Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • How to Cheat at Managing Windows Server Update Services

      • 1st Edition
      • Volume 1
      • December 12, 2005
      • B. Barber
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 2 7 6
      • eBook
        9 7 8 0 0 8 0 4 8 8 9 8 1
      Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft’s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
    • Innovation Happens Elsewhere

      • 1st Edition
      • April 11, 2005
      • Chris Meyer + 2 more
      • English
      • Hardback
        9 7 8 1 5 5 8 6 0 8 8 9 4
      • Paperback
        9 7 8 1 4 9 3 3 0 3 7 5 5
      • eBook
        9 7 8 0 0 8 0 5 3 4 6 7 1
      It's a plain fact: regardless of how smart, creative, and innovative your organization is, there are more smart, creative, and innovative people outside your organization than inside. Open source offers the possibility of bringing more innovation into your business by building a creative community that reaches beyond the barriers of the business. The key is developing a web-driven community where new types of collaboration and creativity can flourish. Since 1998 Ron Goldman and Richard Gabriel have been helping groups at Sun Microsystems understand open source and advising them on how to build successful communities around open source projects. In this book the authors present lessons learned from their own experiences with open source, as well as those from other well-known projects such as Linux, Apache, and Mozilla.
    • Deploying LINUX on the Desktop

      • 1st Edition
      • July 22, 2005
      • Edward Haletky
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 2 8 6
      • eBook
        9 7 8 0 0 8 0 4 5 6 9 3 5
      This book will meet the needs of those LINUX users who wish to set up a desktop LINUX workstations, and integrate them into their corporate environment. It will provide practical answers to such questions as: a) What tools do I use to fully integrate with the Microsoft Office tool suite? b) How do I set up my email and interact with a Microsoft Exchange Server? c) Where can I obtain, and how do I install, Internet browser plug-ins needed for web access, media playing, and other corporate Internet functionality? Provides a guide to using LINUX on the desktop for the corporate user. It will cover more than basic topics, such as whether to use OpenOffice or use another tool such as Evolution; they will delve into specific configurations necessary to interact efficiently with the Microsoft centric world of the Desktop. This guide will cover those problem areas that arise and discuss how to smooth over the bumps while meeting the goal of using a LINUX desktop.Lastly this book will cover whether or not a complete LINUX solution is available, or if some hybrid desktop will be needed to interact smoothly in the modern corporate computing environment; including a discussion of necessary LINUX growth directions for future expansion and capability.
    • Penetration Tester's Open Source Toolkit

      • 1st Edition
      • August 1, 2005
      • Jeremy Faircloth + 5 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 9 5 2 0
      Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader “inside their heads” to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing.
    • Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers

      • 1st Edition
      • September 2, 2005
      • Fred Eady
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 8 6 5 0
      • eBook
        9 7 8 0 0 8 0 4 5 7 2 8 4
      Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New applications are emerging every day, with wireless capability being embedded in everything from electric meters to hospital patient tracking systems to security devices. This practical reference guides readers through the wireless technology forest, giving them the knowledge, the hardware and the software necessary to design a wireless embedded device rapidly, inexpensively, and effectively. Using off-the-shelf microcontrollers from Microchip and Atmel, the author provides step-by-step instructions for designing the hardware and firmware for a fully operational wireless networking device. The book gives a thorough introduction to 802.11 technology and puts it into perspective against the other wireless standard options. Just enough theory and mathematics is provided to give the depth of understanding needed for practical design work. The book thoroughly covers: * Laptop wireless Ethernet card introduction and theory *Introduction to CompactFlash-to-micr... interfacing* Implementing the laptop wireless Ethernet card in an embedded environment
    • OS X for Hackers at Heart

      • 1st Edition
      • November 5, 2005
      • Chris Hurley + 4 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 4 0 5
      • eBook
        9 7 8 0 0 8 0 4 8 9 4 8 3
      The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker’s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world’s foremost “true hackers” unleash the power of OS X for everything form cutting edge research and development to just plain old fun.OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple’s Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
    • Sarbanes-Oxley Compliance Using COBIT and Open Source Tools

      • 1st Edition
      • October 7, 2005
      • Christian B Lahti + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 9 6 7 4
      This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the book clearly documents which Open Source tools you should consider using in the journey towards compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion.Each chapter begins with an analysis of the business and technical ramifications of Sarbanes-Oxley as regards to topics covered before moving into the detailed instructions on the use of the various Open Source applications and tools relating to the compliance objectives.
    • Real-Time Systems Development

      • 1st Edition
      • October 28, 2005
      • Rob Williams
      • English
      • Paperback
        9 7 8 0 7 5 0 6 6 4 7 1 4
      • eBook
        9 7 8 0 0 8 0 4 5 6 4 0 9
      Real-Time Systems Development introduces computing students and professional programmers to the development of software for real-time applications. Based on the academic and commercial experience of the author, the book is an ideal companion to final year undergraduate options or MSc modules in the area of real-time systems design and implementation. Assuming a certain level of general systems design and programming experience, this text will extend students’ knowledge and skills into an area of computing which has increasing relevance in a modern world of telecommunications and ‘intelligent’ equipment using embedded microcontrollers. This book takes a broad, practical approach in discussing real-time systems. It covers topics such as basic input and output; cyclic executives for bare hardware; finite state machines; task communication and synchronization; input/output interfaces; structured design for real-time systems; designing for multitasking; UML for real-time systems; object oriented approach to real-time systems; selecting languages for RTS development; Linux device drivers; and hardware/software co-design. Programming examples using GNU/Linux are included, along with a supporting website containing slides; solutions to problems; and software examples. This book will appeal to advanced undergraduate Computer Science students; MSc students; and, undergraduate software engineering and electronic engineering students.
    • Hacking a Terror Network: The Silent Threat of Covert Channels

      • 1st Edition
      • January 27, 2005
      • Russ Rogers + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 8 8 8 2
      Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacki... a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.
    • Microsoft Log Parser Toolkit

      • 1st Edition
      • February 10, 2005
      • Gabriele Giuseppini + 1 more
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 5 2 8
      • eBook
        9 7 8 0 0 8 0 4 8 9 3 9 1
      Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.