Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Web Bloopers

    60 Common Web Design Mistakes, and How to Avoid Them
    • 1st Edition
    • Jeff Johnson
    • English
    The dot.com crash of 2000 was a wake-up call, and told us that the Web has far to go before achieving the acceptance predicted for it in '95. A large part of what is missing is quality; a primary component of the missing quality is usability. The Web is not nearly as easy to use as it needs to be for the average person to rely on it for everyday information, commerce, and entertainment.In response to strong feedback from readers of GUI BLOOPERS calling for a book devoted exclusively to Web design bloopers, Jeff Johnson calls attention to the most frequently occurring and annoying design bloopers from real web sites he has worked on or researched. Not just a critique of these bloopers and their sites, this book shows how to correct or avoid the blooper and gives a detailed analysis of each design problem. Hear Jeff Johnson's interview podcast on software and website usability at the University of Canterbury (25 min.)
  • HCI Models, Theories, and Frameworks

    Toward a Multidisciplinary Science
    • 1st Edition
    • John M. Carroll
    • English
    HCI Models, Theories, and Frameworks provides a thorough pedagological survey of the science of Human-Computer Interaction (HCI). HCI spans many disciplines and professions, including anthropology, cognitive psychology, computer graphics, graphical design, human factors engineering, interaction design, sociology, and software engineering. While many books and courses now address HCI technology and application areas, none has addressed HCI’s multidisciplinary foundations with much scope or depth. This text fills a huge void in the university education and training of HCI students as well as in the lifelong learning and professional development of HCI practitioners. Contributors are leading researchers in the field of HCI. If you teach a second course in HCI, you should consider this book. This book provides a comprehensive understanding of the HCI concepts and methods in use today, presenting enough comparative detail to make primary sources more accessible. Chapters are formatted to facilitate comparisons among the various HCI models. Each chapter focuses on a different level of scientific analysis or approach, but all in an identical format, facilitating comparison and contrast of the various HCI models. Each approach is described in terms of its roots, motivation, and type of HCI problems it typically addresses. The approach is then compared with its nearest neighbors, illustrated in a paradigmatic application, and analyzed in terms of its future. This book is essential reading for professionals, educators, and students in HCI who want to gain a better understanding of the theoretical bases of HCI, and who will make use of a good background, refresher, reference to the field and/or index to the literature.
  • Unit Testing in Java

    How Tests Drive the Code
    • 1st Edition
    • Johannes Link
    • English
    Software testing is indispensable and is one of the most discussed topics in software development today. Many companies address this issue by assigning a dedicated software testing phase towards the end of their development cycle. However, quality cannot be tested into a buggy application. Early and continuous unit testing has been shown to be crucial for high quality software and low defect rates. Yet current books on testing ignore the developer's point of view and give little guidance on how to bring the overwhelming amount of testing theory into practice. Unit Testing in Java represents a practical introduction to unit testing for software developers. It introduces the basic test-first approach and then discusses a large number of special issues and problem cases. The book instructs developers through each step and motivates them to explore further.
  • Stealing The Network

    How to Own the Box
    • 1st Edition
    • Syngress
    • English
    Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
  • CheckPoint NG VPN 1/Firewall 1

    Advanced Configuration and Troubleshooting
    • 1st Edition
    • Syngress
    • English
    Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far.This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam.
  • Business Modeling and Data Mining

    • 1st Edition
    • Dorian Pyle
    • English
    Business Modeling and Data Mining demonstrates how real world business problems can be formulated so that data mining can answer them. The concepts and techniques presented in this book are the essential building blocks in understanding what models are and how they can be used practically to reveal hidden assumptions and needs, determine problems, discover data, determine costs, and explore the whole domain of the problem. This book articulately explains how to understand both the strategic and tactical aspects of any business problem, identify where the key leverage points are and determine where quantitative techniques of analysis -- such as data mining -- can yield most benefit. It addresses techniques for discovering how to turn colloquial expression and vague descriptions of a business problem first into qualitative models and then into well-defined quantitative models (using data mining) that can then be used to find a solution. The book completes the process by illustrating how these findings from data mining can be turned into strategic or tactical implementations.
  • Tcl/Tk

