Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Configuring Microsoft Outlook 2003

      • 1st Edition
      • August 26, 2005
      • Sue Mosher + 3 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 2 6 2
      • eBook
        9 7 8 0 0 8 0 4 5 6 4 6 1
      One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user’s profile folders, and in the information store itself. Configuring Microsoft® Outlook 2003 pulls together in one volume the information that administrators in organizations of all sizes need to understand, deploy, and manage settings for Microsoft Outlook 2003. It covers configuration issues for environments where Microsoft Exchange is the mail server and also for those using IMAP4 or POP3. The book gives special attention to security issues, including recommended configuration of Outlook’s built-in security features and methods for locking down Outlook with Group Policy Objects and other techniques.
    • Advances in Computers

      • 1st Edition
      • Volume 64
      • May 11, 2005
      • Marvin Zelkowitz
      • English
      • Hardback
        9 7 8 0 1 2 0 1 2 1 6 4 9
      • Paperback
        9 7 8 0 1 2 3 9 9 2 9 2 5
      • eBook
        9 7 8 0 0 8 0 4 5 9 5 8 5
      Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computer science, with many citations and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes the role of the internet, the world wide web and other aspects of a distributed computing environment. Open source development as well as computing for the handicapped are additional important topics. Key Features: In-depth surveys and tutorials on new computer technology Well-known authors are researchers in the field Extensive bibliographies with most chapters Important chapters on new technologies for software development: open source development and the technology needed to use the web for electronic commerce
    • Advances in Computers

      • 1st Edition
      • Volume 65
      • July 12, 2005
      • Marvin Zelkowitz
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 3 3 4 3
      • eBook
        9 7 8 0 0 8 0 4 5 9 6 7 7
      This present volume describes some of the latest advances in the computer science field today. This current volume emphasizes information processing with chapters on artificial intelligence, data bases and software engineering. In particular it looks at the interfaces between AI and software development with chapters on how AI affects the development of correct programs, and conversely, how software engineering can affect the development of correct AI programs.Key Features:* In-depth surveys and tutorials on new computer technology.* Well-known authors and researchers in the field.* Extensive bibliographies with most chapters.* Impact of AI on software development and impact of software development on correct AI programs.* What is the educational role of mathematics in the development of the next generation of computer professional?
    • Comprehensive Functional Verification

      • 1st Edition
      • May 26, 2005
      • Bruce Wile + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 7 5 1 8 0 3 9
      • eBook
        9 7 8 0 0 8 0 4 7 6 6 4 3
      One of the biggest challenges in chip and system design is determining whether the hardware works correctly. That is the job of functional verification engineers and they are the audience for this comprehensive text from three top industry professionals.As designs increase in complexity, so has the value of verification engineers within the hardware design team. In fact, the need for skilled verification engineers has grown dramatically--functi... verification now consumes between 40 and 70% of a project's labor, and about half its cost. Currently there are very few books on verification for engineers, and none that cover the subject as comprehensively as this text. A key strength of this book is that it describes the entire verification cycle and details each stage. The organization of the book follows the cycle, demonstrating how functional verification engages all aspects of the overall design effort and how individual cycle stages relate to the larger design process. Throughout the text, the authors leverage their 35 plus years experience in functional verification, providing examples and case studies, and focusing on the skills, methods, and tools needed to complete each verification task.
    • Data Mining

      • 2nd Edition
      • June 8, 2005
      • Ian H. Witten + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 7 0 2 2
      Data Mining, Second Edition, describes data mining techniques and shows how they work. The book is a major revision of the first edition that appeared in 1999. While the basic core remains the same, it has been updated to reflect the changes that have taken place over five years, and now has nearly double the references. The highlights of this new edition include thirty new technique sections; an enhanced Weka machine learning workbench, which now features an interactive interface; comprehensive information on neural networks; a new section on Bayesian networks; and much more. This text is designed for information systems practitioners, programmers, consultants, developers, information technology managers, specification writers as well as professors and students of graduate-level data mining and machine learning courses.
    • Content Networking

      • 1st Edition
      • February 15, 2005
      • Markus Hofmann + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 3 6 9 4
      • Hardback
        9 7 8 1 5 5 8 6 0 8 3 4 4
      • eBook
        9 7 8 0 0 8 0 4 9 0 7 7 9
      As the Internet has grown, so have the challenges associated with delivering static, streaming, and dynamic content to end-users. This book is unique in that it addresses the topic of content networking exclusively and comprehensively, tracing the evolution from traditional web caching to today's open and vastly more flexible architecture. With this evolutionary approach, the authors emphasize the field's most persistent concepts, principles, and mechanisms--the core information that will help you understand why and how content delivery works today, and apply that knowledge in the future.
    • Higher-Order Perl

