Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Digital Modeling of Material Appearance

      • 1st Edition
      • December 6, 2007
      • Julie Dorsey + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 4 4 2 4
      • Hardback
        9 7 8 0 1 2 2 2 1 1 8 1 2
      • eBook
        9 7 8 0 0 8 0 5 5 6 7 1 0
      Computer graphics systems are capable of generating stunningly realistic images of objects that have never physically existed. In order for computers to create these accurately detailed images, digital models of appearance must include robust data to give viewers a credible visual impression of the depicted materials. In particular, digital models demonstrating the nuances of how materials interact with light are essential to this capability. Digital Modeling of Material Appearance is the first comprehensive work on the digital modeling of material appearance: it explains how models from physics and engineering are combined with keen observation skills for use in computer graphics rendering. Written by the foremost experts in appearance modeling and rendering, this book is for practitioners who want a general framework for understanding material modeling tools, and also for researchers pursuing the development of new modeling techniques. The text is not a "how to" guide for a particular software system. Instead, it provides a thorough discussion of foundations and detailed coverage of key advances. Practitioners and researchers in applications such as architecture, theater, product development, cultural heritage documentation, visual simulation and training, as well as traditional digital application areas such as feature film, television, and computer games, will benefit from this much needed resource. ABOUT THE AUTHORSJulie Dorsey and Holly Rushmeier are professors in the Computer Science Department at Yale University and co-directors of the Yale Computer Graphics Group. François Sillion is a senior researcher with INRIA (Institut National de Recherche en Informatique et Automatique), and director of its Grenoble Rhône-Alpes research center.
    • Keeping Found Things Found: The Study and Practice of Personal Information Management

      • 1st Edition
      • November 1, 2007
      • William Jones
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 8 6 6 3
      • eBook
        9 7 8 0 0 8 0 5 5 4 1 5 0
      Keeping Found Things Found: The Study and Practice of Personal Information Management is the first comprehensive book on new 'favorite child' of R&D at Microsoft and elsewhere, personal information management (PIM). It provides a comprehensive overview of PIM as both a study and a practice of the activities people do, and need to be doing, so that information can work for them in their daily lives. It explores what good and better PIM looks like, and how to measure improvements. It presents key questions to consider when evaluating any new PIM informational tools or systems. This book is designed for R&D professionals in HCI, data mining and data management, information retrieval, and related areas, plus developers of tools and software that include PIM solutions.
    • Business Metadata: Capturing Enterprise Knowledge

      • 1st Edition
      • September 27, 2007
      • W.H. Inmon + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 3 7 2 6 7
      • eBook
        9 7 8 0 0 8 0 5 5 2 2 0 0
      Business Metadata: Capturing Enterprise Knowledge is the first book that helps businesses capture corporate (human) knowledge and unstructured data, and offer solutions for codifying it for use in IT and management. Written by Bill Inmon, one of the fathers of the data warehouse and well-known author, the book is filled with war stories, examples, and cases from current projects. It includes a complete metadata acquisition methodology and project plan to guide readers every step of the way, and sample unstructured metadata for use in self-testing and developing skills. This book is recommended for IT professionals, including those in consulting, working on systems that will deliver better knowledge management capability. This includes people in these positions: data architects, data analysts, SOA architects, metadata analysts, repository (metadata data warehouse) managers as well as vendors that have a metadata component as part of their systems or tools.
    • Practical Oracle Security

      • 1st Edition
      • November 12, 2007
      • Josh Shaul + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 9 8 3
      • eBook
        9 7 8 0 0 8 0 5 5 5 6 6 9
      This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database.
    • Information Architecture for Information Professionals

      • 1st Edition
      • February 28, 2007
      • Susan Batley
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 2 3 3 5
      • Paperback
        9 7 8 1 8 4 3 3 4 2 3 2 8
      • eBook
        9 7 8 1 7 8 0 6 3 1 0 7 3
      This book covers the key aspects of information architecture: core elements of information management, indexing, cataloguing and classification - organising and recording information in the digital environment. Information Architecture for Information Professionals also focuses on design, specifically user-centred design: designing information systems that support the needs of users, by providing attractive, intuitive interfaces that support a range of information tasks and accommodate a range of individual resources.
    • User-Centered Design Stories

      • 1st Edition
      • April 19, 2007
      • Carol Righi + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 6 0 8 9
      • eBook
        9 7 8 0 0 8 0 4 8 1 5 5 5
      User-Centered Design Stories is the first user-centered design casebook with cases covering the key tasks and issues facing UCD practitioners today. Intended for both students and practitioners, this book follows the Harvard Case study method, where the reader is placed in the role of the decision-maker in a real-life professional situation. In this book, the reader is asked to analyze dozens of UCD work situations and propose solutions for the problem set. The problems posed in the cases cover a wide variety of key tasks and issues faced by practitioners, including those related to organizational/manag... topics, UCD methods and processes, and technical/ project issues. The benefit of the casebook and its organization is that it offers new practitioners (as well as experienced practitioners working in new settings) valuable practice in decision-making that cannot be obtained by simply reading a book or attending a seminar.
    • Information Assurance

      • 1st Edition
      • November 1, 2007
      • Yi Qian + 3 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 3 5 6 6 9
      • eBook
        9 7 8 0 0 8 0 5 5 5 8 8 1
      In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).
    • Deploying IP and MPLS QoS for Multiservice Networks

      • 1st Edition
      • March 9, 2007
      • John William Evans + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 0 5 4 9 5
      • Paperback
        9 7 8 0 1 2 4 0 5 4 5 8 5
      • eBook
        9 7 8 0 0 8 0 4 8 8 6 8 4
      QoS, short for “quality of service,” is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional.The authors have provided a comprehensive treatise on this subject. They have included topics such as traffic engineering, capacity planning, and admission control. This book provides real world case studies of QoS in multiservice networks. These case studies remove the mystery behind QoS by illustrating the how, what, and why of implementing QoS within networks. Readers will be able to learn from the successes and failures of these actual working designs and configurations.
    • Ethernet Networking for the Small Office and Professional Home Office

      • 1st Edition
      • June 4, 2007
      • Jan L. Harrington
      • English
      • Paperback
        9 7 8 0 1 2 3 7 3 7 4 4 1
      • eBook
        9 7 8 0 0 8 0 5 5 3 6 0 3
      In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media. Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then Ethernet Networking for the Small Office and Professional Home Office will give you an in-depth understanding of the technology involved in an Ethernet network. One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms. In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided. This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
    • Digital Design and Computer Architecture

      • 1st Edition
      • March 2, 2007
      • David Harris + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 5 4 7 0 6 0
      Digital Design and Computer Architecture is designed for courses that combine digital logic design with computer organization/archite... or that teach these subjects as a two-course sequence. Digital Design and Computer Architecture begins with a modern approach by rigorously covering the fundamentals of digital logic design and then introducing Hardware Description Languages (HDLs). Featuring examples of the two most widely-used HDLs, VHDL and Verilog, the first half of the text prepares the reader for what follows in the second: the design of a MIPS Processor. By the end of Digital Design and Computer Architecture, readers will be able to build their own microprocessor and will have a top-to-bottom understanding of how it works--even if they have no formal background in design or architecture beyond an introductory class. David Harris and Sarah Harris combine an engaging and humorous writing style with an updated and hands-on approach to digital design.