Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Computational Error and Complexity in Science and Engineering

      • 1st Edition
      • Volume 201
      • March 4, 2005
      • Vangipuram Lakshmikantham + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 4 5 8 3 1
      • Hardback
        9 7 8 0 4 4 4 5 1 8 6 0 6
      • eBook
        9 7 8 0 0 8 0 4 5 9 5 1 6
      The book “Computational Error and Complexity in Science and Engineering” pervades all the science and engineering disciplines where computation occurs. Scientific and engineering computation happens to be the interface between the mathematical model/problem and the real world application. One needs to obtain good quality numerical values for any real-world implementation. Just mathematical quantities symbols are of no use to engineers/technologi... Computational complexity of the numerical method to solve the mathematical model, also computed along with the solution, on the other hand, will tell us how much computation/computat... effort has been spent to achieve that quality of result. Anyone who wants the specified physical problem to be solved has every right to know the quality of the solution as well as the resources spent for the solution. The computed error as well as the complexity provide the scientific convincing answer to these questions. Specifically some of the disciplines in which the book will be readily useful are (i) Computational Mathematics, (ii) Applied Mathematics/Computat... Engineering, Numerical and Computational Physics, Simulation and Modelling. Operations Research (both deterministic and stochastic), Computing Methodologies, Computer Applications, and Numerical Methods in Engineering.Key Features:- Describes precisely ready-to-use computational error and complexity- Includes simple easy-to-grasp examples wherever necessary.- Presents error and complexity in error-free, parallel, and probabilistic methods.- Discusses deterministic and probabilistic methods with error and complexity. - Points out the scope and limitation of mathematical error-bounds.- Provides a comprehensive up-to-date bibliography after each chapter.
    • Handbook of Temporal Reasoning in Artificial Intelligence

      • 1st Edition
      • Volume 1
      • March 1, 2005
      • Michael David Fisher + 2 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 1 4 9 3 6
      • Paperback
        9 7 8 0 4 4 4 5 5 8 8 1 7
      • eBook
        9 7 8 0 0 8 0 5 3 3 3 6 0
      This collection represents the primary reference work for researchers and students in the area of Temporal Reasoning in Artificial Intelligence. Temporal reasoning has a vital role to play in many areas, particularly Artificial Intelligence. Yet, until now, there has been no single volume collecting together the breadth of work in this area. This collection brings together the leading researchers in a range of relevant areas and provides an coherent description of the breadth of activity concerning temporal reasoning in the filed of Artificial Intelligence.Key Features:- Broad range: foundations; techniques and applications- Leading researchers around the world have written the chapters- Covers many vital applications- Source book for Artificial Intelligence, temporal reasoning- Approaches provide foundation for many future software systems
    • C# 2.0

      • 1st Edition
      • February 22, 2005
      • Michel de Champlain + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 1 6 7 4 5 1 9
      • eBook
        9 7 8 0 0 8 0 4 8 8 4 3 1
      You don’t need coddling; you don’t need to be told what you already know. What you need is a book that uses your experience as a Java or C++ programmer to give you a leg up into the challenges and rewards of C#. And this Practical Guide is precisely what you’re after. Written by a team that boasts extensive experience teaching C# to professionals, this book provides a practical, efficient explanation of the language itself, covering basic to advanced features and calling out all that’s new in 2.0. Its instruction is always firmly situated within the context of the .NET framework and bolstered by code examples, key lessons in object-oriented programming, and installments of a realistic application programming tutorial. Concise and incisive, this is the best way to master the world’s fastest-growing and most marketable programming language. Features: Provides a carefully focused explanation of every aspect of the C# language, including entire chapters on the unified type system, advanced types, collections, generics, reflection and attributes. Highlights all features new to the latest version of C# and organizes its presentation of C# according to the key principles of object-oriented programming and the .NET framework. Using end-of-chapter exercises, incrementally develops a cohesive application programming tutorial.
    • Apple I Replica Creation

      • 1st Edition
      • February 17, 2005
      • Tom Owad
      • English
      • eBook
        9 7 8 0 0 8 0 4 9 9 2 1 5
      The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design. The book will begin by teaching readers the basics of computer processing by discussing the functionality of the 9 chip on the Apple I motherboard. From there, readers will be taught the basics of memory access and video input and output. Readers then learn how to assemble the various hardware components into a fully functioning Apple I replica. Finally, readers will learn how to write their own applications to take run on their new/old computer.
    • Content Networking

      • 1st Edition
      • February 15, 2005
      • Markus Hofmann + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 3 6 9 4
      • Hardback
        9 7 8 1 5 5 8 6 0 8 3 4 4
      • eBook
        9 7 8 0 0 8 0 4 9 0 7 7 9
      As the Internet has grown, so have the challenges associated with delivering static, streaming, and dynamic content to end-users. This book is unique in that it addresses the topic of content networking exclusively and comprehensively, tracing the evolution from traditional web caching to today's open and vastly more flexible architecture. With this evolutionary approach, the authors emphasize the field's most persistent concepts, principles, and mechanisms--the core information that will help you understand why and how content delivery works today, and apply that knowledge in the future.
    • Microsoft Log Parser Toolkit

      • 1st Edition
      • February 10, 2005
      • Gabriele Giuseppini + 1 more
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 5 2 8
      • eBook
        9 7 8 0 0 8 0 4 8 9 3 9 1
      Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.
    • Advanced Graphics Programming Using OpenGL

      • 1st Edition
      • February 2, 2005
      • Tom McReynolds + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 5 7 2 1
      Today truly useful and interactive graphics are available on affordable computers. While hardware progress has been impressive, widespread gains in software expertise have come more slowly. Information about advanced techniques—beyond those learned in introductory computer graphics texts—is not as easy to come by as inexpensive hardware. This book brings the graphics programmer beyond the basics and introduces them to advanced knowledge that is hard to obtain outside of an intensive CG work environment. The book is about graphics techniques—those that don’t require esoteric hardware or custom graphics libraries—that are written in a comprehensive style and do useful things. It covers graphics that are not covered well in your old graphics textbook. But it also goes further, teaching you how to apply those techniques in real world applications, filling real world needs.
    • Network Processor Design

      • 1st Edition
      • Volume 3
      • February 1, 2005
      • Mark A. Franklin + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 0 8 8 4 7 6 6
      • eBook
        9 7 8 0 0 8 0 5 1 2 5 0 1
      The past few years have seen significant change in the landscape of high-end network processing. In response to the formidable challenges facing this emerging field, the editors of this series set out to survey the latest research and practices in the design, programming, and use of network processors. Through chapters on hardware, software, performance and modeling, Network Processor Design illustrates the potential for new NP applications, helping to lay a theoretical foundation for the architecture, evaluation, and programming of networking processors. Like Volume 2 of the series, Volume 3 further shifts the focus from achieving higher levels of packet processing performance to addressing other critical factors such as ease of programming, application developments, power, and performance prediction. In addition, Volume 3 emphasizes forward-looking, leading-edge research in the areas of architecture, tools and techniques, and applications such as high-speed intrusion detection and prevention system design, and the implementation of new interconnect standards.
    • Buffer Overflow Attacks

      • 1st Edition
      • January 29, 2005
      • Jason Deckard
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 6 7 2
      • eBook
        9 7 8 0 0 8 0 4 8 8 4 2 4
      The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim’s machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
    • Hacking a Terror Network: The Silent Threat of Covert Channels

      • 1st Edition
      • January 27, 2005
      • Russ Rogers + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 8 8 8 2
      Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacki... a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.