      • 1st Edition
      • March 14, 2005
      • Mark Jason Dominus
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 7 0 1 9
      • eBook
        9 7 8 0 0 8 0 4 7 8 3 4 0
      Most Perl programmers were originally trained as C and Unix programmers, so the Perl programs that they write bear a strong resemblance to C programs. However, Perl incorporates many features that have their roots in other languages such as Lisp. These advanced features are not well understood and are rarely used by most Perl programmers, but they are very powerful. They can automate tasks in everyday programming that are difficult to solve in any other way. One of the most powerful of these techniques is writing functions that manufacture or modify other functions. For example, instead of writing ten similar functions, a programmer can write a general pattern or framework that can then create the functions as needed according to the pattern. For several years Mark Jason Dominus has worked to apply functional programming techniques to Perl. Now Mark brings these flexible programming methods that he has successfully taught in numerous tutorials and training sessions to a wider audience.
    • Virtual Machines

      • 1st Edition
      • June 3, 2005
      • Jim Smith + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 3 7 6 2
      • Hardback
        9 7 8 1 5 5 8 6 0 9 1 0 5
      • eBook
        9 7 8 0 0 8 0 5 2 5 4 0 2
      Virtual Machine technology applies the concept of virtualization to an entire machine, circumventing real machine compatibility constraints and hardware resource constraints to enable a higher degree of software portability and flexibility. Virtual machines are rapidly becoming an essential element in computer system design. They provide system security, flexibility, cross-platform compatibility, reliability, and resource efficiency. Designed to solve problems in combining and using major computer system components, virtual machine technologies play a key role in many disciplines, including operating systems, programming languages, and computer architecture. For example, at the process level, virtualizing technologies support dynamic program translation and platform-independent network computing. At the system level, they support multiple operating system environments on the same hardware platform and in servers.Historically... individual virtual machine techniques have been developed within the specific disciplines that employ them (in some cases they aren’t even referred to as “virtual machines”), making it difficult to see their common underlying relationships in a cohesive way. In this text, Smith and Nair take a new approach by examining virtual machines as a unified discipline. Pulling together cross-cutting technologies allows virtual machine implementations to be studied and engineered in a well-structured manner. Topics include instruction set emulation, dynamic program translation and optimization, high level virtual machines (including Java and CLI), and system virtual machines for both single-user systems and servers.
    • Programming the PIC Microcontroller with MBASIC

      • 1st Edition
      • June 14, 2005
      • Jack Smith
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 9 4 6 6
      • eBook
        9 7 8 0 0 8 0 4 6 0 7 4 1
      The Microchip PIC family of microcontrollers is the most popular series of microcontrollers in the world. However, no microcontroller is of any use without software to make it perform useful functions. This comprehensive reference focuses on designing with Microchip’s mid-range PIC line using MBASIC, a powerful but easy to learn programming language. It illustrates MBASIC’s abilities through a series of design examples, beginning with simple PIC-based projects and proceeding through more advanced designs. Unlike other references however, it also covers essential hardware and software design fundamentals of the PIC microcontroller series, including programming in assembly language when needed to supplement the capabilities of MBASIC. Details of hardware/software interfacing to the PIC are also provided.BENEFIT TO THE READER: This book provides one of the most thorough introductions available to the world’s most popular microcontroller, with numerous hardware and software working design examples which engineers, students and hobbyists can directly apply to their design work and studies. Using MBASIC, it is possible to develop working programs for the PIC in a much shorter time frame than when using assembly language.
    • Why Programs Fail

      • 1st Edition
      • October 11, 2005
      • Andreas Zeller
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 1 7 3 9
      Why Programs Fail is about bugs in computer programs, how to find them, how to reproduce them, and how to fix them in such a way that they do not occur anymore. This is the first comprehensive book on systematic debugging and covers a wide range of tools and techniques ranging from hands-on observation to fully automated diagnoses, and includes instructions for building automated debuggers. This discussion is built upon a solid theory of how failures occur, rather than relying on seat-of-the-pants techniques, which are of little help with large software systems or to those learning to program. The author, Andreas Zeller, is well known in the programming community for creating the GNU Data Display Debugger (DDD), a tool that visualizes the data structures of a program while it is running.