Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

      • 1st Edition
      • November 8, 2006
      • T. Bradley
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 1 4 3
      • eBook
        9 7 8 0 0 8 0 5 0 5 8 9 3
      Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.
    • Java Data Mining: Strategy, Standard, and Practice

      • 1st Edition
      • November 7, 2006
      • Mark F. Hornick + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 4 5 2 8
      • eBook
        9 7 8 0 0 8 0 4 9 5 9 1 0
      Whether you are a software developer, systems architect, data analyst, or business analyst, if you want to take advantage of data mining in the development of advanced analytic applications, Java Data Mining, JDM, the new standard now implemented in core DBMS and data mining/analysis software, is a key solution component. This book is the essential guide to the usage of the JDM standard interface, written by contributors to the JDM standard.
    • Scripting VMware Power Tools: Automating Virtual Infrastructure Administration

      • 1st Edition
      • November 7, 2006
      • Al Muller
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 5 9 7
      • eBook
        9 7 8 0 0 8 0 5 1 6 7 7 6
      This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting API’s and how they can be leveraged to provide some very useful, practical and time saving tools to manage a virtual infrastructure. From virtual server provisioning to backups and everything in between, this book is a one stop shop for virtual tools.
    • Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children

      • 1st Edition
      • November 6, 2006
      • Charles T. Betz
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 8 3 4 9
      Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children provides an independent examination of developments in Enterprise Resource Planning for Information. Major companies, research firms, and vendors are offering Enterprise Resource Planning for Information Technology, which they label as ERP for IT, IT Resource Planning and related terms. This book presents on-the-ground coverage of enabling IT governance in architectural detail, which can be used to define a strategy for immediate execution. It fills the gap between high-level guidance on IT governance and detailed discussions about specific vendor technologies. It provides a unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole. It presents a field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both process and system architectures. This book is recommended for practitioners and managers engaged in IT support in large companies, particularly those who are information architects, enterprise architects, senior software engineers, program/project managers, and IT managers/directors.
    • Web Dragons

      • 1st Edition
      • November 3, 2006
      • Ian H. Witten + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 6 0 9 6
      • eBook
        9 7 8 0 0 8 0 4 6 9 0 9 6
      Web Dragons offers a perspective on the world of Web search and the effects of search engines and information availability on the present and future world. In the blink of an eye since the turn of the millennium, the lives of people who work with information have been utterly transformed. Everything we need to know is on the web. It's where we learn and play, shop and do business, keep up with old friends and meet new ones. Search engines make it possible for us to find the stuff we need to know. Search engines — web dragons — are the portals through which we access society's treasure trove of information. How do they stack up against librarians, the gatekeepers over centuries past? What role will libraries play in a world whose information is ruled by the web? How is the web organized? Who controls its contents, and how do they do it? How do search engines work? How can web visibility be exploited by those who want to sell us their wares? What's coming tomorrow, and can we influence it? As we witness the dawn of a new era, this book shows readers what it will look like and how it will change their world. Whoever you are: if you care about information, this book will open your eyes and make you blink.
    • Handbook of Modal Logic

      • 1st Edition
      • Volume 3
      • November 3, 2006
      • Patrick Blackburn + 2 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 6 6 6 6 8
      The Handbook of Modal Logic contains 20 articles, which collectively introduce contemporary modal logic, survey current research, and indicate the way in which the field is developing. The articles survey the field from a wide variety of perspectives: the underling theory is explored in depth, modern computational approaches are treated, and six major applications areas of modal logic (in Mathematics, Computer Science, Artificial Intelligence, Linguistics, Game Theory, and Philosophy) are surveyed. The book contains both well-written expository articles, suitable for beginners approaching the subject for the first time, and advanced articles, which will help those already familiar with the field to deepen their expertise. Please visit:http://people....
    • Microsoft Windows Security Fundamentals

      • 1st Edition
      • October 30, 2006
      • Jan De Clercq + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 0 8
      • eBook
        9 7 8 0 0 8 0 4 9 1 8 8 2
      This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.
    • Microsoft® Exchange Server 2003 Scalability with SP1 and SP2

      • 1st Edition
      • October 30, 2006
      • Pierre Bijaoui
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 0 0 2
      • eBook
        9 7 8 0 0 8 0 4 9 1 8 5 1
      Microsoft Exchange 2003 Server is the server component that provides electronic messaging in major corporate environments. It has had two updates since its release in 2003, SP1 and SP2. The author covers these along with critical changes in Widows 2003 Server such as the scalability features of the Active Directory and the server and storage technologies. This crucial release borrows from the legacy Exchange system, but also from a myriad of others. The organization of the book provides necessary background on the software and hardware required in order to manage an efficient scalable Microsoft Exchange 2003 Server deployment. Key technology for planning a future strategy is covered in the form of hardware and software that enable mission critical solutions including Storage Area Networks and Gigabit networks, Microsoft Clustering and multi-core symmetric multiprocessing.
    • Design of Industrial Information Systems

      • 1st Edition
      • October 25, 2006
      • Thomas Boucher + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 0 4 9 2 4
      • Paperback
        9 7 8 1 4 9 3 3 0 0 7 9 2
      • eBook
        9 7 8 0 0 8 0 4 6 5 5 3 1
      Design of Industrial Information Systems presents a body of knowledge applicable to many aspects of industrial and manufacturing systems. New software systems, such as Enterprise Resource Planning, and new hardware technologies, such as RFID, have made it possible to integrate what were separate IT databases and operations into one system to realize the greatest possible operational efficiencies. This text provides a background in, and an introduction to, the relevant information technologies and shows how they are used to model and implement integrated IT systems.With the growth of courses in information technology offered in industrial engineering and engineering management programs, the authors have written this book to show how such computer-based knowledge systems are designed and used in modern manufacturing and industrial companies.
    • Network Security Assessment: From Vulnerability to Patch

      • 1st Edition
      • October 24, 2006
      • Steve Manzuik + 2 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 0 1 3
      • eBook
        9 7 8 0 0 8 0 5 1 2 5 3 2
      This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors’ time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation.