engineers designing from the broader systems-based perspective. Therefore, SysML was created. It has been steadily gaining popularity, and many companies, especially in the heavily-regulated Defense, Automotive, Aerospace, Medical Device and Telecomms industries, are already using SysML, or are plannning to switch over to it in the near future. However, little information is currently available on the market regarding SysML. Its use is just on the crest of becoming a widespread phenomenon, and so thousands of software engineers are now beginning to look for training and resources. This book will serve as the one-stop, definitive guide that provide an introduction to SysML, and instruction on how to implement it, for all these new users.
    • Information Flow and Knowledge Sharing

      • 1st Edition
      • Volume 2
      • March 10, 2008
      • Flavio Soares Correa da Silva + 1 more
      • Mary E. James
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 9 3 5 0
      • Paperback
        9 7 8 0 4 4 4 6 0 3 4 8 7
      • eBook
        9 7 8 0 0 8 0 5 6 9 9 0 1
      Except from the ForewordThe stated aim of the book series "Capturing Intelligence" is to publish books on research from all disciplines dealing with and affecting the issue of understanding and reproducing intelligence artificial systems. Of course, much of the work done in the past decades in this area has been of a highly technical nature, varying from hardware design for robots, software design for intelligent agents, and formal logic for reasoning.It is therefore very refreshing to see Information Flow and Knowledge Sharing. This is a courageous book indeed. It is not afraid to tackle the Big Issues: notions such as information, knowledge, information system, information flow, collaborative problem solving, and ontological reasoning. All of these notions are crucial to our understanding of intelligence and our building of intelligent artificial systems, but all too often, these Big Issues are hidden behind the curtains while the technical topics take center stage. AI has a rich history of philosophical books that have chosen a non-standard structure and narrative. It is nice to see that the authors have succeeded into combining a non-standard approach to deep questions with a non-standard format, resulting in a highly interesting volume.Frank van Harmelen, Series EditorExcerpt from the IntroductionOur interest is to promote, through a better and deeper understanding of the notions of information and knowledge, a better and deeper critical understanding of information technology as situated in the full range of human activities, assuming as a principle that this range of activities cannot be properly appreciated when it is reduced to the simplified means-end schema proposed by Technology. We invite the reader to build his/her own points of view about these notions, considering our propositions as a starting point for a critical analysis and discussion of these points. With that, we believe we are contributing to a better understanding of the impact of technology – and particularly of Information Technology – in everyday life. Flavio Soares Correa da Silva, Jaume Agusti-Cullell
    • The Designer's Guide to VHDL

      • 3rd Edition
      • Volume 3
      • May 15, 2008
      • Peter J. Ashenden
      • English
      • Hardback
        9 7 8 0 1 2 0 8 8 7 8 5 9
      • eBook
        9 7 8 0 0 8 0 5 6 8 8 5 0
      VHDL, the IEEE standard hardware description language for describing digital electronic systems, has recently been revised. The Designer's Guide to VHDL has become a standard in the industry for learning the features of VHDL and using it to verify hardware designs. This third edition is the first comprehensive book on the market to address the new features of VHDL-2008.
    • Digital Storage in Consumer Electronics

      • 1st Edition
      • February 29, 2008
      • Thomas M. Coughlin
      • English
      • Paperback
        9 7 8 0 7 5 0 6 8 4 6 5 1
      • eBook
        9 7 8 0 0 8 0 5 5 8 4 9 3
      Can you imagine life without your cell phone, laptop, digital camera, iPod, BlackBerry, flat-screen TV, or DVD player? The skyrocketing demand for devices that provide simple, immediate access to large amounts of content is driving required digital storage capacity to unprecedented levels. Designing digital storage into consumer electronics is crucial to the performance and cost of these devices. However, as our requirements for digital content storage grow, so does the formidable difficulty of implementing design solutions that are rugged, long-lasting, power-miserly, secure, network-accessible and can still fit in the palm of your hand!This book provides the background necessary to understand common digital storage devices and media. It helps readers decide which methods of storage work best for which kinds of devices, and then teaches designers how to successfully integrate them into consumer products.
    • Semantic Web for the Working Ontologist

      • 1st Edition
      • April 25, 2008
      • Dean Allemang + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 5 5 8 3 8 7
      The promise of the Semantic Web to provide a universal medium to exchange data information and knowledge has been well publicized. There are many sources too for basic information on the extensions to the WWW that permit content to be expressed in natural language yet used by software agents to easily find, share and integrate information. Until now individuals engaged in creating ontologies-- formal descriptions of the concepts, terms, and relationships within a given knowledge domain-- have had no sources beyond the technical standards documents. Semantic Web for the Working Ontologist transforms this information into the practical knowledge that programmers and subject domain experts need. Authors Allemang and Hendler begin with solutions to the basic problems, but don’t stop there: they demonstrate how to develop your own solutions to problems of increasing complexity and ensure that your skills will keep pace with the continued evolution of the Semantic Web.
    • Embedded DSP Processor Design

      • 1st Edition
      • Volume 2
      • May 30, 2008
      • Dake Liu
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 1 2 3 3
      • Paperback
        9 7 8 0 3 2 3 2 8 1 0 0 3
      • eBook
        9 7 8 0 0 8 0 5 6 9 8 7 1
      This book provides design methods for Digital Signal Processors and Application Specific Instruction set Processors, based on the author's extensive, industrial design experience. Top-down and bottom-up design methodologies are presented, providing valuable guidance for both students and practicing design engineers. Coverage includes design of internal-external data types, application specific instruction sets, micro architectures, including designs for datapath and control path, as well as memory sub systems. Integration and verification of a DSP-ASIP processor are discussed and reinforced with extensive examples.
    • Securing Windows Server 2008

      • 1st Edition
      • May 23, 2008
      • Aaron Tiensivu
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 8 0 5
      • eBook
        9 7 8 0 0 8 0 5 6 9 9 7 0
      Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including: 1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.3. Protectio... of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.4. Protection against malicious software with User Account Control with a new authentication architecture.5. Incr... control over your user settings with Expanded Group Policy....to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.
    • The Illustrated Network

      • 1st Edition
      • November 25, 2008
      • Walter Goralski
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 5 4 1 5
      • eBook
        9 7 8 0 0 8 0 9 2 3 2 2 2
      In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.Here are ten key differences between the two:Stevens Gora... Older operating systems (AIX,svr4,etc.) Newe... OSs (XP, Linux, FreeBSD, etc.)Two routers (Cisco, Telebit (obsolete)) Two routers (M-series, J-series)Slow Ethernet and SLIP link Fast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)Tcpdump for traces Newer, better utility to capture traces (Ethereal, now has a new name!)No IPSec IPSecNo multicast Multica... router security discussed Firewall routers detailedNo Web Full Web browser HTML considerationNo IPv6 IPv6 overviewFew configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols