Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Web Dragons

    Inside the Myths of Search Engine Technology
    • 1st Edition
    • Ian H. Witten + 2 more
    • English
    Web Dragons offers a perspective on the world of Web search and the effects of search engines and information availability on the present and future world. In the blink of an eye since the turn of the millennium, the lives of people who work with information have been utterly transformed. Everything we need to know is on the web. It's where we learn and play, shop and do business, keep up with old friends and meet new ones. Search engines make it possible for us to find the stuff we need to know. Search engines — web dragons — are the portals through which we access society's treasure trove of information. How do they stack up against librarians, the gatekeepers over centuries past? What role will libraries play in a world whose information is ruled by the web? How is the web organized? Who controls its contents, and how do they do it? How do search engines work? How can web visibility be exploited by those who want to sell us their wares? What's coming tomorrow, and can we influence it? As we witness the dawn of a new era, this book shows readers what it will look like and how it will change their world. Whoever you are: if you care about information, this book will open your eyes and make you blink.
  • Microsoft Windows Security Fundamentals

    For Windows 2003 SP1 and R2
    • 1st Edition
    • Jan De Clercq + 1 more
    • English
    This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.
  • Microsoft® Exchange Server 2003 Scalability with SP1 and SP2

    • 1st Edition
    • Pierre Bijaoui
    • English
    Microsoft Exchange 2003 Server is the server component that provides electronic messaging in major corporate environments. It has had two updates since its release in 2003, SP1 and SP2. The author covers these along with critical changes in Widows 2003 Server such as the scalability features of the Active Directory and the server and storage technologies. This crucial release borrows from the legacy Exchange system, but also from a myriad of others. The organization of the book provides necessary background on the software and hardware required in order to manage an efficient scalable Microsoft Exchange 2003 Server deployment. Key technology for planning a future strategy is covered in the form of hardware and software that enable mission critical solutions including Storage Area Networks and Gigabit networks, Microsoft Clustering and multi-core symmetric multiprocessing.
  • Design of Industrial Information Systems

    • 1st Edition
    • Thomas Boucher + 1 more
    • English
    Design of Industrial Information Systems presents a body of knowledge applicable to many aspects of industrial and manufacturing systems. New software systems, such as Enterprise Resource Planning, and new hardware technologies, such as RFID, have made it possible to integrate what were separate IT databases and operations into one system to realize the greatest possible operational efficiencies. This text provides a background in, and an introduction to, the relevant information technologies and shows how they are used to model and implement integrated IT systems.With the growth of courses in information technology offered in industrial engineering and engineering management programs, the authors have written this book to show how such computer-based knowledge systems are designed and used in modern manufacturing and industrial companies.
  • Network Security Assessment: From Vulnerability to Patch

    • 1st Edition
    • Steve Manzuik + 2 more
    • English
    This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors’ time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation.
  • Traffic Engineering and QoS Optimization of Integrated Voice and Data Networks

    • 1st Edition
    • Gerald R. Ash
    • English
    This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement, modeling, characterization, and control of network traffic, and the application of techniques to achieve specific performance objectives. The scope of the analysis and recommendations include dimensioning, call/flow and connection routing, QoS resource management, routing table management, dynamic transport routing, and operational requirements. Case studies are included which provide the reader with a concrete way into the technical details and highlight why and how to use the techniques described in the book.
  • Virtualization with Microsoft Virtual Server 2005

    • 1st Edition
    • Andy Jones + 6 more
    • English
    A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how Virtual Server can ease administration and lower overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual world.
  • IPv6 Core Protocols Implementation

    • 1st Edition
    • Qing Li + 2 more
    • English
    IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago. This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges.
  • Designing and Building Enterprise DMZs

    • 1st Edition
    • Hal Flynn
    • English
    This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ.
  • How to Cheat at Windows System Administration Using Command Line Scripts

    • 1st Edition
    • Pawan K Bhardwaj
    • English
    How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these ‘wizards’ are interactive and make the administrator’s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.