Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Firewall Policies and VPN Configurations

      • 1st Edition
      • September 21, 2006
      • Syngress + 5 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 8 8 7
      • eBook
        9 7 8 0 0 8 0 5 0 6 5 1 7
      A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper’s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.
    • Oracle Performance Tuning for 10gR2

      • 2nd Edition
      • September 15, 2006
      • Gavin JT Powell
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 5 3
      • eBook
        9 7 8 0 0 8 0 4 9 2 0 2 5
      Tuning of SQL code is generally cheaper than changing the data model. Physical and configuration tuning involves a search for bottlenecks that often points to SQL code or data model issues. Building an appropriate data model and writing properly performing SQL code can give 100%+ performance improvement. Physical and configuration tuning often gives at most a 25% performance increase. Gavin Powell shows that the central theme of Oracle10gR2 Performance Tuning is four-fold: denormalize data models to fit applications; tune SQL code according to both the data model and the application in relation to scalability; create a well-proportioned physical architecture at the time of initial Oracle installation; and most important, mix skill sets to obtain the best results.
    • Data Mining and Predictive Analysis

      • 1st Edition
      • September 15, 2006
      • Colleen McCue
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 7 9 6 7
      • eBook
        9 7 8 0 0 8 0 4 6 4 6 2 6
      It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community hot-spots, and refined resource deployment decisions. In this book Dr. McCue describes her use of "off the shelf" software to graphically depict crime trends and to predict where future crimes are likely to occur. Armed with this data, law enforcement executives can develop "risk-based deployment strategies," that allow them to make informed and cost-efficient staffing decisions based on the likelihood of specific criminal activity.Knowledge of advanced statistics is not a prerequisite for using Data Mining and Predictive Analysis. The book is a starting point for those thinking about using data mining in a law enforcement setting. It provides terminology, concepts, practical application of these concepts, and examples to highlight specific techniques and approaches in crime and intelligence analysis, which law enforcement and intelligence professionals can tailor to their own unique situation and responsibilities.
    • High-Performance Embedded Computing

      • 1st Edition
      • September 11, 2006
      • Wayne Wolf
      • English
      • Paperback
        9 7 8 0 1 2 3 6 9 4 8 5 0
      • eBook
        9 7 8 0 0 8 0 4 7 5 0 0 4
      Over the past several years, embedded systems have emerged as an integral though unseen part of many consumer, industrial, and military devices. The explosive growth of these systems has resulted in embedded computing becoming an increasingly important discipline. The need for designers of high-performance, application-specific computing systems has never been greater, and many universities and colleges in the US and worldwide are now developing advanced courses to help prepare their students for careers in embedded computing.High-Perfo... Embedded Computing: Architectures, Applications, and Methodologies is the first book designed to address the needs of advanced students and industry professionals. Focusing on the unique complexities of embedded system design, the book provides a detailed look at advanced topics in the field, including multiprocessors, VLIW and superscalar architectures, and power consumption. Fundamental challenges in embedded computing are described, together with design methodologies and models of computation. HPEC provides an in-depth and advanced treatment of all the components of embedded systems, with discussions of the current developments in the field and numerous examples of real-world applications.
    • Parallel Computational Fluid Dynamics 2005

      • 1st Edition
      • September 6, 2006
      • A. Deane + 7 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 2 0 6 1
      • Paperback
        9 7 8 0 4 4 4 5 4 7 4 0 8
      • eBook
        9 7 8 0 0 8 0 4 6 7 9 3 1
      The proceedings from Parallel CFD 2005 covering all aspects of the theory and applications of parallel computational fluid dynamics from the traditional to the more contemporary issues.
    • Building a VoIP Network with Nortel's Multimedia Communication Server 5100

      • 1st Edition
      • August 31, 2006
      • Larry Chaffin
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 7 8 8
      • eBook
        9 7 8 0 0 8 0 5 0 0 1 7 1
      The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel’s hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortel’s entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line.
    • Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2

      • 1st Edition
      • August 22, 2006
      • Kieran McCorry
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 9 1
      • eBook
        9 7 8 0 0 8 0 4 9 1 8 3 7
      Exchange Server is necessary to support Outlook and SharePoint in the enterprise messaging at virtually all Fortune 1000 firms. Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. This book covers, in detail, the tools and techniques that messaging system planners and administrators will require in order to establish a functioning interoperability environment between Exchange 2003 and previous versions of Exchange including Exchange 5.5 and Exchange 2000. The book describes various deployment topologies and environments to cater for a multitude of different organizational requirements. The book has been updated to reflect the new changes that Microsoft introduced with Exchange 2003 and SP1 and SP2 updates in relation to major architectural changes to migrations techniques and other services such as RPC over HTTP and journaling functionality.
    • How to Cheat at Managing Information Security

      • 1st Edition
      • August 22, 2006
      • Mark Osborne
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 1 0 5
      • eBook
        9 7 8 0 0 8 0 5 0 8 2 8 3
      This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non – technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: • Design the organization chart of his new security organization • Design and implement policies and strategies • Navigate his way through jargon filled meetings • Understand the design flaws of his E-commerce and DMZ infrastructure
    • Handbook of Constraint Programming

      • 1st Edition
      • August 18, 2006
      • Francesca Rossi + 2 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 7 2 6 4
      • eBook
        9 7 8 0 0 8 0 4 6 3 8 0 3
      Constraint programming is a powerful paradigm for solving combinatorial search problems that draws on a wide range of techniques from artificial intelligence, computer science, databases, programming languages, and operations research. Constraint programming is currently applied with success to many domains, such as scheduling, planning, vehicle routing, configuration, networks, and bioinformatics.The aim of this handbook is to capture the full breadth and depth of the constraint programming field and to be encyclopedic in its scope and coverage. While there are several excellent books on constraint programming, such books necessarily focus on the main notions and techniques and cannot cover also extensions, applications, and languages. The handbook gives a reasonably complete coverage of all these lines of work, based on constraint programming, so that a reader can have a rather precise idea of the whole field and its potential. Of course each line of work is dealt with in a survey-like style, where some details may be neglected in favor of coverage. However, the extensive bibliography of each chapter will help the interested readers to find suitable sources for the missing details. Each chapter of the handbook is intended to be a self-contained survey of a topic, and is written by one or more authors who are leading researchers in the area.The intended audience of the handbook is researchers, graduate students, higher-year undergraduates and practitioners who wish to learn about the state-of-the-art in constraint programming. No prior knowledge about the field is necessary to be able to read the chapters and gather useful knowledge. Researchers from other fields should find in this handbook an effective way to learn about constraint programming and to possibly use some of the constraint programming concepts and techniques in their work, thus providing a means for a fruitful cross-fertilization among different research areas.The handbook is organized in two parts. The first part covers the basic foundations of constraint programming, including the history, the notion of constraint propagation, basic search methods, global constraints, tractability and computational complexity, and important issues in modeling a problem as a constraint problem. The second part covers constraint languages and solver, several useful extensions to the basic framework (such as interval constraints, structured domains, and distributed CSPs), and successful application areas for constraint programming.
    • Joe Grand's Best of Hardware, Wireless, and Game Console Hacking

      • 1st Edition
      • August 18, 2006
      • Joe Grand + 9 more
      • English
      • eBook
        9 7 8 0 0 8 0 5 0 9 6 6 2
      The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more.The presentation of these 20 projects on DVD media provides users with benefits and options not available on the printed page. All images are hi-res color that can be enlarged or printed, the text is easily searched, and the user can copy the contents to their hard disk and add comments directly into the PDF files. The DVD media also lends itself well to group projects (it includes a 10 user license).The 160-page book includes chapters on hacking tools and electrical engineering basics, along with chapters on the background, design and functionality of each hardware device.