Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Handbook of Constraint Programming

      • 1st Edition
      • August 18, 2006
      • Francesca Rossi + 2 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 7 2 6 4
      • eBook
        9 7 8 0 0 8 0 4 6 3 8 0 3
      Constraint programming is a powerful paradigm for solving combinatorial search problems that draws on a wide range of techniques from artificial intelligence, computer science, databases, programming languages, and operations research. Constraint programming is currently applied with success to many domains, such as scheduling, planning, vehicle routing, configuration, networks, and bioinformatics.The aim of this handbook is to capture the full breadth and depth of the constraint programming field and to be encyclopedic in its scope and coverage. While there are several excellent books on constraint programming, such books necessarily focus on the main notions and techniques and cannot cover also extensions, applications, and languages. The handbook gives a reasonably complete coverage of all these lines of work, based on constraint programming, so that a reader can have a rather precise idea of the whole field and its potential. Of course each line of work is dealt with in a survey-like style, where some details may be neglected in favor of coverage. However, the extensive bibliography of each chapter will help the interested readers to find suitable sources for the missing details. Each chapter of the handbook is intended to be a self-contained survey of a topic, and is written by one or more authors who are leading researchers in the area.The intended audience of the handbook is researchers, graduate students, higher-year undergraduates and practitioners who wish to learn about the state-of-the-art in constraint programming. No prior knowledge about the field is necessary to be able to read the chapters and gather useful knowledge. Researchers from other fields should find in this handbook an effective way to learn about constraint programming and to possibly use some of the constraint programming concepts and techniques in their work, thus providing a means for a fruitful cross-fertilization among different research areas.The handbook is organized in two parts. The first part covers the basic foundations of constraint programming, including the history, the notion of constraint propagation, basic search methods, global constraints, tractability and computational complexity, and important issues in modeling a problem as a constraint problem. The second part covers constraint languages and solver, several useful extensions to the basic framework (such as interval constraints, structured domains, and distributed CSPs), and successful application areas for constraint programming.
    • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

      • 1st Edition
      • November 8, 2006
      • T. Bradley
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 1 4 3
      • eBook
        9 7 8 0 0 8 0 5 0 5 8 9 3
      Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.
    • Cryptography for Developers

      • 1st Edition
      • December 1, 2006
      • Tom St Denis
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 0 4 4
      • eBook
        9 7 8 0 0 8 0 5 0 3 4 5 5
      The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptogr... for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.
    • Philosophy of Psychology and Cognitive Science

      • 1st Edition
      • October 23, 2006
      • English
      • Paperback
        9 7 8 0 4 4 4 5 5 1 9 4 8
      • Hardback
        9 7 8 0 4 4 4 5 1 5 4 0 7
      • eBook
        9 7 8 0 0 8 0 4 6 6 6 2 0
      Psychology is the study of thinking, and cognitive science is the interdisciplinary investigation of mind and intelligence that also includes philosophy, artificial intelligence, neuroscience, linguistics, and anthropology. In these investigations, many philosophical issues arise concerning methods and central concepts. The Handbook of Philosophy of Psychology and Cognitive Science contains 16 essays by leading philosophers of science that illuminate the nature of the theories and explanations used in the investigation of minds. Topics discussed include representation, mechanisms, reduction, perception, consciousness, language, emotions, neuroscience, and evolutionary psychology.
    • Putting Content Online

      • 1st Edition
      • September 30, 2006
      • Mark Jordan
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 1 7 7 2
      • Paperback
        9 7 8 1 8 4 3 3 4 1 7 6 5
      • eBook
        9 7 8 1 7 8 0 6 3 0 9 8 4
      This book focuses on practical, standards-based approaches to planning, executing and managing projects in which libraries and other cultural institutions digitize material and make it available on the web (or make collections of born-digital material available). Topics include evaluating material for digitization, intellectual property issues, metadata standards, digital library content management systems, search and retrieval considerations, project management, project operations, proposal writing, and libraries’ emerging role as publishers.
    • PIC Basic Projects

