Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Buffer Overflow Attacks

      • 1st Edition
      • January 29, 2005
      • Jason Deckard
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 6 7 2
      • eBook
        9 7 8 0 0 8 0 4 8 8 4 2 4
      The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim’s machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
    • Advanced Graphics Programming Using OpenGL

      • 1st Edition
      • February 2, 2005
      • Tom McReynolds + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 5 7 2 1
      Today truly useful and interactive graphics are available on affordable computers. While hardware progress has been impressive, widespread gains in software expertise have come more slowly. Information about advanced techniques—beyond those learned in introductory computer graphics texts—is not as easy to come by as inexpensive hardware. This book brings the graphics programmer beyond the basics and introduces them to advanced knowledge that is hard to obtain outside of an intensive CG work environment. The book is about graphics techniques—those that don’t require esoteric hardware or custom graphics libraries—that are written in a comprehensive style and do useful things. It covers graphics that are not covered well in your old graphics textbook. But it also goes further, teaching you how to apply those techniques in real world applications, filling real world needs.
    • An Ontological and Epistemological Perspective of Fuzzy Set Theory

      • 1st Edition
      • November 15, 2005
      • I. Burhan Türksen
      • English
      • Hardback
        9 7 8 0 4 4 4 5 1 8 9 1 0
      • Paperback
        9 7 8 0 4 4 4 5 4 5 8 7 9
      • eBook
        9 7 8 0 0 8 0 5 2 5 7 1 6
      Fuzzy set and logic theory suggest that all natural language linguistic expressions are imprecise and must be assessed as a matter of degree. But in general membership degree is an imprecise notion which requires that Type 2 membership degrees be considered in most applications related to human decision making schemas. Even if the membership functions are restricted to be Type1, their combinations generate an interval – valued Type 2 membership. This is part of the general result that Classical equivalences breakdown in Fuzzy theory. Thus all classical formulas must be reassessed with an upper and lower expression that are generated by the breakdown of classical formulas.Key features:- Ontological grounding- Epistemological justification- Measurement of Membership- Breakdown of equivalences- FDCF is not equivalent to FCCF- Fuzzy Beliefs- Meta-Linguistic axioms
    • Advanced Systems Design with Java, UML and MDA

      • 1st Edition
      • April 21, 2005
      • Kevin Lano
      • English
      • Paperback
        9 7 8 0 7 5 0 6 6 4 9 6 7
      • eBook
        9 7 8 0 0 8 0 4 5 6 9 1 1
      The Model Driven Architecture defines an approach where the specification of the functionality of a system can be separated from its implementation on a particular technology platform. The idea being that the architecture will be able to easily be adapted for different situations, whether they be legacy systems, different languages or yet to be invented platforms.MDA is therefore, a significant evolution of the object-oriented approach to system development.Advanced System Design with Java, UML and MDA describes the factors involved in designing and constructing large systems, illustrating the design process through a series of examples, including a Scrabble player, a jukebox using web streaming, a security system, and others. The book first considers the challenges of software design, before introducing the Unified Modelling Language and Object Constraint Language. The book then moves on to discuss systems design as a whole, covering internet systems design, web services, Flash, XML, XSLT, SOAP, Servlets, Javascript and JSP.In the final section of the book, the concepts and terminology of the Model Driven Architecture are discussed. To get the most from this book, readers will need introductory knowledge of software engineering, programming in Java and basic knowledge of HTML.
    • Network Security

      • 1st Edition
      • April 8, 2005
      • Jan L. Harrington
      • English
      • Paperback
        9 7 8 0 1 2 3 1 1 6 3 3 8
      • eBook
        9 7 8 0 0 8 0 4 5 5 3 7 2
      Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.
    • Joe Celko's SQL Programming Style

