Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • How to Cheat at IT Project Management

    • 1st Edition
    • Susan Snedaker
    • English
    This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it provides a unique approach to IT project management, combining strategic business concepts (project ROI, strategic alignment, etc.) with the very practical, step-by-step instructions for developing and managing a successful IT project. It’s short enough to be easily read and used but long enough to be comprehensive in the right places.
  • Why Programs Fail

    A Guide to Systematic Debugging
    • 1st Edition
    • Andreas Zeller
    • English
    Why Programs Fail is about bugs in computer programs, how to find them, how to reproduce them, and how to fix them in such a way that they do not occur anymore. This is the first comprehensive book on systematic debugging and covers a wide range of tools and techniques ranging from hands-on observation to fully automated diagnoses, and includes instructions for building automated debuggers. This discussion is built upon a solid theory of how failures occur, rather than relying on seat-of-the-pants techniques, which are of little help with large software systems or to those learning to program. The author, Andreas Zeller, is well known in the programming community for creating the GNU Data Display Debugger (DDD), a tool that visualizes the data structures of a program while it is running.
  • Handbook of Biosurveillance

    • 1st Edition
    • Michael M. Wagner + 2 more
    • English
    Provides a coherent and comprehensive account of the theory and practice of real-time human disease outbreak detection, explicitly recognizing the revolution in practices of infection control and public health surveillance.
  • Sarbanes-Oxley Compliance Using COBIT and Open Source Tools

    • 1st Edition
    • Christian B Lahti + 1 more
    • English
    This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the book clearly documents which Open Source tools you should consider using in the journey towards compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion.Each chapter begins with an analysis of the business and technical ramifications of Sarbanes-Oxley as regards to topics covered before moving into the detailed instructions on the use of the various Open Source applications and tools relating to the compliance objectives.
  • Reaction-Diffusion Computers

    • 1st Edition
    • Andrew Adamatzky + 2 more
    • English
    The book introduces a hot topic of novel and emerging computing paradigms and architectures -computation by travelling waves in reaction-diffusion media. A reaction-diffusion computer is a massively parallel computing device, where the micro-volumes of the chemical medium act as elementary few-bit processors, and chemical species diffuse and react in parallel. In the reaction-diffusion computer both the data and the results of the computation are encoded as concentration profiles of the reagents, or local disturbances of concentrations, whilst the computation per se is performed via the spreading and interaction of waves caused by the local disturbances. The monograph brings together results of a decade-long study into designing experimental and simulated prototypes of reaction-diffusion computing devices for image processing, path planning, robot navigation, computational geometry, logics and artificial intelligence. The book is unique because it gives a comprehensive presentation of the theoretical and experimental foundations, and cutting-edge computation techniques, chemical laboratory experimental setups and hardware implementation technology employed in the development of novel nature-inspired computing devices.Key Features:- Non-classical and fresh approach to theory of computation.- In depth exploration of novel and emerging paradigms of nature-inspired computing.- Simple to understand cellular-automata models will help readers/students to design their own computational experiments to advance ideas and concepts described in the book .- Detailed description of receipts and experimental setups of chemical laboratory reaction-diffusion processors will make the book an invaluable resource in practical studies of non-classical and nature-inspired computing architectures .- Step by step explanations of VLSI reaction-diffusion circuits will help students to design their own types of wave-based processors.
  • Skype Me! From Single User to Small Enterprise and Beyond

    • 1st Edition
    • Markus Daehne
    • English
    This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new “Skype Ready” cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.
  • The PIC Microcontroller: Your Personal Introductory Course

    • 3rd Edition
    • John Morton
    • English
    John Morton offers a uniquely concise and practical guide to getting up and running with the PIC Microcontroller. The PIC is one of the most popular of the microcontrollers that are transforming electronic project work and product design, and this book is the ideal introduction for students, teachers, technicians and electronics enthusiasts. Assuming no prior knowledge of microcontrollers and introducing the PIC Microcontroller's capabilities through simple projects, this book is ideal for electronics hobbyists, students, school pupils and technicians. The step-by-step explanations and the useful projects make it ideal for student and pupil self-study: this is not just a reference book - you start work with the PIC microcontroller straight away. The revised third edition focuses entirely on the re-programmable flash PIC microcontrollers such as the PIC16F54, PIC16F84 and the extraordinary 8-pin PIC12F508 and PIC12F675 devices.
  • Business Continuity and Disaster Recovery for InfoSec Managers

    • 1st Edition
    • John Rittinghouse PhD CISM + 1 more
    • English
    Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
  • Understanding Mobile Human-Computer Interaction

    • 1st Edition
    • Steve Love
    • English
    Taking a psychological perspective, this book examines the role of Human-Computer Interaction in the field of Information Systems research. The introductory section of the book covers the basic tenets of the HCI discipline, including how it developed and an overview of the various academic disciplines that contribute to HCI research. The second part of the book focuses on the application of HCI to Information Systems research, and reviews ways in which HCI techniques, methodologies and other research components have been used to date in the IS field. The third section of the book looks at the research areas where HCI has not yet been fully exploited in relation to IS, such as broadening user groups and user acceptance of technology. The final section of the book comprises of a set of guidelines for students to follow when undertaking an HCI based research project.
  • Embedded Media Processing

    • 1st Edition
    • David J. Katz + 1 more
    • English
    A key technology enabling fast-paced embedded media processing developments is the high-performance, low-power, small-footprint convergent processor, a specialized device that combines the real-time control of a traditional microcontroller with the signal processing power of a DSP. This practical guide is your one-stop shop for understanding how to implement this cutting-edge technology.You will learn how to: Choose the proper processor for an application. Architect your system to avoid problems at the outset. Manage your data flows and memory accesses so that they line up properly Make smart-trade-offs in portable applications between power considerations and computational performance. Divide processing tasks across multiple cores. Program frameworks that optimize performance without needlessly increasing programming model complexity. Implement benchmarking techniques that will help you adapt a framework to best fit a target application, and much more! Covering the entire spectrum of EMP-related design issues, from easy-to-understand explanations of basic architecture and direct memory access (DMA), to in-depth discussions of code optimization and power management, this practical book will be an invaluable aid to every engineer working with EMP, from the beginner to the seasoned expert.