      • 2nd Edition
      • July 20, 2006
      • Dogan Ibrahim
      • English
      • Paperback
        9 7 8 0 7 5 0 6 6 8 7 9 8
      • eBook
        9 7 8 0 0 8 0 4 6 4 9 7 8
      Covering the PIC BASIC and PIC BASIC PRO compilers, PIC Basic Projects provides an easy-to-use toolkit for developing applications with PIC BASIC. Numerous simple projects give clear and concrete examples of how PIC BASIC can be used to develop electronics applications, while larger and more advanced projects describe program operation in detail and give useful insights into developing more involved microcontroller applications. Including new and dynamic models of the PIC microcontroller, such as the PIC16F627, PIC16F628, PIC16F629 and PIC12F627, PIC Basic Projects is a thoroughly practical, hands-on introduction to PIC BASIC for the hobbyist, student and electronics design engineer.
    • Google Talking

      • 1st Edition
      • December 13, 2006
      • Johnny Long + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 5 5 9
      • eBook
        9 7 8 0 0 8 0 4 8 8 8 7 5
      Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. Google Talking takes communication to the next level, combining the awesome power of Text and Voice! This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.This book will cover the program “Google Talk” in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.
    • Modern Information Processing

      • 1st Edition
      • February 8, 2006
      • Bernadette Bouchon-Meunier + 2 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 0 8 9 6
      • Hardback
        9 7 8 0 4 4 4 5 2 0 7 5 3
      • eBook
        9 7 8 0 0 8 0 4 6 1 6 9 4
      The volume "Modern Information Processing: From Theory to Applications," edited by Bernadette Bouchon-Meunier, Giulianella Coletti and Ronald Yager, is a collection of carefully selected papers drawn from the program of IPMU'04, which was held in Perugia, Italy. The book represents the cultural policy of IPMU conference which is not focused on narrow range of methodologies, but on the contrary welcomes all the theories for the management of uncertainty and aggregation of information in intelligent systems, providing a medium for the exchange of ideas between theoreticians and practitioners in these and related areas.The book is composed by 7 sections: UNCERTAINTYPREFERENC... AND DATA MININGAGGREGATION AND MULTI-CRITERIA DECISION MAKINGKNOWLEDGE REPRESENTATION•The book contributes to enhancement of our ability to deal effectively with uncertainty in all of its manifestations. •The book can help to build brigs among theories and methods methods for the management of uncertainty. •The book addresses issues which have a position of centrality in our information-centric world. •The book presents interesting results devoted to representing knowledge: the goal is to capture the subtlety of human knowledge (richness) and to allow computer manipulation (formalization). •The book contributes to the goal: an efficient use of the information for a good decision strategy.APPLIED DOMAINS
    • Parallel Computational Fluid Dynamics 2005

      • 1st Edition
      • September 6, 2006
      • A. Deane + 7 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 2 0 6 1
      • Paperback
        9 7 8 0 4 4 4 5 4 7 4 0 8
      • eBook
        9 7 8 0 0 8 0 4 6 7 9 3 1
      The proceedings from Parallel CFD 2005 covering all aspects of the theory and applications of parallel computational fluid dynamics from the traditional to the more contemporary issues.
    • Microsoft® Exchange Server 2003 Scalability with SP1 and SP2

      • 1st Edition
      • October 30, 2006
      • Pierre Bijaoui
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 0 0 2
      • eBook
        9 7 8 0 0 8 0 4 9 1 8 5 1
      Microsoft Exchange 2003 Server is the server component that provides electronic messaging in major corporate environments. It has had two updates since its release in 2003, SP1 and SP2. The author covers these along with critical changes in Widows 2003 Server such as the scalability features of the Active Directory and the server and storage technologies. This crucial release borrows from the legacy Exchange system, but also from a myriad of others. The organization of the book provides necessary background on the software and hardware required in order to manage an efficient scalable Microsoft Exchange 2003 Server deployment. Key technology for planning a future strategy is covered in the form of hardware and software that enable mission critical solutions including Storage Area Networks and Gigabit networks, Microsoft Clustering and multi-core symmetric multiprocessing.