Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Oracle Performance Tuning for 10gR2

      • 2nd Edition
      • September 15, 2006
      • Gavin JT Powell
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 5 3
      • eBook
        9 7 8 0 0 8 0 4 9 2 0 2 5
      Tuning of SQL code is generally cheaper than changing the data model. Physical and configuration tuning involves a search for bottlenecks that often points to SQL code or data model issues. Building an appropriate data model and writing properly performing SQL code can give 100%+ performance improvement. Physical and configuration tuning often gives at most a 25% performance increase. Gavin Powell shows that the central theme of Oracle10gR2 Performance Tuning is four-fold: denormalize data models to fit applications; tune SQL code according to both the data model and the application in relation to scalability; create a well-proportioned physical architecture at the time of initial Oracle installation; and most important, mix skill sets to obtain the best results.
    • Data Mining and Predictive Analysis

      • 1st Edition
      • September 15, 2006
      • Colleen McCue
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 7 9 6 7
      • eBook
        9 7 8 0 0 8 0 4 6 4 6 2 6
      It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community hot-spots, and refined resource deployment decisions. In this book Dr. McCue describes her use of "off the shelf" software to graphically depict crime trends and to predict where future crimes are likely to occur. Armed with this data, law enforcement executives can develop "risk-based deployment strategies," that allow them to make informed and cost-efficient staffing decisions based on the likelihood of specific criminal activity.Knowledge of advanced statistics is not a prerequisite for using Data Mining and Predictive Analysis. The book is a starting point for those thinking about using data mining in a law enforcement setting. It provides terminology, concepts, practical application of these concepts, and examples to highlight specific techniques and approaches in crime and intelligence analysis, which law enforcement and intelligence professionals can tailor to their own unique situation and responsibilities.
    • High-Performance Embedded Computing

      • 1st Edition
      • September 11, 2006
      • Wayne Wolf
      • English
      • Paperback
        9 7 8 0 1 2 3 6 9 4 8 5 0
      • eBook
        9 7 8 0 0 8 0 4 7 5 0 0 4
      Over the past several years, embedded systems have emerged as an integral though unseen part of many consumer, industrial, and military devices. The explosive growth of these systems has resulted in embedded computing becoming an increasingly important discipline. The need for designers of high-performance, application-specific computing systems has never been greater, and many universities and colleges in the US and worldwide are now developing advanced courses to help prepare their students for careers in embedded computing.High-Perfo... Embedded Computing: Architectures, Applications, and Methodologies is the first book designed to address the needs of advanced students and industry professionals. Focusing on the unique complexities of embedded system design, the book provides a detailed look at advanced topics in the field, including multiprocessors, VLIW and superscalar architectures, and power consumption. Fundamental challenges in embedded computing are described, together with design methodologies and models of computation. HPEC provides an in-depth and advanced treatment of all the components of embedded systems, with discussions of the current developments in the field and numerous examples of real-world applications.
    • Parallel Computational Fluid Dynamics 2005

      • 1st Edition
      • September 6, 2006
      • A. Deane + 7 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 2 0 6 1
      • Paperback
        9 7 8 0 4 4 4 5 4 7 4 0 8
      • eBook
        9 7 8 0 0 8 0 4 6 7 9 3 1
      The proceedings from Parallel CFD 2005 covering all aspects of the theory and applications of parallel computational fluid dynamics from the traditional to the more contemporary issues.
    • Building a VoIP Network with Nortel's Multimedia Communication Server 5100

      • 1st Edition
      • August 31, 2006
      • Larry Chaffin
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 7 8 8
      • eBook
        9 7 8 0 0 8 0 5 0 0 1 7 1
      The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel’s hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortel’s entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line.
    • Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2

      • 1st Edition
      • August 22, 2006
      • Kieran McCorry
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 9 1
      • eBook
        9 7 8 0 0 8 0 4 9 1 8 3 7
      Exchange Server is necessary to support Outlook and SharePoint in the enterprise messaging at virtually all Fortune 1000 firms. Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. This book covers, in detail, the tools and techniques that messaging system planners and administrators will require in order to establish a functioning interoperability environment between Exchange 2003 and previous versions of Exchange including Exchange 5.5 and Exchange 2000. The book describes various deployment topologies and environments to cater for a multitude of different organizational requirements. The book has been updated to reflect the new changes that Microsoft introduced with Exchange 2003 and SP1 and SP2 updates in relation to major architectural changes to migrations techniques and other services such as RPC over HTTP and journaling functionality.
    • How to Cheat at Managing Information Security

