Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Building a VoIP Network with Nortel's Multimedia Communication Server 5100

      • 1st Edition
      • August 31, 2006
      • Larry Chaffin
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 7 8 8
      • eBook
        9 7 8 0 0 8 0 5 0 0 1 7 1
      The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel’s hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortel’s entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line.
    • Wireshark & Ethereal Network Protocol Analyzer Toolkit

      • 1st Edition
      • December 18, 2006
      • Jay Beale + 2 more
      • English
      • eBook
        9 7 8 0 0 8 0 5 0 6 0 1 2
      Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress’ best-selling book Ethereal Packet Sniffing.Wireshark & Ethereal Network Protocol Analyzer Toolkit provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also be guided through Ethereal’s graphical user interface. The following sections will teach readers to use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire or to read saved capture files. This section also details how to import and export files between Ethereal and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking requests and reply packet pairs as well as exclusive coverage of MATE, Ethereal’s brand new configurable upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports.
    • Oracle 10g RAC Grid, Services and Clustering

      • 1st Edition
      • May 25, 2006
      • Murali Vallath
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 2 1 7
      • eBook
        9 7 8 0 0 8 0 4 9 2 0 3 2
      Grid architecture is Oracle’s strategy for high-end computing and RAC is the stepping stone into this arena. This book focuses on current technology including all valid RAC features up through Oracle Database 10g Release 2, with a primary focus on deploying it in a high-end grid environment. The book discusses this technology at length which users will find beneficial when researching, implementing or monitoring a RAC environment. The author covers workshop implementation of services and the distribution of workload across instances, with threshold definitions and the new load balancing algorithms. In addition it includes detailed discussions on ASM that complements the implementation of RAC in Oracle Grid strategy. The book also includes discussions on new Oracle Clusterware, its components and its integration with RAC. Oracle 10g RAC focuses on RAC-specific topics including ASM, operating system configuration, installation and configuration of RAC and much more. Coverage includes network configuration for high availability, FAN, TAF, ONS, implementation of maximum availability architecture (MAA), EM Grid Control, AWR, ADDM and other performance-related tools. The author includes several scripts for performance tuning and implementation that the reader can use to configure a RAC environment either on a 2, 4, 8, 60 or 99 node configuration.
    • Voice Over IPv6

      • 1st Edition
      • April 11, 2006
      • Daniel Minoli
      • English
      • Paperback
        9 7 8 0 7 5 0 6 8 2 0 6 0
      • eBook
        9 7 8 0 0 8 0 4 8 1 6 5 4
      IPv6 (Internet Protocol version 6) is the future of Internet telephony. And this book is your guide to that future.IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater robustness. It will also be fully “backwards compatible” with existing IPv4 systems. These capabilities will finally make Internet telephony a viable competitor to conventional switched telephone networks. In this book, Dan Minoli clearly explains IPv6 and how telephone networks can be built on its foundations.This is not just another IPv6 book; instead, it focuses on those aspects of IPv6 relevant to Internet telephony systems and voice networks. Minoli uses a compare/contrast approach, exploring where IPv6 is similar to IPv4 and where it differs, to let you quickly grasp the essence of IPv6 and the similarities (and differences) between current IPv4-based systems and IPv6-based systems. If you will be designing, implementing, or maintaining the next generation of Internet telephony systems, then you need the information in this book!*Explains the essential concepts of IPv6 and how they relate to Internet telephony*Describes how Internet telephony systems using IPv6 are different from, and better than, Internet telephony systems based on the older IPv4 standard*Discusses how to transition existing IPv4 Internet telephony systems and conventional switched systems to IPv6-based systems*Extensive treatment of security issues, including IP layer encryption and authentication methods*Explains connection techniques, including “plug and play” approaches, for equipment used in IPv6 systems
    • Syngress IT Security Project Management Handbook

