Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • IPv6 Core Protocols Implementation

      • 1st Edition
      • October 12, 2006
      • Qing Li + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 4 4 7 7 5 1 3
      • eBook
        9 7 8 0 0 8 0 4 9 5 8 8 0
      IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago. This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges.
    • Network Intrusion Analysis

      • 1st Edition
      • April 6, 2006
      • Joe Fichera + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 6 2 0
      • eBook
        9 7 8 1 5 9 7 4 9 9 7 1 2
      Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response. Network Intrusion Analysis addresses the entire process of investigating a network intrusion by:*Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion.*Providing real-world examples of network intrusions, along with associated workarounds.*Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation.
    • Firewall Policies and VPN Configurations

      • 1st Edition
      • September 21, 2006
      • Syngress + 5 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 8 8 7
      • eBook
        9 7 8 0 0 8 0 5 0 6 5 1 7
      A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper’s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.
    • User Interface Design and Evaluation

      • 1st Edition
      • March 22, 2005
      • Debbie Stone + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 0 8 8 4 3 6 0
      • eBook
        9 7 8 0 0 8 0 5 2 0 3 2 2
      User Interface Design and Evaluation provides an overview of the user-centered design field. It illustrates the benefits of a user-centered approach to the design of software, computer systems, and websites. The book provides clear and practical discussions of requirements gathering, developing interaction design from user requirements, and user interface evaluation. The book's coverage includes established HCI topics—for example, visibility, affordance, feedback, metaphors, mental models, and the like—combined with practical guidelines for contemporary designs and current trends, which makes for a winning combination. It provides a clear presentation of ideas, illustrations of concepts, using real-world applications. This book will help readers develop all the skills necessary for iterative user-centered design, and provides a firm foundation for user interface design and evaluation on which to build. It is ideal for seasoned professionals in user interface design and usability engineering (looking for new tools with which to expand their knowledge); new people who enter the HCI field with no prior educational experience; and software developers, web application developers, and information appliance designers who need to know more about interaction design and evaluation.
    • The PIC Microcontroller: Your Personal Introductory Course

      • 3rd Edition
      • September 23, 2005
      • John Morton
      • English
      • Paperback
        9 7 8 0 7 5 0 6 6 6 6 4 0
      • eBook
        9 7 8 0 0 8 0 4 7 3 7 5 8
      John Morton offers a uniquely concise and practical guide to getting up and running with the PIC Microcontroller. The PIC is one of the most popular of the microcontrollers that are transforming electronic project work and product design, and this book is the ideal introduction for students, teachers, technicians and electronics enthusiasts. Assuming no prior knowledge of microcontrollers and introducing the PIC Microcontroller's capabilities through simple projects, this book is ideal for electronics hobbyists, students, school pupils and technicians. The step-by-step explanations and the useful projects make it ideal for student and pupil self-study: this is not just a reference book - you start work with the PIC microcontroller straight away. The revised third edition focuses entirely on the re-programmable flash PIC microcontrollers such as the PIC16F54, PIC16F84 and the extraordinary 8-pin PIC12F508 and PIC12F675 devices.
    • Distributed Systems Architecture

      • 1st Edition
      • November 16, 2005
      • Arno Puder + 2 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 3 6 0 1
      • Hardback
        9 7 8 1 5 5 8 6 0 6 4 8 7
      • eBook
        9 7 8 0 0 8 0 4 5 4 7 0 2
      Middleware is the bridge that connects distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, and programming languages. This book describes middleware from two different perspectives: from the viewpoint of the systems programmer and from the viewpoint of the applications programmer. It focuses on the use of open source solutions for creating middleware and the tools for developing distributed applications. The design principles presented are universal and apply to all middleware platforms, including CORBA and Web Services. The authors have created an open-source implementation of CORBA, called MICO, which is freely available on the web. MICO is one of the most successful of all open source projects and is widely used by demanding companies and institutions, and has also been adopted by many in the Linux community.
    • Advances in Computers