      • 1st Edition
      • August 22, 2006
      • Mark Osborne
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 1 0 5
      • eBook
        9 7 8 0 0 8 0 5 0 8 2 8 3
      This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non – technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: • Design the organization chart of his new security organization • Design and implement policies and strategies • Navigate his way through jargon filled meetings • Understand the design flaws of his E-commerce and DMZ infrastructure
    • Handbook of Constraint Programming

      • 1st Edition
      • August 18, 2006
      • Francesca Rossi + 2 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 7 2 6 4
      • eBook
        9 7 8 0 0 8 0 4 6 3 8 0 3
      Constraint programming is a powerful paradigm for solving combinatorial search problems that draws on a wide range of techniques from artificial intelligence, computer science, databases, programming languages, and operations research. Constraint programming is currently applied with success to many domains, such as scheduling, planning, vehicle routing, configuration, networks, and bioinformatics.The aim of this handbook is to capture the full breadth and depth of the constraint programming field and to be encyclopedic in its scope and coverage. While there are several excellent books on constraint programming, such books necessarily focus on the main notions and techniques and cannot cover also extensions, applications, and languages. The handbook gives a reasonably complete coverage of all these lines of work, based on constraint programming, so that a reader can have a rather precise idea of the whole field and its potential. Of course each line of work is dealt with in a survey-like style, where some details may be neglected in favor of coverage. However, the extensive bibliography of each chapter will help the interested readers to find suitable sources for the missing details. Each chapter of the handbook is intended to be a self-contained survey of a topic, and is written by one or more authors who are leading researchers in the area.The intended audience of the handbook is researchers, graduate students, higher-year undergraduates and practitioners who wish to learn about the state-of-the-art in constraint programming. No prior knowledge about the field is necessary to be able to read the chapters and gather useful knowledge. Researchers from other fields should find in this handbook an effective way to learn about constraint programming and to possibly use some of the constraint programming concepts and techniques in their work, thus providing a means for a fruitful cross-fertilization among different research areas.The handbook is organized in two parts. The first part covers the basic foundations of constraint programming, including the history, the notion of constraint propagation, basic search methods, global constraints, tractability and computational complexity, and important issues in modeling a problem as a constraint problem. The second part covers constraint languages and solver, several useful extensions to the basic framework (such as interval constraints, structured domains, and distributed CSPs), and successful application areas for constraint programming.
    • Joe Grand's Best of Hardware, Wireless, and Game Console Hacking

      • 1st Edition
      • August 18, 2006
      • Joe Grand + 9 more
      • English
      • eBook
        9 7 8 0 0 8 0 5 0 9 6 6 2
      The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more.The presentation of these 20 projects on DVD media provides users with benefits and options not available on the printed page. All images are hi-res color that can be enlarged or printed, the text is easily searched, and the user can copy the contents to their hard disk and add comments directly into the PDF files. The DVD media also lends itself well to group projects (it includes a 10 user license).The 160-page book includes chapters on hacking tools and electrical engineering basics, along with chapters on the background, design and functionality of each hardware device.
    • Securing HP NonStop Servers in an Open Systems World

      • 1st Edition
      • August 16, 2006
      • XYPRO Technology XYPRO Technology Corp
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 4 6
      • eBook
        9 7 8 0 0 8 0 4 7 5 5 7 8
      Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing environments.HP NonStop Servers are used by Financial, Medical, Manufacturing enterprises where there can be no down time. Securing HP NonStop Servers in an Open Systems World: OSS, TCP/IP, and SQL takes a wide angle view of NonStop Server use. This book addresses protection of the Open Systems Services environment, network interfaces including TCP/IP and standard SQL databases. It lays out a roadmap of changes since our first book HP has made to Safeguard, elaborating on the advantages and disadvantages of implementing each new version. Even the security aspects of managing Operating System upgrades are given attention. Auditors, security policy makers, information security administrators and system managers will find the practical information they need for putting security principles into practice to meet industry standards as well as compliance regulations.