Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • TCP/IP Clearly Explained

    • 4th Edition
    • Peter Loshin
    • English
    With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS). The improvements go far beyond the updated material: they also include an all-new approach that examines the TCP/IP protocol stack from the top down, beginning with the applications you may already understand and only then moving deeper to the protocols that make these applications possible. You also get a helpful overview of the "life" of an Internet packet, covering all its movements from inception to final disposition. If you're looking for nothing more than information on the protocols comprising TCP/IP networking, there are plenty of books to choose from. If you want to understand TCP/IP networking - why the protocols do what they do, how they allow applications to be extended, and how changes in the environment necessitate changes to the protocols—there's only the one you hold in your hands.
  • TruCluster Server Handbook

    • 1st Edition
    • Scott Fafrak + 4 more
    • English
    The TruCluster Server Handbook authoritatively details how to plan, design, install, configure, and administer a cluster of Tru64 UNIX systems. The book explains how to configure and optimize hardware underlying a TruCluster server, including storage servers so critical to running a high-end cluster operation. This book provides best practices and techniques drawn from the authors' extensive experiences in the field with systems designers, systems managers, developers, and users. The authors include a former Tru64 UNIX Technical Group Leader with HP's Consulting Division and a top industry figure, and two former TruCluster Server Team Leaders with the Customer Support Center.
  • Designing Data-Intensive Web Applications

    • 1st Edition
    • Stefano Ceri + 5 more
    • English
    The most prominent Web applications in use today are data-intensive. Scores of database management systems across the Internet access and maintain large amounts of structured data for e-commerce, on-line trading, banking, digital libraries, and other high-volume sites.Developing and maintaining these data-intensive applications is an especially complex, multi-disciplinary activity, requiring all the tools and techniques that software engineering can provide. This book represents a breakthrough for Web application developers. Using hundreds of illustrations and an elegant intuitive modeling language, the authors—all internationally-know... database researchers—present a methodology that fully exploits the conceptual modeling approach of software engineering, from idea to application. Readers will learn not only how to harness the design technologies of relational databases for use on the Web, but also how to transform their conceptual designs of data-intensive Web applications into effective software components.
  • Digital Video and HD

    Algorithms and Interfaces
    • 1st Edition
    • Charles Poynton
    • English
    Rapidly evolving computer and communications technologies have achieved data transmission rates and data storage capacities high enough for digital video. But video involves much more than just pushing bits! Achieving the best possible image quality, accurate color, and smooth motion requires understanding many aspects of image acquisition, coding, processing, and display that are outside the usual realm of computer graphics. At the same time, video system designers are facing new demands to interface with film and computer system that require techniques outside conventional video engineering.Charles Poynton's 1996 book A Technical Introduction to Digital Video became an industry favorite for its succinct, accurate, and accessible treatment of standard definition television (SDTV). In Digital Video and HDTV, Poynton augments that book with coverage of high definition television (HDTV) and compression systems.For more information on HDTV Retail markets, go to: http://www.insightme...
  • Persuasive Technology

    Using Computers to Change What We Think and Do
    • 1st Edition
    • B.J. Fogg
    • English
    Can computers change what you think and do? Can they motivate you to stop smoking, persuade you to buy insurance, or convince you to join the Army? "Yes, they can," says Dr. B.J. Fogg, director of the Persuasive Technology Lab at Stanford University. Fogg has coined the phrase "Captology"(an acronym for computers as persuasive technologies) to capture the domain of research, design, and applications of persuasive computers.In this thought-provoking book, based on nine years of research in captology, Dr. Fogg reveals how Web sites, software applications, and mobile devices can be used to change people's attitudes and behavior. Technology designers, marketers, researchers, consumers—anyone who wants to leverage or simply understand the persuasive power of interactive technology—will appreciate the compelling insights and illuminating examples found inside. Persuasive technology can be controversial—and it should be. Who will wield this power of digital influence? And to what end? Now is the time to survey the issues and explore the principles of persuasive technology, and B.J. Fogg has written this book to be your guide.
  • Dr Tom Shinder's ISA Server and Beyond

    Real World Security Solutions for Microsoft Enterprise Networks
    • 1st Edition
    • Syngress
    • English
    The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.
  • Cisco Security Specialists Guide to PIX Firewall

    • 1st Edition
    • Syngress
    • English
    Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more. Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.
  • Maintaining and Evolving Successful Commercial Web Sites

    Managing Change, Content, Customer Relationships, and Site Measurement
    • 1st Edition
    • Ashley Friedlein
    • English
    Ashley Friedlein's first book, Web Project Management: Delivering Successful Commercial Web Sites, became a bestseller and an essential reference for Web professionals developing new sites. Maintaining and Evolving Successful Commercial Web Sites addresses the realities of successful sites today, namely the notion that maintaining and evolving a site is actually a bigger commitment than launching it. Management wants to maximize returns and obtain reliable performance data, customers demand better service and insist on sites that are more advanced yet easier to use, and the Web site must increasingly be integrated with the entire business even as the amount of information it handles continues to grow.Maintaining and Evolving Successful Commercial Web Sites focuses more on process, reality, and pragmatism and less on strategic theory. It provides the reader with the knowledge, tools, approaches, and processes to manage key site maintenance and evolution projects, providing answers to the following questions:*How can I better manage changes and updates to the Web site?*How can I scale up to allow more contributions to the site and more content and still maintain quality and control?*What is content management and how do I go about it?*How do I go about personalization or community building?*What is Customer Relationship Management (CRM) and how do I actually do it online?*How do I measure and report on how well the site is doing?*How do I avoid information overload?*How do I maximize the value the site creates?The book includes case studies to demonstrate candidly how the issues discussed in the book translate into reality.
  • Nokia Network Security Solutions Handbook

    • 1st Edition
    • Syngress
    • English
    The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are covered in detail, as well as installation and configuration of the Check Point firewall on the Nokia system. Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as learning how to use Nokia's command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the High-availability configuration that is Nokia's strength. The appendices include coverage of the UNIX basics which lie at the heart of the IPSO operating system and a review of the other packages available for Nokia systems (such as Perl and Bash).
  • OpenVMS Alpha Internals and Data Structures

    Memory Management
    • 1st Edition
    • Ruth Goldenberg
    • English
    OpenVMS Alpha Internals and Data Structures: Memory Management is an updateto selected parts of the book OpenVMS AXP Internals and Data Structures Version 1.5 (Digital Press, 1994). This book covers the extensions to the memory management subsystem of OpenVMS Alpha to allow the operating system and applications to access 64 bits of address space. It emphasizes system data structures and their manipulation by paging and swapping routines and related system services.It also describes management of dynamic memory, such as nonpaged pool, and support for nonuniform memory access (NUMA) platforms.This book is intended for systems programmers, technical consultants, application designers, and other computer progressions interested in learning the details of the OpenVMS executive. Teachers and students of graduate and advanced undergraduate courses in operating systems will find this book a valuable study in how theory and practice are resolved in a complex commercialoperating system.