Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Joe Celko's Analytics and OLAP in SQL

      • 1st Edition
      • July 24, 2006
      • Joe Celko
      • English
      • Paperback
        9 7 8 0 1 2 3 6 9 5 1 2 3
      • eBook
        9 7 8 0 0 8 0 4 9 5 9 3 4
      Joe Celko's Analytics and OLAP in SQL is the first book that teaches what SQL programmers need in order to successfully make the transition from On-Line Transaction Processing (OLTP) systems into the world of On-Line Analytical Processing (OLAP). This book is not an in-depth look at particular subjects, but an overview of many subjects that will give the working RDBMS programmers a map of the terra incognita they will face — if they want to grow. It contains expert advice from a noted SQL authority and award-winning columnist, who has given ten years of service to the ANSI SQL standards committee and many more years of dependable help to readers of online forums. It offers real-world insights and lots of practical examples. It covers the OLAP extensions in SQL-99; ETL tools, OLAP features supported in DBMSs, other query tools, simple reports, and statistical software. This book is ideal for experienced SQL programmers who have worked with OLTP systems who need to learn techniques—and even some tricks—that they can use in an OLAP situation.
    • Design of Industrial Information Systems

      • 1st Edition
      • October 25, 2006
      • Thomas Boucher + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 0 4 9 2 4
      • Paperback
        9 7 8 1 4 9 3 3 0 0 7 9 2
      • eBook
        9 7 8 0 0 8 0 4 6 5 5 3 1
      Design of Industrial Information Systems presents a body of knowledge applicable to many aspects of industrial and manufacturing systems. New software systems, such as Enterprise Resource Planning, and new hardware technologies, such as RFID, have made it possible to integrate what were separate IT databases and operations into one system to realize the greatest possible operational efficiencies. This text provides a background in, and an introduction to, the relevant information technologies and shows how they are used to model and implement integrated IT systems.With the growth of courses in information technology offered in industrial engineering and engineering management programs, the authors have written this book to show how such computer-based knowledge systems are designed and used in modern manufacturing and industrial companies.
    • The Persona Lifecycle

      • 1st Edition
      • April 24, 2006
      • John Pruitt + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 5 5 7 3 0
      The Persona Lifecycle is a field guide exclusively focused on interaction design's most popular new technique. The Persona Lifecycle addresses the "how" of creating effective personas and using those personas to design products that people love. It doesn’t just describe the value of personas; it offers detailed techniques and tools related to planning, creating, communicating, and using personas to create great product designs. Moreover, it provides rich examples, samples, and illustrations to imitate and model. Perhaps most importantly, it positions personas not as a panacea, but as a method used to complement other user-centered design (UCD) techniques including scenario-based design, cognitive walkthroughs and user testing. The authors developed the Persona Lifecycle model to communicate the value and practical application of personas to product design and development professionals. This book explores the complete lifecycle of personas, to guide the designer at each stage of product development. It includes a running case study with rich examples and samples that demonstrate how personas can be used in building a product end-to-end. It also presents recommended best practices in techniques, tools, and innovative methods and contains hundreds of relevant stories, commentary, opinions, and case studies from user experience professionals across a variety of domains and industries. This book will be a valuable resource for UCD professionals, including usability practitioners, interaction designers, technical writers, and program managers; programmers/develope... who act as the interaction designers for software; and those professionals who work with developers and designers.
    • Querying XML

      • 1st Edition
      • March 6, 2006
      • Jim Melton + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 7 1 1 8
      • eBook
        9 7 8 0 0 8 0 5 4 0 1 6 0
      XML has become the lingua franca for representing business data, for exchanging information between business partners and applications, and for adding structure–and sometimes meaning—to text-based documents. XML offers some special challenges and opportunities in the area of search: querying XML can produce very precise, fine-grained results, if you know how to express and execute those queries.For software developers and systems architects: this book teaches the most useful approaches to querying XML documents and repositories. This book will also help managers and project leaders grasp how “querying XML” fits into the larger context of querying and XML. Querying XML provides a comprehensive background from fundamental concepts (What is XML?) to data models (the Infoset, PSVI, XQuery Data Model), to APIs (querying XML from SQL or Java) and more.
    • Web Dragons

      • 1st Edition
      • November 3, 2006
      • Ian H. Witten + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 6 0 9 6
      • eBook
        9 7 8 0 0 8 0 4 6 9 0 9 6
      Web Dragons offers a perspective on the world of Web search and the effects of search engines and information availability on the present and future world. In the blink of an eye since the turn of the millennium, the lives of people who work with information have been utterly transformed. Everything we need to know is on the web. It's where we learn and play, shop and do business, keep up with old friends and meet new ones. Search engines make it possible for us to find the stuff we need to know. Search engines — web dragons — are the portals through which we access society's treasure trove of information. How do they stack up against librarians, the gatekeepers over centuries past? What role will libraries play in a world whose information is ruled by the web? How is the web organized? Who controls its contents, and how do they do it? How do search engines work? How can web visibility be exploited by those who want to sell us their wares? What's coming tomorrow, and can we influence it? As we witness the dawn of a new era, this book shows readers what it will look like and how it will change their world. Whoever you are: if you care about information, this book will open your eyes and make you blink.
    • Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children

      • 1st Edition
      • November 6, 2006
      • Charles T. Betz
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 8 3 4 9
      Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children provides an independent examination of developments in Enterprise Resource Planning for Information. Major companies, research firms, and vendors are offering Enterprise Resource Planning for Information Technology, which they label as ERP for IT, IT Resource Planning and related terms. This book presents on-the-ground coverage of enabling IT governance in architectural detail, which can be used to define a strategy for immediate execution. It fills the gap between high-level guidance on IT governance and detailed discussions about specific vendor technologies. It provides a unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole. It presents a field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both process and system architectures. This book is recommended for practitioners and managers engaged in IT support in large companies, particularly those who are information architects, enterprise architects, senior software engineers, program/project managers, and IT managers/directors.
    • Multilingual Speech Processing

      • 1st Edition
      • April 21, 2006
      • Tanja Schultz + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 0 8 8 5 0 1 5
      • eBook
        9 7 8 0 0 8 0 4 5 7 6 2 8
      Tanja Schultz and Katrin Kirchhoff have compiled a comprehensive overview of speech processing from a multilingual perspective. By taking this all-inclusive approach to speech processing, the editors have included theories, algorithms, and techniques that are required to support spoken input and output in a large variety of languages. Multilingual Speech Processing presents a comprehensive introduction to research problems and solutions, both from a theoretical as well as a practical perspective, and highlights technology that incorporates the increasing necessity for multilingual applications in our global community. Current challenges of speech processing and the feasibility of sharing data and system components across different languages guide contributors in their discussions of trends, prognoses and open research issues. This includes automatic speech recognition and speech synthesis, but also speech-to-speech translation, dialog systems, automatic language identification, and handling non-native speech. The book is complemented by an overview of multilingual resources, important research trends, and actual speech processing systems that are being deployed in multilingual human-human and human-machine interfaces. Researchers and developers in industry and academia with different backgrounds but a common interest in multilingual speech processing will find an excellent overview of research problems and solutions detailed from theoretical and practical perspectives.
    • UML 2 Certification Guide

      • 1st Edition
      • December 4, 2006
      • Tim Weilkiens + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 3 5 8 5 0
      • eBook
        9 7 8 0 0 8 0 4 6 6 5 1 4
      The popular Unified Modeling Language (UML) is both a language and notation developed by the Object Management Group (OMG) used to design and create specifications for software systems. With the recent release of version 2.0 UML, the OMG has started the OMG-Certified UML Professional Program to provide an objective measure of UML knowledge. As a certified UML professional a developer has an important credential to present to employers and clients. Certification also benefits companies looking for skilled UML practitioners by giving them a basis for making hiring and promotion decisions. UML 2 Certification Guide is the only official study guide to passing the new UML exams. This book systematically covers all of the topics covered in the exams, and has been carefully reviewed by the OMG. The book begins by assuming only a basic knowledge of UML and then progresses far enough to allow a reader to pass both the fundamental and the intermediate level exams. Along the way the book also covers topics that are not in introductory books on UML but that are necessary to pass the exams. Tim Weilkiens is considered one of the top ten experts on UML, and both authors have extensive experience training developers to successfully take the exams.
    • QuickTime for .NET and COM Developers

      • 1st Edition
      • January 17, 2006
      • John Cromie
      • English
      • Paperback
        9 7 8 0 1 2 7 7 4 5 7 5 6
      • eBook
        9 7 8 0 0 8 0 4 5 4 7 2 6
      At the heart of Apple's hugely popular iLife software suite—iMovie, iPhoto, iDVD, GarageBand, and iTunes—is QuickTime, the powerful media engine that drives elegant applications for managing movies, images, and audio files. The enduring success of QuickTime is in no small part attributable to its component architecture. This key feature has allowed it to embrace emerging digital media technologies and standards one by one as they have appeared over the 12 or so years since its launch. None of the competing technologies even comes close, let alone on both Mac OS X and Windows.QuickTime for .NET and COM Developers is the first guide to QuickTime for developers using popular RAD tools such a Visual Basic .NET, C#, and Visual Basic 6. A general introduction to QuickTime is followed by a detailed explanation of the QuickTime architecture from a.NET and COM perspective, liberally accompanied by code snippets. A number of implementation examples illustrate key QuickTime features, ranging from a simple movie player to a sophisticated interactive application. Also covered is QuickTime scripting in both QuickTime Player (using Windows Scripting) and in Microsoft Office applications (using VBA). Brief guides to developing with QuickTime in Delphi and ATL/WTL are also included.Part of the official Quicktime Developer Series, publishing the finest books on QuickTime in cooperation with Apple.
    • Multimedia Security Technologies for Digital Rights Management

      • 1st Edition
      • July 6, 2006
      • Wenjun Zeng + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 3 6 9 4 7 6 8
      • Paperback
        9 7 8 1 4 9 3 3 0 0 7 7 8
      • eBook
        9 7 8 0 0 8 0 4 6 3 8 9 6
      Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate protégés with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses. Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book.