Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Commonsense Reasoning

      • 1st Edition
      • January 19, 2006
      • Erik T. Mueller
      • English
      • Hardback
        9 7 8 0 1 2 3 6 9 3 8 8 4
      • eBook
        9 7 8 0 0 8 0 4 7 6 6 1 2
      To endow computers with common sense is one of the major long-term goals of Artificial Intelligence research. One approach to this problem is to formalize commonsense reasoning using mathematical logic. Commonsense Reasoning is a detailed, high-level reference on logic-based commonsense reasoning. It uses the event calculus, a highly powerful and usable tool for commonsense reasoning, which Erik T. Mueller demonstrates as the most effective tool for the broadest range of applications. He provides an up-to-date work promoting the use of the event calculus for commonsense reasoning, and bringing into one place information scattered across many books and papers. Mueller shares the knowledge gained in using the event calculus and extends the literature with detailed event calculus solutions to problems that span many areas of the commonsense world.
    • QuickTime for .NET and COM Developers

      • 1st Edition
      • January 17, 2006
      • John Cromie
      • English
      • Paperback
        9 7 8 0 1 2 7 7 4 5 7 5 6
      • eBook
        9 7 8 0 0 8 0 4 5 4 7 2 6
      At the heart of Apple's hugely popular iLife software suite—iMovie, iPhoto, iDVD, GarageBand, and iTunes—is QuickTime, the powerful media engine that drives elegant applications for managing movies, images, and audio files. The enduring success of QuickTime is in no small part attributable to its component architecture. This key feature has allowed it to embrace emerging digital media technologies and standards one by one as they have appeared over the 12 or so years since its launch. None of the competing technologies even comes close, let alone on both Mac OS X and Windows.QuickTime for .NET and COM Developers is the first guide to QuickTime for developers using popular RAD tools such a Visual Basic .NET, C#, and Visual Basic 6. A general introduction to QuickTime is followed by a detailed explanation of the QuickTime architecture from a.NET and COM perspective, liberally accompanied by code snippets. A number of implementation examples illustrate key QuickTime features, ranging from a simple movie player to a sophisticated interactive application. Also covered is QuickTime scripting in both QuickTime Player (using Windows Scripting) and in Microsoft Office applications (using VBA). Brief guides to developing with QuickTime in Delphi and ATL/WTL are also included.Part of the official Quicktime Developer Series, publishing the finest books on QuickTime in cooperation with Apple.
    • Writing Security Tools and Exploits

      • 1st Edition
      • January 5, 2006
      • James C Foster
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 7 2
      • eBook
        9 7 8 0 0 8 0 4 9 3 1 3 8
      Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
    • Face Processing: Advanced Modeling and Methods

      • 1st Edition
      • December 28, 2005
      • Wenyi Zhao + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 8 8 4 4
      Major strides have been made in face processing in the last ten years due to the fast growing need for security in various locations around the globe. A human eye can discern the details of a specific face with relative ease. It is this level of detail that researchers are striving to create with ever evolving computer technologies that will become our perfect mechanical eyes. The difficulty that confronts researchers stems from turning a 3D object into a 2D image. That subject is covered in depth from several different perspectives in this volume. Face Processing: Advanced Modeling and Methods begins with a comprehensive introductory chapter for those who are new to the field. A compendium of articles follows that is divided into three sections. The first covers basic aspects of face processing from human to computer. The second deals with face modeling from computational and physiological points of view. The third tackles the advanced methods, which include illumination, pose, expression, and more. Editors Zhao and Chellappa have compiled a concise and necessary text for industrial research scientists, students, and professionals working in the area of image and signal processing.
    • GMPLS

      • 1st Edition
      • December 20, 2005
      • Adrian Farrel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 0 8 8 4 2 2 3
      • eBook
        9 7 8 0 0 8 0 4 5 6 4 7 8
      The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. GMPLS: Architecture and Applications brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively. This book begins by defining GMPLS’s place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers.
    • Smart Phone and Next Generation Mobile Computing

      • 1st Edition
      • December 16, 2005
      • Pei Zheng + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 0 8 8 5 6 0 2
      • eBook
        9 7 8 0 0 8 0 4 5 8 3 4 2
      This in-depth technical guide is an essential resource for anyone involved in the development of “smart” mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. Smart Phone and Next-Generation Mobile Computing shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you’re a manager, engineer, designer, or entrepreneur.
    • Globus® Toolkit 4

      • 1st Edition
      • December 16, 2005
      • Borja Sotomayor + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 6 9 4 0 4 1
      • eBook
        9 7 8 0 0 8 0 4 6 0 0 3 1
      The Globus Toolkit is a key technology in Grid Computing, the exciting new computing paradigm that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. Globus Toolkit 4: Programming Java Services provides an introduction to the latest version of this widely acclaimed toolkit. Based on the popular web-based The Globus Toolkit 4 Programmer's Tutorial, this book far surpasses that document, providing greater detail, quick reference appendices, and many additional examples. If you’re making the leap into Grid Computing using the Globus Toolkit, you’ll want Globus Toolkit 4: Programming Java Services at your side as you take your first steps.
    • An Introduction to Programming with IDL

      • 1st Edition
      • December 14, 2005
      • Kenneth P. Bowman
      • English
      • Paperback
        9 7 8 0 1 2 0 8 8 5 5 9 6
      • eBook
        9 7 8 0 0 8 0 4 8 9 2 7 8
      In today’s information age, scientists and engineers must quickly and efficiently analyze extremely large sets of data. One of the best tools to accomplish this is Interactive Data Language (IDL®), a programming and visualization environment that facilitates numerical modeling, data analysis, and image processing. IDL’s high-level language and powerful graphics capabilities allow users to write more flexible programs much faster than is possible with other programming languages. An Introduction to Programming with IDL enables students new to programming, as well as those with experience in other programming languages, to rapidly harness IDL’s capabilities: fast, interactive performance; array syntax; dynamic data typing; and built-in graphics. Each concept is illustrated with sample code, including many complete short programs.
    • Programming with Quartz

      • 1st Edition
      • December 14, 2005
      • David Gelphman + 2 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 5 9 6 3 9
      Written by members of the development team at Apple, Programming with Quartz is the first book to describe the sophisticated graphics system of Mac OS X. By using the methods described in this book, developers will be able to fully exploit the state-of-the-art graphics capabilities of Mac OS X in their applications, whether for Cocoa or Carbon development. This book also serves as an introduction to 2D graphics concepts, including how images are drawn and how color is rendered. It includes guidance for working with PDF documents, drawing bitmap graphics, using Quartz built-in color management, and drawing text. Programming with Quartz is a rich resource for new and experienced Mac OS X developers, Cocoa and Carbon programmers, UNIX developers who are migrating to Mac OS X, and anyone interested in powerful 2D graphics systems.
    • How to Cheat at Managing Windows Server Update Services

      • 1st Edition
      • Volume 1
      • December 12, 2005
      • B. Barber
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 2 7 6
      • eBook
        9 7 8 0 0 8 0 4 8 8 9 8 1
      Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft’s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.