Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Fault-Tolerant Systems

      • 1st Edition
      • March 1, 2007
      • Israel Koren + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 4 3 4 9
      • Hardback
        9 7 8 0 1 2 0 8 8 5 2 5 1
      • eBook
        9 7 8 0 0 8 0 4 9 2 6 8 1
      Fault-Tolerant Systems is the first book on fault tolerance design with a systems approach to both hardware and software. No other text on the market takes this approach, nor offers the comprehensive and up-to-date treatment that Koren and Krishna provide. This book incorporates case studies that highlight six different computer systems with fault-tolerance techniques implemented in their design. A complete ancillary package is available to lecturers, including online solutions manual for instructors and PowerPoint slides. Students, designers, and architects of high performance processors will value this comprehensive overview of the field.
    • Microsoft Vista for IT Security Professionals

      • 1st Edition
      • March 1, 2007
      • Anthony Piltzecker
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 3 9 6
      • eBook
        9 7 8 0 0 8 0 5 5 6 1 4 7
      Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vista’s preparedness to withstand the 24 x 7 attacks it will face from malicious attackers as the world’s #1 desktop operating system.
    • Information Architecture for Information Professionals

      • 1st Edition
      • February 28, 2007
      • Susan Batley
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 2 3 3 5
      • Paperback
        9 7 8 1 8 4 3 3 4 2 3 2 8
      • eBook
        9 7 8 1 7 8 0 6 3 1 0 7 3
      This book covers the key aspects of information architecture: core elements of information management, indexing, cataloguing and classification - organising and recording information in the digital environment. Information Architecture for Information Professionals also focuses on design, specifically user-centred design: designing information systems that support the needs of users, by providing attractive, intuitive interfaces that support a range of information tasks and accommodate a range of individual resources.
    • Petroleum Production Engineering, A Computer-Assisted Approach

      • 1st Edition
      • February 5, 2007
      • Boyun Guo
      • English
      • Hardback
        9 7 8 0 7 5 0 6 8 2 7 0 1
      • Paperback
        9 7 8 1 4 9 3 3 0 3 2 4 3
      • eBook
        9 7 8 0 0 8 0 4 7 9 9 5 8
      Petroleum Production Engineering, A Computer-Assisted Approach provides handy guidelines to designing, analyzing and optimizing petroleum production systems. Broken into four parts, this book covers the full scope of petroleum production engineering, featuring stepwise calculations and computer-based spreadsheet programs. Part one contains discussions of petroleum production engineering fundamentals, empirical models for production decline analysis, and the performance of oil and natural gas wells. Part two presents principles of designing and selecting the main components of petroleum production systems including: well tubing, separation and dehydration systems, liquid pumps, gas compressors, and pipelines for oil and gas transportation. Part three introduces artificial lift methods, including sucker rod pumping systems, gas lift technology, electrical submersible pumps and other artificial lift systems. Part four is comprised of production enhancement techniques including, identifying well problems, designing acidizing jobs, guidelines to hydraulic fracturing and job evaluation techniques, and production optimization techniques.
    • Essential MATLAB for Engineers and Scientists

      • 3rd Edition
      • January 29, 2007
      • Daniel T. Valentine + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 1 5 0 1
      Essential MATLAB for Engineers and Scientists, Third Edition, is an essential guide to MATLAB as a problem-solving tool. It presents MATLAB both as a mathematical tool and a programming language, giving a concise and easy-to-master introduction to its potential and power. Stressing the importance of a structured approach to problem solving, the text provides a step-by-step method for program design and algorithm development. It includes numerous simple exercises for hands-on learning, a chapter on algorithm development and program design, and a concise introduction to useful topics for solving problems in later engineering and science courses: vectors as arrays, arrays of characters, GUIs, advanced graphics, and simulation and numerical methods. The text is ideal for undergraduates in engineering and science taking a course on Matlab.
    • Research in Accounting Regulation

      • 1st Edition
      • Volume 19
      • January 24, 2007
      • Gary Previts + 1 more
      • English
      • Hardback
        9 7 8 0 0 8 0 4 5 3 8 0 4
      • eBook
        9 7 8 0 0 8 0 4 6 8 8 9 1
      The scope of service provided by professional accountants is influenced by legislation and case law as well as the dictates of a variety of government and private sector agencies; including State Boards of Accountancy, Academic Accreditation Bodies, the United States Securities and Exchange Commission, the Public Accounting Oversight Board, independent standard setting bodies such as the Federal Accounting Standards Advisory Board [US], the Financial Accounting Standards Board [US] and the International Accounting Standards Board. These entities and self-regulatory organizations such as U.S. State Societies of CPAs and the American Institute of Certified Public Accountants and equivalent and emerging national bodies that exist in most developed and developing countries, are among the emerging entities which attempt to coordinate the activities of professional accountants among sovereign nations. It is important for academics, students, practitioners, regulators and researchers to consider and study the role and relationship of such bodies with the practice and content of our discipline.
    • Elsevier's Dictionary of Information Security

