Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Modeling Embedded Systems and SoC's

    Concurrency and Time in Models of Computation
    • 1st Edition
    • Axel Jantsch
    • English
    Over the last decade, advances in the semiconductor fabrication process have led to the realization of true system-on-a-chip devices. But the theories, methods and tools for designing, integrating and verifying these complex systems have not kept pace with our ability to build them. System level design is a critical component in the search for methods to develop designs more productively. However, there are a number of challenges that must be overcome in order to implement system level modeling. This book directly addresses that need by developing organizing principles for understanding, assessing, and comparing the different models of computation necessary for system level modeling. Dr. Axel Jantsch identifies the representation of time as the essential feature for distinguishing these models. After developing this conceptual framework, he presents a single formalism for representing very different models, allowing them to be easily compared. As a result, designers, students, and researchers are able to identify the role and the features of the "right" model of computation for the task at hand.
  • Agenda Relevance: A Study in Formal Pragmatics

    • 1st Edition
    • Volume 1
    • English
    Agenda Relevance is the first volume in the authors' omnibus investigation ofthe logic of practical reasoning, under the collective title, A Practical Logicof Cognitive Systems. In this highly original approach, practical reasoning isidentified as reasoning performed with comparatively few cognitive assets,including resources such as information, time and computational capacity. Unlikewhat is proposed in optimization models of human cognition, a practical reasonerlacks perfect information, boundless time and unconstrained access tocomputational complexity. The practical reasoner is therefore obliged to be acognitive economizer and to achieve his cognitive ends with considerableefficien... Accordingly, the practical reasoner avails himself of variousscarce-resour... compensation strategies. He also possesses neurocognitivetraits that abet him in his reasoning tasks. Prominent among these is thepractical agent's striking (though not perfect) adeptness at evading irrelevantinformatio... and staying on task. On the approach taken here, irrelevancies areimpediments to the attainment of cognitive ends. Thus, in its most basic sense,relevant information is cognitively helpful information. Information can then besaid to be relevant for a practical reasoner to the extent that it advances orcloses some cognitive agenda of his. The book explores this idea with aconceptual detail and nuance not seen the standard semantic, probabilistic andpragmatic approaches to relevance; but wherever possible, the authors seek tointegrate alternative conceptions rather than reject them outright. A furtherattraction of the agenda-relevance approach is the extent to which its principalconceptual findings lend themselves to technically sophisticated re-expressionin formal models that marshal the resources of time and action logics andlabel led deductive systems. Agenda Relevance is necessary reading for researchers in logic, beliefdynamics, computer science, AI, psychology and neuroscience, linguistics,argument... theory, and legal reasoning and forensic science, and will repaystudy by graduate students and senior undergraduates in these same fields.Key features:• relevance• action and agendas• practical reasoning• belief dynamics• non-classical logics• labelled deductive systems
  • SQL Clearly Explained

    • 3rd Edition
    • Jan L. Harrington
    • English
    SQL Clearly Explained, Third Edition, provides an in-depth introduction to using SQL (Structured Query Language). Readers will learn not only SQL syntax, but also how SQL works. Although the core of the SQL language remains relatively unchanged, the most recent release of the SQL standard (SQL:2008) includes two sets of extensions: 1) support for object-relational databases and 2) support for XML. As a result, the set of standard SQL commands has been greatly extended and this new edition takes that into account. This new edition includes updated tips and tricks to reflect the current concepts of SQL and XML standards; several new chapters covering object-relational and XML extensions; and an ancillary package that includes case studies, a syllabus, exams and more. This book is intended for working SQL programmers, database administrators, database designers, database analysts, and application system developers as well as those who are developing new features for database management systems who want to know about user needs. This would include anyone working with electronic content in the relational database context but also XML. Web services, etc.
  • Computer Networks

    A Systems Approach
    • 3rd Edition
    • Larry L. Peterson + 1 more
    • English
    In this new edition of their classic and bestselling textbook, authors Larry Peterson and Bruce Davie continue to emphasize why networks work the way they do. Their "system approach" treats the network as a system composed of interrelated building blocks (as opposed to strict layers), giving students and professionals the best possible conceptual foundation on which to understand current networking technologies, as well as the new ones that will quickly take their place.Incorporating instructor and user feedback, this edition has also been fully updated and includes all-new material on MPLS and switching, wireless and mobile technology, peer-to-peer networks, Ipv6, overlay and content distribution networks, and more. As in the past, all instruction is rigorously framed by problem statements and supported by specific protocol references, C-code examples, and thought-provoking end-of-chapter exercises.Computer Networks: A Systems Approach remains an essential resource for a successful classroom experience and a rewarding career in networking.
  • Web Bloopers

    60 Common Web Design Mistakes, and How to Avoid Them
    • 1st Edition
    • Jeff Johnson
    • English
    The dot.com crash of 2000 was a wake-up call, and told us that the Web has far to go before achieving the acceptance predicted for it in '95. A large part of what is missing is quality; a primary component of the missing quality is usability. The Web is not nearly as easy to use as it needs to be for the average person to rely on it for everyday information, commerce, and entertainment.In response to strong feedback from readers of GUI BLOOPERS calling for a book devoted exclusively to Web design bloopers, Jeff Johnson calls attention to the most frequently occurring and annoying design bloopers from real web sites he has worked on or researched. Not just a critique of these bloopers and their sites, this book shows how to correct or avoid the blooper and gives a detailed analysis of each design problem. Hear Jeff Johnson's interview podcast on software and website usability at the University of Canterbury (25 min.)
  • HCI Models, Theories, and Frameworks

    Toward a Multidisciplinary Science
    • 1st Edition
    • John M. Carroll
    • English
    HCI Models, Theories, and Frameworks provides a thorough pedagological survey of the science of Human-Computer Interaction (HCI). HCI spans many disciplines and professions, including anthropology, cognitive psychology, computer graphics, graphical design, human factors engineering, interaction design, sociology, and software engineering. While many books and courses now address HCI technology and application areas, none has addressed HCI’s multidisciplinary foundations with much scope or depth. This text fills a huge void in the university education and training of HCI students as well as in the lifelong learning and professional development of HCI practitioners. Contributors are leading researchers in the field of HCI. If you teach a second course in HCI, you should consider this book. This book provides a comprehensive understanding of the HCI concepts and methods in use today, presenting enough comparative detail to make primary sources more accessible. Chapters are formatted to facilitate comparisons among the various HCI models. Each chapter focuses on a different level of scientific analysis or approach, but all in an identical format, facilitating comparison and contrast of the various HCI models. Each approach is described in terms of its roots, motivation, and type of HCI problems it typically addresses. The approach is then compared with its nearest neighbors, illustrated in a paradigmatic application, and analyzed in terms of its future. This book is essential reading for professionals, educators, and students in HCI who want to gain a better understanding of the theoretical bases of HCI, and who will make use of a good background, refresher, reference to the field and/or index to the literature.
  • Unit Testing in Java

    How Tests Drive the Code
    • 1st Edition
    • Johannes Link
    • English
    Software testing is indispensable and is one of the most discussed topics in software development today. Many companies address this issue by assigning a dedicated software testing phase towards the end of their development cycle. However, quality cannot be tested into a buggy application. Early and continuous unit testing has been shown to be crucial for high quality software and low defect rates. Yet current books on testing ignore the developer's point of view and give little guidance on how to bring the overwhelming amount of testing theory into practice. Unit Testing in Java represents a practical introduction to unit testing for software developers. It introduces the basic test-first approach and then discusses a large number of special issues and problem cases. The book instructs developers through each step and motivates them to explore further.
  • Stealing The Network

    How to Own the Box
    • 1st Edition
    • Syngress
    • English
    Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
  • CheckPoint NG VPN 1/Firewall 1

    Advanced Configuration and Troubleshooting
    • 1st Edition
    • Syngress
    • English
    Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far.This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam.
  • Business Modeling and Data Mining

    • 1st Edition
    • Dorian Pyle
    • English
    Business Modeling and Data Mining demonstrates how real world business problems can be formulated so that data mining can answer them. The concepts and techniques presented in this book are the essential building blocks in understanding what models are and how they can be used practically to reveal hidden assumptions and needs, determine problems, discover data, determine costs, and explore the whole domain of the problem. This book articulately explains how to understand both the strategic and tactical aspects of any business problem, identify where the key leverage points are and determine where quantitative techniques of analysis -- such as data mining -- can yield most benefit. It addresses techniques for discovering how to turn colloquial expression and vague descriptions of a business problem first into qualitative models and then into well-defined quantitative models (using data mining) that can then be used to find a solution. The book completes the process by illustrating how these findings from data mining can be turned into strategic or tactical implementations.