      • 1st Edition
      • April 17, 2005
      • Joe Celko
      • English
      • Paperback
        9 7 8 0 1 2 0 8 8 7 9 7 2
      • eBook
        9 7 8 0 0 8 0 4 7 8 8 3 8
      Are you an SQL programmer that, like many, came to SQL after learning and writing procedural or object-oriented code? Or have switched jobs to where a different brand of SQL is being used, or maybe even been told to learn SQL yourself? If even one answer is yes, then you need this book. A "Manual of Style" for the SQL programmer, this book is a collection of heuristics and rules, tips, and tricks that will help you improve SQL programming style and proficiency, and for formatting and writing portable, readable, maintainable SQL code. Based on many years of experience consulting in SQL shops, and gathering questions and resolving his students’ SQL style issues, Joe Celko can help you become an even better SQL programmer.
    • GMPLS

      • 1st Edition
      • December 20, 2005
      • Adrian Farrel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 0 8 8 4 2 2 3
      • eBook
        9 7 8 0 0 8 0 4 5 6 4 7 8
      The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. GMPLS: Architecture and Applications brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively. This book begins by defining GMPLS’s place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers.
    • Complete Maya Programming Volume II

      • 1st Edition
      • Volume 2
      • August 5, 2005
      • David Gould
      • English
      • Paperback
        9 7 8 0 1 2 0 8 8 4 8 2 7
      • eBook
        9 7 8 0 0 8 0 5 2 9 5 7 8
      David Gould's acclaimed first book, Complete Maya Programming: An Extensive Guide to MEL and the C++ API, provides artists and programmers with a deep understanding of the way Maya works and how it can be enhanced and customized through programming. In his new book David offers a gentle, intuitive introduction to the core ideas of computer graphics. Each concept is explained progressively and is fully implemented in both MEL and C++ so that an artist or programmer can use the source code directly in their own programs. Geometry and modeling are covered in detail with progressively more complex examples demonstrating all of Maya's possible programming features. David Gould's first volume is widely regarded as the most authoritative reference on Maya programming. Volume II continues this tradition and provides an unmatched guide for the artist and programmer tackling complex tasks.
    • Joe Celko's SQL for Smarties

      • 3rd Edition
      • July 29, 2005
      • Joe Celko
      • English
      • eBook
        9 7 8 0 0 8 0 4 6 0 0 4 8
      SQL for Smarties was hailed as the first book devoted explicitly to the advanced techniques needed to transform an experienced SQL programmer into an expert. Now, 10 years later and in the third edition, this classic still reigns supreme as the book written by an SQL master that teaches future SQL masters. These are not just tips and techniques; Joe also offers the best solutions to old and new challenges and conveys the way you need to think in order to get the most out of SQL programming efforts for both correctness and performance. In the third edition, Joe features new examples and updates to SQL-99, expanded sections of Query techniques, and a new section on schema design, with the same war-story teaching style that made the first and second editions of this book classics.
    • Introduction to Data Compression

      • 3rd Edition
      • December 1, 2005
      • Khalid Sayood
      • English
      • eBook
        9 7 8 0 0 8 0 5 0 9 2 5 9
      Introduction to Data Compression, Third Edition, is a concise and comprehensive guide to data compression. This book introduces the reader to the theory underlying today’s compression techniques with detailed instruction for their applications using several examples to explain the concepts. Encompassing the entire field of data compression, it covers lossless and lossy compression, Huffman coding, arithmetic coding, dictionary techniques, context based compression, scalar and vector quantization. It includes all the cutting edge updates the reader will need during the work day and in class. This edition adds new content on the topic of audio compression including a description of the mp3 algorithm, along with a new video coding standard and new facsimile standard explained. It explains in detail established and emerging standards in depth including JPEG 2000, JPEG-LS, MPEG-2, Group 3 and 4 faxes, JBIG 2, ADPCM, LPC, CELP, and MELP. Source code is provided via a companion web site that gives readers the opportunity to build their own algorithms, choose and implement techniques in their own applications. This book will appeal to professionals, software and hardware engineers, students, and to anyone interested in digital libraries and multimedia.