Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Foundations of Multidimensional and Metric Data Structures

      • 1st Edition
      • August 8, 2006
      • Hanan Samet
      • English
      • Hardback
        9 7 8 0 1 2 3 6 9 4 4 6 1
      • eBook
        9 7 8 0 0 8 0 9 1 9 0 7 2
      Foundations of Multidimensional and Metric Data Structures provides a thorough treatment of multidimensional point data, object and image-based representations, intervals and small rectangles, and high-dimensional datasets. The book includes a thorough introduction; a comprehensive survey to spatial and multidimensional data structures and algorithms; and implementation details for the most useful data structures. Each section includes a large number of exercises and solutions to self-test and confirm the reader's understanding and suggest future directions. The book is an excellent and valuable reference tool for professionals in many areas, including computer graphics, databases, geographic information systems (GIS), game programming, image processing, pattern recognition, solid modeling, similarity retrieval, and VLSI design.
    • PIC in Practice

      • 2nd Edition
      • January 16, 2006
      • David W Smith
      • English
      • Paperback
        9 7 8 0 7 5 0 6 6 8 2 6 2
      • eBook
        9 7 8 0 0 8 0 4 6 4 9 8 5
      PIC in Practice is a graded course based around the practical use of the PIC microcontroller through project work. Principles are introduced gradually, through hands-on experience, enabling students to develop their understanding at their own pace. Dave Smith has based the book on his popular short courses on the PIC for professionals, students and teachers at Manchester Metropolitan University. The result is a graded text, formulated around practical exercises, which truly guides the reader from square one. The book can be used at a variety of levels and the carefully graded projects make it ideal for colleges, schools and universities. Newcomers to the PIC will find it a painless introduction, whilst electronics hobbyists will enjoy the practical nature of this first course in microcontrollers. PIC in Practice introduces applications using the popular 16F84 device as well as the 16F627, 16F877, 12C508, 12C629 and 12C675. In this new edition excellent coverage is given to the 16F818, with additional information on writing and documenting software.
    • Writing Security Tools and Exploits

      • 1st Edition
      • January 5, 2006
      • James C Foster
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 7 2
      • eBook
        9 7 8 0 0 8 0 4 9 3 1 3 8
      Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
    • Video Conferencing over IP: Configure, Secure, and Troubleshoot

      • 1st Edition
      • March 28, 2006
      • Michael Gough
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 6 3 4
      • eBook
        9 7 8 0 0 8 0 4 8 9 8 5 8
      This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs.
    • Handbook of Modal Logic

      • 1st Edition
      • Volume 3
      • November 3, 2006
      • Patrick Blackburn + 2 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 6 6 6 6 8
      The Handbook of Modal Logic contains 20 articles, which collectively introduce contemporary modal logic, survey current research, and indicate the way in which the field is developing. The articles survey the field from a wide variety of perspectives: the underling theory is explored in depth, modern computational approaches are treated, and six major applications areas of modal logic (in Mathematics, Computer Science, Artificial Intelligence, Linguistics, Game Theory, and Philosophy) are surveyed. The book contains both well-written expository articles, suitable for beginners approaching the subject for the first time, and advanced articles, which will help those already familiar with the field to deepen their expertise. Please visit:http://people....
    • Oracle Database Programming using Java and Web Services

      • 1st Edition
      • July 14, 2006
      • Kuassi Mensah
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 2 9 3
      • eBook
        9 7 8 0 0 8 0 5 2 5 1 1 2
      The traditional division of labor between the database (which only stores and manages SQL and XML data for fast, easy data search and retrieval) and the application server (which runs application or business logic, and presentation logic) is obsolete. Although the books primary focus is on programming the Oracle Database, the concepts and techniques provided apply to most RDBMS that support Java including Oracle, DB2, Sybase, MySQL, and PostgreSQL. This is the first book to cover new Java, JDBC, SQLJ, JPublisher and Web Services features in Oracle Database 10g Release 2 (the coverage starts with Oracle 9i Release 2). This book is a must-read for database developers audience (DBAs, database applications developers, data architects), Java developers (JDBC, SQLJ, J2EE, and OR Mapping frameworks), and to the emerging Web Services assemblers.
    • How to Cheat at Windows System Administration Using Command Line Scripts

      • 1st Edition
      • October 9, 2006
      • Pawan K Bhardwaj
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 0 5 1
      • eBook
        9 7 8 0 0 8 0 5 0 8 2 6 9
      How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these ‘wizards’ are interactive and make the administrator’s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.
    • Open Access

      • 1st Edition
      • July 31, 2006
      • Neil Jacobs
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 2 0 4 5
      • Paperback
        9 7 8 1 8 4 3 3 4 2 0 3 8
      • eBook
        9 7 8 1 7 8 0 6 3 2 1 1 7
      This book brings together many of the worlds leading open access experts to provide an analysis of the key strategic, technical and economic aspects on the topic of open access. Open access to research papers is perhaps a defining debate for publishers, librarians, university managers and many researchers within the international academic community. Starting with a description of the current situation and its shortcomings, this book then defines the varieties of open access and addresses some of the many misunderstandings to which the term sometimes gives rise. There are chapters on the technologies involved, researchers, perspectives, and the business models of key players. These issues are then illustrated in a series of case studies from around the world, including the USA, UK, Netherlands, Australia and India. Open access is a far-reaching shift in scholarly communication, and the book concludes by going beyond todays debate and looking at the kind of research world that would be possible with open access to research outputs.
    • Open Source Database Driven Web Development

      • 1st Edition
      • September 30, 2006
      • Isaac Dunlap
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 1 6 1 1
      • Hardback
        9 7 8 1 8 4 3 3 4 1 7 1 0
      • eBook
        9 7 8 1 7 8 0 6 3 1 8 8 2
      Almost every organization seeks a simple means of managing, publishing and/or providing searchable web access to information. Written by a knowledgeable web developer, this book demonstrates the simplicity, cost-effectiveness, and versatility of designing database driven web applications with Open Source resources. Case studies of ‘real world’ implementations address both theoretical aspects and practical considerations of developing applications with the easy-to-use PHP scripting language and powerful MySQL relational database. Project organization and design issues are considered along with basic coding examples, accessibility standards and implementation advice.
    • Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2

      • 1st Edition
      • August 22, 2006
      • Kieran McCorry
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 9 1
      • eBook
        9 7 8 0 0 8 0 4 9 1 8 3 7
      Exchange Server is necessary to support Outlook and SharePoint in the enterprise messaging at virtually all Fortune 1000 firms. Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. This book covers, in detail, the tools and techniques that messaging system planners and administrators will require in order to establish a functioning interoperability environment between Exchange 2003 and previous versions of Exchange including Exchange 5.5 and Exchange 2000. The book describes various deployment topologies and environments to cater for a multitude of different organizational requirements. The book has been updated to reflect the new changes that Microsoft introduced with Exchange 2003 and SP1 and SP2 updates in relation to major architectural changes to migrations techniques and other services such as RPC over HTTP and journaling functionality.