Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Virtualization with Microsoft Virtual Server 2005

      • 1st Edition
      • October 13, 2006
      • Andy Jones + 6 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 0 6 8
      • eBook
        9 7 8 0 0 8 0 5 2 0 6 7 4
      A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how Virtual Server can ease administration and lower overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual world.
    • IPv6 Core Protocols Implementation

      • 1st Edition
      • October 12, 2006
      • Qing Li + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 4 4 7 7 5 1 3
      • eBook
        9 7 8 0 0 8 0 4 9 5 8 8 0
      IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago. This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges.
    • Designing and Building Enterprise DMZs

      • 1st Edition
      • October 9, 2006
      • Hal Flynn
      • English
      • eBook
        9 7 8 0 0 8 0 5 0 4 0 0 1
      This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ.
    • How to Cheat at Windows System Administration Using Command Line Scripts

      • 1st Edition
      • October 9, 2006
      • Pawan K Bhardwaj
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 0 5 1
      • eBook
        9 7 8 0 0 8 0 5 0 8 2 6 9
      How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these ‘wizards’ are interactive and make the administrator’s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.
    • Putting Content Online

      • 1st Edition
      • September 30, 2006
      • Mark Jordan
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 1 7 7 2
      • Paperback
        9 7 8 1 8 4 3 3 4 1 7 6 5
      • eBook
        9 7 8 1 7 8 0 6 3 0 9 8 4
      This book focuses on practical, standards-based approaches to planning, executing and managing projects in which libraries and other cultural institutions digitize material and make it available on the web (or make collections of born-digital material available). Topics include evaluating material for digitization, intellectual property issues, metadata standards, digital library content management systems, search and retrieval considerations, project management, project operations, proposal writing, and libraries’ emerging role as publishers.
    • Open Source Database Driven Web Development

      • 1st Edition
      • September 30, 2006
      • Isaac Dunlap
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 1 6 1 1
      • Hardback
        9 7 8 1 8 4 3 3 4 1 7 1 0
      • eBook
        9 7 8 1 7 8 0 6 3 1 8 8 2
      Almost every organization seeks a simple means of managing, publishing and/or providing searchable web access to information. Written by a knowledgeable web developer, this book demonstrates the simplicity, cost-effectiveness, and versatility of designing database driven web applications with Open Source resources. Case studies of ‘real world’ implementations address both theoretical aspects and practical considerations of developing applications with the easy-to-use PHP scripting language and powerful MySQL relational database. Project organization and design issues are considered along with basic coding examples, accessibility standards and implementation advice.
    • IT Manager's Handbook

      • 2nd Edition
      • September 29, 2006
      • Bill Holtsnider + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 6 5 7 4 6
      IT Manager's Handbook, Second Edition, provides essential information to help students understand the responsibilities of today’s IT Management professionals: not only planning network security and implementing disaster recovery plans, but also such vital tasks as creating budgets, administering compliance, and managing staff. In particular, the book discusses business practices that are most critical to effective IT operations: recruiting, budgeting, resource planning, managing personnel, and working with vendor. This updated version includes expanded coverage on such critical IT management topics as security, disaster recovery, storage, government/regulator... compliance, and project management. Information is organized modularly so that instructors and students can delve directly into only the topics needed. Each chapter contains additional resources sections for books, articles, and websites relevant to that topic. It contains new material on key technology topics such as open source, outsourcing, offshoring, and handhelds, plus updated coverage of e-commerce, remote access, intranets, and LAN/WAN management.
    • Data Preparation for Data Mining Using SAS

      • 1st Edition
      • September 29, 2006
      • Mamdouh Refaat
      • English
      • eBook
        9 7 8 0 0 8 0 4 9 1 0 0 4
      Are you a data mining analyst, who spends up to 80% of your time assuring data quality, then preparing that data for developing and deploying predictive models? And do you find lots of literature on data mining theory and concepts, but when it comes to practical advice on developing good mining views find little “how to” information? And are you, like most analysts, preparing the data in SAS?This book is intended to fill this gap as your source of practical recipes. It introduces a framework for the process of data preparation for data mining, and presents the detailed implementation of each step in SAS. In addition, business applications of data mining modeling require you to deal with a large number of variables, typically hundreds if not thousands. Therefore, the book devotes several chapters to the methods of data transformation and variable selection.
    • Joe Celko's SQL Puzzles and Answers

      • 2nd Edition
      • September 21, 2006
      • Joe Celko
      • English
      • Paperback
        9 7 8 0 1 2 3 7 3 5 9 6 6
      • eBook
        9 7 8 0 0 8 0 4 9 1 6 8 4
      Joe Celko's SQL Puzzles and Answers, Second Edition, challenges you with his trickiest puzzles and then helps solve them with a variety of solutions and explanations. Author Joe Celko demonstrates the thought processes that are involved in attacking a problem from an SQL perspective to help advanced database programmers solve the puzzles you frequently face. These techniques not only help with the puzzle at hand, but also help develop the mindset needed to solve the many difficult SQL puzzles you face every day. This updated edition features many new puzzles; dozens of new solutions to puzzles; and new chapters on temporal query puzzles and common misconceptions about SQL and RDBMS that leads to problems. This book is recommended for database programmers with a good knowledge of SQL.
    • Firewall Policies and VPN Configurations

      • 1st Edition
      • September 21, 2006
      • Syngress + 5 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 8 8 7
      • eBook
        9 7 8 0 0 8 0 5 0 6 5 1 7
      A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper’s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.