      • 1st Edition
      • July 4, 2006
      • Susan Snedaker
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 7 6 4
      • eBook
        9 7 8 0 0 8 0 4 8 9 7 7 3
      The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.
    • Virtualization with Microsoft Virtual Server 2005

      • 1st Edition
      • October 13, 2006
      • Andy Jones + 6 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 0 6 8
      • eBook
        9 7 8 0 0 8 0 5 2 0 6 7 4
      A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how Virtual Server can ease administration and lower overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual world.
    • Java Data Mining: Strategy, Standard, and Practice

      • 1st Edition
      • November 7, 2006
      • Mark F. Hornick + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 4 5 2 8
      • eBook
        9 7 8 0 0 8 0 4 9 5 9 1 0
      Whether you are a software developer, systems architect, data analyst, or business analyst, if you want to take advantage of data mining in the development of advanced analytic applications, Java Data Mining, JDM, the new standard now implemented in core DBMS and data mining/analysis software, is a key solution component. This book is the essential guide to the usage of the JDM standard interface, written by contributors to the JDM standard.
    • Securing HP NonStop Servers in an Open Systems World

      • 1st Edition
      • August 16, 2006
      • XYPRO Technology XYPRO Technology Corp
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 4 6
      • eBook
        9 7 8 0 0 8 0 4 7 5 5 7 8
      Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing environments.HP NonStop Servers are used by Financial, Medical, Manufacturing enterprises where there can be no down time. Securing HP NonStop Servers in an Open Systems World: OSS, TCP/IP, and SQL takes a wide angle view of NonStop Server use. This book addresses protection of the Open Systems Services environment, network interfaces including TCP/IP and standard SQL databases. It lays out a roadmap of changes since our first book HP has made to Safeguard, elaborating on the advantages and disadvantages of implementing each new version. Even the security aspects of managing Operating System upgrades are given attention. Auditors, security policy makers, information security administrators and system managers will find the practical information they need for putting security principles into practice to meet industry standards as well as compliance regulations.
    • High-Performance Embedded Computing

      • 1st Edition
      • September 11, 2006
      • Wayne Wolf
      • English
      • Paperback
        9 7 8 0 1 2 3 6 9 4 8 5 0
      • eBook
        9 7 8 0 0 8 0 4 7 5 0 0 4
      Over the past several years, embedded systems have emerged as an integral though unseen part of many consumer, industrial, and military devices. The explosive growth of these systems has resulted in embedded computing becoming an increasingly important discipline. The need for designers of high-performance, application-specific computing systems has never been greater, and many universities and colleges in the US and worldwide are now developing advanced courses to help prepare their students for careers in embedded computing.High-Perfo... Embedded Computing: Architectures, Applications, and Methodologies is the first book designed to address the needs of advanced students and industry professionals. Focusing on the unique complexities of embedded system design, the book provides a detailed look at advanced topics in the field, including multiprocessors, VLIW and superscalar architectures, and power consumption. Fundamental challenges in embedded computing are described, together with design methodologies and models of computation. HPEC provides an in-depth and advanced treatment of all the components of embedded systems, with discussions of the current developments in the field and numerous examples of real-world applications.
    • Effective Prototyping for Software Makers

      • 1st Edition
      • December 12, 2006
      • Jonathan Arnowitz + 2 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 6 8 9 6 9
      Effective Prototyping for Software Makers is a practical, informative resource that will help anyone—whether or not one has artistic talent, access to special tools, or programming ability—to use good prototyping style, methods, and tools to build prototypes and manage for effective prototyping. This book features a prototyping process with guidelines, templates, and worksheets; overviews and step-by-step guides for nine common prototyping techniques; an introduction with step-by-step guidelines to a variety of prototyping tools that do not require advanced artistic skills; templates and other resources used in the book available on the Web for reuse; clearly-explained concepts and guidelines; and full-color illustrations and examples from a wide variety of prototyping processes, methods, and tools. This book is an ideal resource for usability professionals and interaction designers; software developers, web application designers, web designers, information architects, information and industrial designers.