    A Developer's Guide
    • 2nd Edition
    • Clif Flynt + 1 more
    • English
    Tcl/Tk (Tool Command Language/Tool Kit) makes it fast and easy to implement any type of application, from games to network analyzers. Tcl/Tk is a full-bodied, mature programming platform used by NASA rocket scientists, Wall Street database experts, Internet designers, and open source programmers around the world. Tcl/Tk's multi-faceted and extensible nature make it ideal for developing end-user GUIs, client/server middleware, Web applications, and more. You can code completely in Tcl, use any of hundreds of extensions, call C or Java subroutines from Tcl/Tk, or use Tcl to glue legacy applications together.Written from a programmer's perspective, Tcl/Tk: A Developer's Guide describes how to use Tcl's standard tools and the unique features that make Tcl/Tk powerful: including graphics widgets, packages, namespaces, and extensions. With this book an experienced programmer will be able to code Tcl in a few hours. In just a few chapters you will learn about Tcl features that allow you to isolate and protect your code from being damaged in large applications. You will even learn how to extend the language itself.Tcl/Tk: A Developer's Guide clearly discusses development tools, proven techniques, and existing extensions. It shows how to use Tcl/Tk effectively and provides many code examples. This fully revised new edition is the complete resource for computer professionals, from systems administrators to programmers. It covers versions 7.4 to 8.4 and includes a CD-ROM containing the interpreters, libraries, and tutorials to get you started quickly. Additional materials in the book include case studies and discussions of techniques for the advanced user.On the CD-ROM*Distributions for Tcl 8.3 and 8.4 for Linux, Solaris, Macintosh, and Windows. *A copy of ActiveTcl from ActiveState. *The latest release of TclTutor.*How-to's and tutorials as well as copies of all the tools discussed in the book.*The author's "Tclsh Spot" articles from :login; magazine and the "Real World" Tcl/Tk chapters from the first edition.*Demo copies of commercial development tools from ActiveState and NeatWare.*Many open source Tcl/Tk development tools.*Tcl/Tk design guidelines.
  • Constraint Processing

    • 1st Edition
    • Rina Dechter
    • English
    Constraint satisfaction is a simple but powerful tool. Constraints identify the impossible and reduce the realm of possibilities to effectively focus on the possible, allowing for a natural declarative formulation of what must be satisfied, without expressing how. The field of constraint reasoning has matured over the last three decades with contributions from a diverse community of researchers in artificial intelligence, databases and programming languages, operations research, management science, and applied mathematics. Today, constraint problems are used to model cognitive tasks in vision, language comprehension, default reasoning, diagnosis, scheduling, temporal and spatial reasoning. In Constraint Processing, Rina Dechter, synthesizes these contributions, along with her own significant work, to provide the first comprehensive examination of the theory that underlies constraint processing algorithms. Throughout, she focuses on fundamental tools and principles, emphasizing the representation and analysis of algorithms.
  • UNIX for OpenVMS Users

    • 3rd Edition
    • Philip Bourne + 2 more
    • English
    UNIX for OpenVMS Users, 3E, makes it easy to see what OpenVMS and UNIX have in common, and to transfer your knowledge and experience in OpenVMS over to the world of UNIX. Since most shops rely on more than one operating system, it is critical for system administrators and managers to understand the similarities and differences between platforms, so they can easily work in both environments while taking full advantage of the tools and applications available on each. This book offers OpenVMS professionals a concise source of information, so that they can quickly bring their expertise to bear on UNIX file management, e-mail, networking, and security. This new edition of the book is enhanced with updated references to VMS, incorporates suggestions made by readers of previous editions, and particularly, recognizes other UNIX implementations in addition to HP's Tru64.
  • Leveraging WMI Scripting

    Using Windows Management Instrumentation to Solve Windows Management Problems
    • 1st Edition
    • Alain Lissoir
    • English
    Leveraging WMI Scripting is the second in a series of two books dedicated to WMI. Understanding WMI Scripting (ISBN 1-55558-266-4), Lissoir's first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed tables, the book explained the underlying technology and how WMI can be put to work. Lissoir focused not only on WMI programming aspects for developers but on how administrators can use what is available in Windows for their admin work. If you've had significant WMI experience, or have read Lissoir's first book, you are ready to apply your WMI knowledge to any technology that interfaces with WMI. Leveraging WMI Scripting continues the presentation of WMI begun in Understanding WMI Scripting. In this new volume, we dive deeper into WMI to understand the manageable entities of the Windows world. Lissoir offers a structured description of the most important WMI providers available from Windows NT 4.0 to Windows Server 2003 (including Windows 2000 and Windows XP). This covers the WMI management of the Windows Registry, Active Directory, SNMP, the Resultant Set Of Policies (RSOP), and the Volume Shadow Service to name a few. This discussion leverages the information on building real-world scripted management solutions presented in Lissoir's first book. Like the first volume, Leveraging WMI Scripting is based on an important concept: "learning by practice." Leveraging WMI Scripting addresses the most advanced topics so that you can exploit the features of various WMI interfaces to manage the components in a real-world environment. WMI is a critical topic under Windows Server 2003, so this book provides real added value to every Windows administrator.