      • 1st Edition
      • January 16, 2007
      • G. Manoilov + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 1 8 7 9
      • Hardback
        9 7 8 0 4 4 4 5 1 7 7 0 8
      • eBook
        9 7 8 0 0 8 0 4 8 8 8 0 6
      The dictionary will contain terms currently used in the broad fields of electronics data protection and data management in today's interconnected world - the Global Village. The terminology will cover all aspects of the modern technology's best practices in multiple subfields, namely: physical (hardware and perimeter) security, wired and wireless telecommunication infrastructure security, internet (e-commerce and business-to-business... security, anti-virus and anti-spyware applications, virtual private networking, theory and practices of cryptography, corporate security policies'methodology... design, implementation and enforcement.5000 terms in English, German, French and Russian
    • Developing Practical Wireless Applications

      • 1st Edition
      • January 4, 2007
      • Dean A. Gratton
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 1 0 1
      • eBook
        9 7 8 0 0 8 0 4 6 9 6 0 7
      In a constant stream of new ideas, wireless technologies continue to emerge offering a range of capabilities, each affording simplicity and ease-of-use. Such diversity and choice should surely beg the question, “are manufacturers using the right technology for the right product?” Developing Practical Wireless Applications will explore this question and, in doing so, will illustrate many of the wireless technologies currently available whilst drawing upon their individual strengths and weaknesses. More specifically, the book will draw your attention to the diverse collection of standardized and proprietary solutions available to manufacturers. As developers and innovators your choices are not restricted to any norm and, as such, a standardized or proprietary solution may afford you greater benefits in realising any product roadmap. Developing Practical Wireless Applications will provide you with a comprehensive understanding of how each technology works, coupled with an exploration into overlapping, complementary and competing technologies. In establishing this foundation, we will explore wireless applications in their context and address their suitability. In contrast, the book also considers the practicality of a wireless world in an attempt to better understand our audience and specific demographic groups. Coupled with a richer understanding of our consumers, along with our technology make-up we can indeed target wireless products more effectively.
    • Spin-stand Microscopy of Hard Disk Data

      • 1st Edition
      • December 20, 2006
      • Isaak D. Mayergoyz + 1 more
      • English
      • Hardback
        9 7 8 0 0 8 0 4 4 4 6 5 9
      • Paperback
        9 7 8 1 4 8 3 2 9 9 6 3 1
      • eBook
        9 7 8 0 0 8 0 4 6 7 5 2 8
      This book provides an in-depth exposition of spin-stand microscopy of hard disk data which is a new technique recently developed and extensively tested by the authors of the book. Spin-stand microscopy is the first magnetic imaging technique where imaging is performed ex-situ on a rotating disk mounted on a spin-stand. This technique is one of the fastest scanning-based microscopy techniques. It is non-invasive and has nano-scale resolution. For these reasons, it provides unique capabilities for the visualization of magnetization patterns recorded on hard disks. This book is self-contained and it covers in sufficient details the basic facts of magnetic data storage technology, the principles and theory of spin-stand microscopy, its experimental implementations, as well as its applications in hard disk diagnostics, imaging of overwritten patterns, computer forensics of hard disk files, and data-dependent magnetic thermal relaxations of recorded magnetization patterns. This book will be a valuable reference for the magnetic data storage community, magnetic microscopy professionals as well as engineers and scientists involved in computer data forensics, commercial data recovery, and the design of archival data storage systems.
    • Wireshark & Ethereal Network Protocol Analyzer Toolkit

      • 1st Edition
      • December 18, 2006
      • Jay Beale + 2 more
      • English
      • eBook
        9 7 8 0 0 8 0 5 0 6 0 1 2
      Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress’ best-selling book Ethereal Packet Sniffing.Wireshark & Ethereal Network Protocol Analyzer Toolkit provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also be guided through Ethereal’s graphical user interface. The following sections will teach readers to use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire or to read saved capture files. This section also details how to import and export files between Ethereal and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking requests and reply packet pairs as well as exclusive coverage of MATE, Ethereal’s brand new configurable upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports.