Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Database Modeling and Design

    Logical Design
    • 4th Edition
    • Toby J. Teorey + 3 more
    • English
    Database Modeling and Design, Fourth Edition, the extensively revised edition of the classic logical database design reference, explains how you can model and design your database application in consideration of new technology or new business needs. It is an ideal text for a stand-alone data management course focused on logical database design, or a supplement to an introductory text for introductory database management. This book features clear explanations, lots of terrific examples and an illustrative case, and practical advice, with design rules that are applicable to any SQL-based system. The common examples are based on real-life experiences and have been thoroughly class-tested. The text takes a detailed look at the Unified Modeling Language (UML-2) as well as the entity-relationship (ER) approach for data requirements specification and conceptual modeling - complemented with examples for both approaches. It also discusses the use of data modeling concepts in logical database design; the transformation of the conceptual model to the relational model and to SQL syntax; the fundamentals of database normalization through the fifth normal form; and the major issues in business intelligence such as data warehousing, OLAP for decision support systems, and data mining. There are examples for how to use the most popular CASE tools to handle complex data modeling problems, along with exercises that test understanding of all material, plus solutions for many exercises. Lecture notes and a solutions manual are also available. This edition will appeal to professional data modelers and database design professionals, including database application designers, and database administrators (DBAs); new/novice data management professionals, such as those working on object oriented database design; and students in second courses in database focusing on design.
  • Oracle Data Warehouse Tuning for 10g

    • 1st Edition
    • Gavin JT Powell
    • English
    “This book should satisfy those who want a different perspective than the official Oracle documentation. It will cover all important aspects of a data warehouse while giving the necessary examples to make the reading a lively experience.” - Tim Donar, Author and Systems Architect for Enterprise Data WarehousesTuning a data warehouse database focuses on large transactions, mostly requiring what is known as throughput. Throughput is the passing of large amounts of information through a server, network and Internet environment, backwards and forwards, constantly! The ultimate objective of a data warehouse is the production of meaningful and useful reporting, from historical and archived data. The trick is to make the reports print within an acceptable time frame.A data model contains tables and relationships between tables. Tuning a data model involves Normalization and Denormalization. Different approaches are required depending on the application, such as OLTP or a Data Warehouse. Inappropriate database design can make SQL code impossible to tune. Poor data modeling can have a most profound effect on database performance since all SQL code is constructed from the data model.
  • Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers

    • 1st Edition
    • Fred Eady
    • English
    Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New applications are emerging every day, with wireless capability being embedded in everything from electric meters to hospital patient tracking systems to security devices. This practical reference guides readers through the wireless technology forest, giving them the knowledge, the hardware and the software necessary to design a wireless embedded device rapidly, inexpensively, and effectively. Using off-the-shelf microcontrollers from Microchip and Atmel, the author provides step-by-step instructions for designing the hardware and firmware for a fully operational wireless networking device. The book gives a thorough introduction to 802.11 technology and puts it into perspective against the other wireless standard options. Just enough theory and mathematics is provided to give the depth of understanding needed for practical design work. The book thoroughly covers: * Laptop wireless Ethernet card introduction and theory *Introduction to CompactFlash-to-micr... interfacing* Implementing the laptop wireless Ethernet card in an embedded environment
  • Embedded Software

    The Works
    • 1st Edition
    • Colin Walls
    • English
    Embedded software needs have grown exponentially over the past quarter century. In 1975 writing 10,000 lines of assembly code was a considered a huge undertaking. Today, a cell phone can contain five million lines of C or C++! Embedded software developers must have a strong grasp of many complex topics in order to make faster, more efficient and more powerful microprocessors to meet the public’s growing demand. This practical guide, written by industry pioneer Colin Walls, helps embedded design engineers to rise to that challenge. The author offers expertise and insights from his quarter century of design experience, covering a plethora of major concerns in an easy-to-reference essay format that provides the reader with detailed tips and techniques, and rigorous explanations of technologies. Contributions from other well-known designers in the embedded systems field offer additional seasoned perspectives on everything from exotic memories to USB software. This one book has an amazing breadth of coverage, undertaking all the key subjects embedded engineers need to understand in order to succeed, including Design and Development, Programming, Languages including C/C++, and UML, Real Time Operating Systems Considerations, Networking, Programmable Logic and much more. For those in the field who are looking to broaden their professional skill-sets in order to advance, as well as those "newbies" just entering the field of embedded systems design, this comprehensive new reference is a must-have!The accompanying CD-ROM contains source code for the many real-world examples in the text, to save readers from needless re-typing. Also included are PowerPoint slides to create training seminars or classes from the text, and various product-related spec sheets.
  • Grid Computing

    The Savvy Manager's Guide
    • 1st Edition
    • Pawel Plaszczak + 1 more
    • English
    A decade ago, the corporate world viewed grid computing as a curiosity. Today, it views it as an opportunity--a chance to reduce costs, improve performance, fund new projects, and take advantage of under-utilized capacity. The engineering behind this transformation has been amply documented. Until now, however, little has been written to prepare managers, executives, and other decision-makers to implement grid computing in a sensible and effective way.Grid Computing: The Savvy Manager's Guide examines the technology from a rigorous business perspective, equipping you with the practical knowledge you need to assess your options and determine what grid computing approach is right for your enterprise. This book is heavy on real-world experience, distilling from a rich assortment of case studies the best practices currently at work in a variety of industries. Always attentive to grid computing’s many competitive advantages, it is also realistic about the challenges of selling the idea to staff and making it a part of your company’s culture.
  • Configuring Microsoft Outlook 2003

    • 1st Edition
    • Sue Mosher + 3 more
    • English
    One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user’s profile folders, and in the information store itself. Configuring Microsoft® Outlook 2003 pulls together in one volume the information that administrators in organizations of all sizes need to understand, deploy, and manage settings for Microsoft Outlook 2003. It covers configuration issues for environments where Microsoft Exchange is the mail server and also for those using IMAP4 or POP3. The book gives special attention to security issues, including recommended configuration of Outlook’s built-in security features and methods for locking down Outlook with Group Policy Objects and other techniques.
  • Complete Maya Programming Volume II

    An In-depth Guide to 3D Fundamentals, Geometry, and Modeling
    • 1st Edition
    • Volume 2
    • David Gould
    • English
    David Gould's acclaimed first book, Complete Maya Programming: An Extensive Guide to MEL and the C++ API, provides artists and programmers with a deep understanding of the way Maya works and how it can be enhanced and customized through programming. In his new book David offers a gentle, intuitive introduction to the core ideas of computer graphics. Each concept is explained progressively and is fully implemented in both MEL and C++ so that an artist or programmer can use the source code directly in their own programs. Geometry and modeling are covered in detail with progressively more complex examples demonstrating all of Maya's possible programming features. David Gould's first volume is widely regarded as the most authoritative reference on Maya programming. Volume II continues this tradition and provides an unmatched guide for the artist and programmer tackling complex tasks.
  • SQL

    Practical Guide for Developers
    • 1st Edition
    • Michael J. Donahoo + 1 more
    • English
    SQL is a solid guide and reference to the key elements of SQL and how to use it effectively. Developed by authors who needed a good resource for students in their database class, this is an ideal supplement for database courses — no matter what main text you use or what flavor of SQL is required. It features a short and inexpensive introduction to SQL for students who have some programming experience and need to learn the main features of SQL; and suggested shortcuts for learning and practice, depending on the experience of the user. This book is recommended for novice developers, programmers, and database administrators as well as students in database courses, business courses, and IT-related courses.
  • Nessus, Snort, and Ethereal Power Tools

    Customizing Open Source Security Applications
    • 1st Edition
    • Brian Caswell + 3 more
    • English
    Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.
  • Penetration Tester's Open Source Toolkit

    • 1st Edition
    • Jeremy Faircloth + 5 more
    • English
    Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader “inside their heads” to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing.