Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • VHDL-2008

    Just the New Stuff
    • 1st Edition
    • Peter J. Ashenden + 1 more
    • English
    VHDL-2008: Just the New Stuff, as its title says, introduces the new features added to the latest revision of the IEEE standard for the VHDL hardware description language. Written by the Chair and Technical Editor of the IEEE working group, the book is an authoritative guide to how the new features work and how to use them to improve design productivity. It will be invaluable for early adopters of the new language version, for tool implementers, and for those just curious about where VHDL is headed.
  • The Best Damn Server Virtualization Book Period

    Including Vmware, Xen, and Microsoft Virtual Server
    • 1st Edition
    • Rogier Dittner + 1 more
    • English
    Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtualization allows you to consolidate many servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs. Readers of this book will easily be able to plan and deploy VMware, Microsoft Virtual Server, and Xen.
  • Digital Watermarking and Steganography

    • 2nd Edition
    • Ingemar Cox + 4 more
    • English
    Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
  • Practical Oracle Security

    Your Unauthorized Guide to Relational Database Security
    • 1st Edition
    • Josh Shaul + 1 more
    • English
    This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database.
  • Handbook of Network and System Administration

    • 1st Edition
    • Jan Bergstra + 1 more
    • English
    System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.
  • Information Assurance

    Dependability and Security in Networked Systems
    • 1st Edition
    • Yi Qian + 3 more
    • English
    In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).
  • Keeping Found Things Found: The Study and Practice of Personal Information Management

    • 1st Edition
    • William Jones
    • English
    Keeping Found Things Found: The Study and Practice of Personal Information Management is the first comprehensive book on new 'favorite child' of R&D at Microsoft and elsewhere, personal information management (PIM). It provides a comprehensive overview of PIM as both a study and a practice of the activities people do, and need to be doing, so that information can work for them in their daily lives. It explores what good and better PIM looks like, and how to measure improvements. It presents key questions to consider when evaluating any new PIM informational tools or systems. This book is designed for R&D professionals in HCI, data mining and data management, information retrieval, and related areas, plus developers of tools and software that include PIM solutions.
  • Principles of E-Learning Systems Engineering

    • 1st Edition
    • Lester Gilbert + 1 more
    • English
    The book integrates the principles of software engineering with the principles of educational theory, and applies them to the problems of e-learning development, thus establishing the discipline of E-learning systems engineering. For the first time, these principles are collected and organised into the coherent framework that this book provides. Both newcomers to and established practitioners in the field are provided with integrated and grounded advice on theory and practice. The book presents strong practical and theoretical frameworks for the design and development of technology-based materials and environments which have teaching, training or educational value. It brings together a complete range of the specific theories and detailed techniques involved in the design, development and delivery of materials such as business presentations, web-based presentations, training courses and academic lessons. Although the methods and theories discussed are generally appropriate to all forms and levels of learning and teaching, the book illustrates their use in and focuses its approach upon e-learning with adults.
  • Online Databases and Other Internet Resources for Earth Science

    • 1st Edition
    • Pillarisetty Venkataramana
    • English
    Though an enormous amount of information relating to earth sciences are available on the Internet, for a serious researcher, teacher, librarian or a student who has deadlines to meet, searching the Internet for specific scientific information can at times be frustrating. The main purpose of Online Databases and Other Internet Resources for Earth Science is to group these resources together and to provide the URLs and hyperlinks so a researcher, teacher or student can access them with the minimum effort, time and cost. The book also introduces the reader to a few basic concepts that propel the Internet and the world wide web so that he or she can make informed searches apart from assessing the quality and reliability of the data available on the internet. A brief introduction is provided on the current status of the draft treaty by the World Intellectual Property Organization (WIPO) and the EU directive on copyright restrictions for scientific databases and what a researcher is permitted to do with the data obtained from the Internet, especially those from a commercial data provider.
  • Network Simulation Experiments Manual

    • 2nd Edition
    • Emad Aboelela
    • English
    Network Simulation Experiments Manual, Second Edition, enables networking professional to visualize how networks work by providing free access to easy-to-install OPNET software. This software provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies. The book also goes a step further by providing detailed experiments on core networking topologies for use in this simulation environment. Each experiment is also accompanied by review questions, a lab report, and exercises. This book is recommended for graduate students and networking designers and professionals.