      • 1st Edition
      • Volume 63
      • April 19, 2005
      • Suyel Namasudra + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 9 2 9 5 6
      • Hardback
        9 7 8 0 1 2 0 1 2 1 6 3 2
      • eBook
        9 7 8 0 0 8 0 4 5 9 1 4 1
      The term computation gap has been defined as the difference between the computational power demanded by the application domain and the computational power of the underlying computer platform. Traditionally, closing the computation gap has been one of the major and fundamental tasks of computer architects. However, as technology advances and computers become more pervasive in the society, the domain of computer architecture has been extended. The scope of research in the computer architecture is no longer restricted to the computer hardware and organization issues. A wide spectrum of topics ranging from algorithm design to power management is becoming part of the computer architecture. Based on the aforementioned trend and to reflect recent research efforts, attempts were made to select a collection of articles that covers different aspects of contemporary computer architecture design. This volume of the Advances in Computers contains six chapters on different aspects of computer architecture. Key features: Wide range of research topics Coverage of new topics such as power management, Network on Chip, Load balancing in distributed systems, and pervasive computing Simple writing style
    • Intelligent Production Machines and Systems - First I*PROMS Virtual Conference

      • 1st Edition
      • December 9, 2005
      • Duc T. Pham
      • English
      • eBook
        9 7 8 0 0 8 0 4 6 2 5 1 6
      The 2005 Virtual International Conference on IPROMS took place on the Internet between 4 and 15 July 2005. IPROMS 2005 was an outstanding success. During the Conference, some 4168 registered delegates and guests from 71 countries participated in the Conference, making it a truly global phenomenon. This book contains the Proceedings of IPROMS 2005. The 107 peer-reviewed technical papers presented at the Conference have been grouped into twelve sections, the last three featuring contributions selected for IPROMS 2005 by Special Sessions chairmen: - Collaborative and Responsive Manufacturing Systems- Concurrent Engineering- E-manufacturing, E-business and Virtual Enterprises- Intelligent Automation Systems- Intelligent Decision Support Systems- Intelligent Design Systems- Intelligent Planning and Scheduling Systems- Mechatronics- Reconfigurable Manufacturing Systems- Tangible Acoustic Interfaces (Tai Chi)- Innovative Production Machines and Systems- Intelligent and Competitive Manufacturing Engineering
    • Encyclopedia of Language and Linguistics

      • 2nd Edition
      • November 24, 2005
      • Keith Brown
      • English
      • eBook
        9 7 8 0 0 8 0 5 4 7 8 4 8
      • eBook
        9 7 8 0 0 8 0 4 4 8 5 4 1
      The first edition of ELL (1993, Ron Asher, Editor) was hailed as "the field's standard reference work for a generation". Now the all-new second edition matches ELL's comprehensiveness and high quality, expanded for a new generation, while being the first encyclopedia to really exploit the multimedia potential of linguistics.* The most authoritative, up-to-date, comprehensive, and international reference source in its field* An entirely new work, with new editors, new authors, new topics and newly commissioned articles with a handful of classic articles* The first Encyclopedia to exploit the multimedia potential of linguistics through the online edition* Ground-breaking and International in scope and approach* Alphabetically arranged with extensive cross-referencing* Available in print and online, priced separately. The online version will include updates as subjects developELL2 includes:* c. 7,500,000 words* c. 11,000 pages* c. 3,000 articles* c. 1,500 figures: 130 halftones and 150 colour* Supplementary audio, video and text files online* c. 3,500 glossary definitions* c. 39,000 references* Extensive list of commonly used abbreviations * List of languages of the world (including information on no. of speakers, languagefamily, etc.)* Approximately 700 biographical entries (now includes contemporary linguists)* 200 language maps in print and onlineAlso available online via ScienceDirect – featuring extensive browsing, searching, and internal cross-referencing between articles in the work, plus dynamic linking to journal articles and abstract databases, making navigation flexible and easy. For more information, pricing options and availability visit www.info.sciencedire...
    • Programming Language Pragmatics

      • 2nd Edition
      • November 7, 2005
      • Michael Scott
      • English
      • eBook
        9 7 8 0 0 8 0 5 1 5 1 6 8
      The innovative approach of the first edition of Programming Language Pragmatics provided students with an integrated view of programming language design and implementation, while offering a solid teaching text on timely language topics in a rigorous yet accessible style. The new edition carries on these distinctive features as well as the signature tradition of illustrating the most recent developments in programming language design with a variety of modern programming languages.