Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Data Mining and Predictive Analysis

      • 1st Edition
      • September 15, 2006
      • Colleen McCue
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 7 9 6 7
      • eBook
        9 7 8 0 0 8 0 4 6 4 6 2 6
      It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community hot-spots, and refined resource deployment decisions. In this book Dr. McCue describes her use of "off the shelf" software to graphically depict crime trends and to predict where future crimes are likely to occur. Armed with this data, law enforcement executives can develop "risk-based deployment strategies," that allow them to make informed and cost-efficient staffing decisions based on the likelihood of specific criminal activity.Knowledge of advanced statistics is not a prerequisite for using Data Mining and Predictive Analysis. The book is a starting point for those thinking about using data mining in a law enforcement setting. It provides terminology, concepts, practical application of these concepts, and examples to highlight specific techniques and approaches in crime and intelligence analysis, which law enforcement and intelligence professionals can tailor to their own unique situation and responsibilities.
    • Scripting VMware Power Tools: Automating Virtual Infrastructure Administration

      • 1st Edition
      • November 7, 2006
      • Al Muller
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 5 9 7
      • eBook
        9 7 8 0 0 8 0 5 1 6 7 7 6
      This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting API’s and how they can be leveraged to provide some very useful, practical and time saving tools to manage a virtual infrastructure. From virtual server provisioning to backups and everything in between, this book is a one stop shop for virtual tools.
    • Joe Celko's SQL Puzzles and Answers

      • 2nd Edition
      • September 21, 2006
      • Joe Celko
      • English
      • Paperback
        9 7 8 0 1 2 3 7 3 5 9 6 6
      • eBook
        9 7 8 0 0 8 0 4 9 1 6 8 4
      Joe Celko's SQL Puzzles and Answers, Second Edition, challenges you with his trickiest puzzles and then helps solve them with a variety of solutions and explanations. Author Joe Celko demonstrates the thought processes that are involved in attacking a problem from an SQL perspective to help advanced database programmers solve the puzzles you frequently face. These techniques not only help with the puzzle at hand, but also help develop the mindset needed to solve the many difficult SQL puzzles you face every day. This updated edition features many new puzzles; dozens of new solutions to puzzles; and new chapters on temporal query puzzles and common misconceptions about SQL and RDBMS that leads to problems. This book is recommended for database programmers with a good knowledge of SQL.
    • Joe Grand's Best of Hardware, Wireless, and Game Console Hacking

      • 1st Edition
      • August 18, 2006
      • Joe Grand + 9 more
      • English
      • eBook
        9 7 8 0 0 8 0 5 0 9 6 6 2
      The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more.The presentation of these 20 projects on DVD media provides users with benefits and options not available on the printed page. All images are hi-res color that can be enlarged or printed, the text is easily searched, and the user can copy the contents to their hard disk and add comments directly into the PDF files. The DVD media also lends itself well to group projects (it includes a 10 user license).The 160-page book includes chapters on hacking tools and electrical engineering basics, along with chapters on the background, design and functionality of each hardware device.
    • Fuzzy Logic and the Semantic Web

      • 1st Edition
      • Volume 1
      • February 20, 2006
      • Elie Sanchez
      • English
      • Hardback
        9 7 8 0 4 4 4 5 1 9 4 8 1
      • Paperback
        9 7 8 0 4 4 4 5 5 0 4 9 1
      • eBook
        9 7 8 0 0 8 0 4 6 0 4 8 2
      These are exciting times in the fields of Fuzzy Logic and the Semantic Web, and this book will add to the excitement, as it is the first volume to focus on the growing connections between these two fields. This book is expected to be a valuable aid to anyone considering the application of Fuzzy Logic to the Semantic Web, because it contains a number of detailed accounts of these combined fields, written by leading authors in several countries. The Fuzzy Logic field has been maturing for forty years. These years have witnessed a tremendous growth in the number and variety of applications, with a real-world impact across a wide variety of domains with humanlike behavior and reasoning. And we believe that in the coming years, the Semantic Web will be major field of applications of Fuzzy Logic. This book, the first in the new series Capturing Intelligence, shows the positive role Fuzzy Logic, and more generally Soft Computing, can play in the development of the Semantic Web, filling a gap and facing a new challenge. It covers concepts, tools, techniques and applications exhibiting the usefulness, and the necessity, for using Fuzzy Logic in the Semantic Web. It finally opens the road to new systems with a high Web IQ. Most of today's Web content is suitable for human consumption. The Semantic Web is presented as an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. For example, within the Semantic Web, computers will understand the meaning of semantic data on a web page by following links to specified ontologies. But while the Semantic Web vision and research attracts attention, as long as it will be used two-valued-based logical methods no progress will be expected in handling ill-structured, uncertain or imprecise information encountered in real world knowledge. Fuzzy Logic and associated concepts and techniques (more generally, Soft Computing), has certainly a positive role to play in the development of the Semantic Web. Fuzzy Logic will not supposed to be the basis for the Semantic Web but its related concepts and techniques will certainly reinforce the systems classically developed within W3C. In fact, Fuzzy Logic cannot be ignored in order to bridge the gap between human-understandable soft logic and machine-readable hard logic. None of the usual logical requirements can be guaranteed: there is no centrally defined format for data, no guarantee of truth for assertions made, no guarantee of consistency. To support these arguments, this book shows how components of the Semantic Web (like XML, RDF, Description Logics, Conceptual Graphs, Ontologies) can be covered, with in each case a Fuzzy Logic focus.
    • Oracle 10g Developing Media Rich Applications

      • 1st Edition
      • November 21, 2006
      • Lynne Dunckley + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 3 1 6
      • eBook
        9 7 8 0 0 8 0 4 9 2 0 1 8
      Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997, Oracle became the first commercial database with integrated multimedia technology for application developers. Since that time, Oracle has enhanced and extended these features to include native support for image, audio, video and streaming media storage; indexing, retrieval and processing in the Oracle Database, Application Server; and development tools. Databases are not only words and numbers for accountants, but they also should utilize a full range of media to satisfy customer needs, from race car engineers, to manufacturing processes to security. The full range of audio, video and integration of media into databases is mission critical to these applications. This book details the most recent features in Oracle’s multimedia technology including those of the Oracle10gR2 Database and the Oracle9i Application Server. The technology covered includes: object relational media storage and services within the database, middle tier application development interfaces, wireless delivery mechanisms, and Java-based tools.
    • Oracle Performance Tuning for 10gR2

      • 2nd Edition
      • September 15, 2006
      • Gavin JT Powell
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 5 3
      • eBook
        9 7 8 0 0 8 0 4 9 2 0 2 5
      Tuning of SQL code is generally cheaper than changing the data model. Physical and configuration tuning involves a search for bottlenecks that often points to SQL code or data model issues. Building an appropriate data model and writing properly performing SQL code can give 100%+ performance improvement. Physical and configuration tuning often gives at most a 25% performance increase. Gavin Powell shows that the central theme of Oracle10gR2 Performance Tuning is four-fold: denormalize data models to fit applications; tune SQL code according to both the data model and the application in relation to scalability; create a well-proportioned physical architecture at the time of initial Oracle installation; and most important, mix skill sets to obtain the best results.
    • How to Cheat at Managing Information Security

      • 1st Edition
      • August 22, 2006
      • Mark Osborne
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 1 0 5
      • eBook
        9 7 8 0 0 8 0 5 0 8 2 8 3
      This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non – technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: • Design the organization chart of his new security organization • Design and implement policies and strategies • Navigate his way through jargon filled meetings • Understand the design flaws of his E-commerce and DMZ infrastructure
    • Practical Model-Based Testing

      • 1st Edition
      • November 27, 2006
      • Mark Utting + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 2 5 0 1 1
      • Paperback
        9 7 8 1 4 9 3 3 0 0 9 1 4
      • eBook
        9 7 8 0 0 8 0 4 6 6 4 8 4
      Practical Model-Based Testing gives a practical introduction to model-based testing, showing how to write models for testing purposes and how to use model-based testing tools to generate test suites. It is aimed at testers and software developers who wish to use model-based testing, rather than at tool-developers or academics. The book focuses on the mainstream practice of functional black-box testing and covers different styles of models, especially transition-based models (UML state machines) and pre/post models (UML/OCL specifications and B notation). The steps of applying model-based testing are demonstrated on examples and case studies from a variety of software domains, including embedded software and information systems. From this book you will learn: The basic principles and terminology of model-based testing How model-based testing differs from other testing processes How model-based testing fits into typical software lifecycles such as agile methods and the Unified Process The benefits and limitations of model-based testing, its cost effectiveness and how it can reduce time-to-market A step-by-step process for applying model-based testing How to write good models for model-based testing How to use a variety of test selection criteria to control the tests that are generated from your models How model-based testing can connect to existing automated test execution platforms such as Mercury Test Director, Java JUnit, and proprietary test execution environments
    • Traffic Engineering and QoS Optimization of Integrated Voice and Data Networks

      • 1st Edition
      • October 17, 2006
      • Gerald R. Ash
      • English
      • Hardback
        9 7 8 0 1 2 3 7 0 6 2 5 6
      • eBook
        9 7 8 0 0 8 0 4 6 6 0 5 7
      This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement, modeling, characterization, and control of network traffic, and the application of techniques to achieve specific performance objectives. The scope of the analysis and recommendations include dimensioning, call/flow and connection routing, QoS resource management, routing table management, dynamic transport routing, and operational requirements. Case studies are included which provide the reader with a concrete way into the technical details and highlight why and how to use the techniques described in the book.