Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • How to Build a Digital Library

    • 1st Edition
    • Ian H. Witten + 1 more
    • English
    Given modern society's need to control its ever-increasing body of information, digital libraries will be among the most important and influential institutions of this century. With their versatility, accessibility, and economy, these focused collections of everything digital are fast becoming the "banks" in which the world's wealth of information is stored.How to Build a Digital Library is the only book that offers all the knowledge and tools needed to construct and maintain a digital library-no matter how large or small. Two internationally recognized experts provide a fully developed, step-by-step method, as well as the software that makes it all possible. How to Build a Digital Library is the perfectly self-contained resource for individuals, agencies, and institutions wishing to put this powerful tool to work in their burgeoning information treasuries.
  • Jim Blinn's Corner: Notation, Notation, Notation

    • 1st Edition
    • Jim Blinn
    • English
    The third entry in the Jim Blinn's Corner series, this is, like the others, a handy compilation of selected installments of his influential column. But here, for the first time, you get the "Director's Cut" of the articles: revised, expanded, and enhanced versions of the originals. What's changed? Improved mathematical notation, more diagrams, new solutions. What remains the same? All the things you've come to rely on: straight answers, irreverent style, and innovative thinking. This is Jim Blinn at his best - now even better.
  • Hack Proofing Your Identity In The Information Age

    • 1st Edition
    • Syngress
    • English
    Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.
  • Developing Web Services with Java APIs for XML Using WSDP

    • 1st Edition
    • Syngress
    • English
    The Holy War between Microsoft Corporation and Sun Microsystems is heating up as Sun unveils JAX Pack to compete with Microsoft's .NET initiativeJAX Pack is an all-in-one development kit that utilizes XML to build cross platform Web services. For companies that are developing Web services to collaborate with business partners, JAX Pack offers a faster way to develop applications while maintaining independence from any particular vendor's XML technologies. Developing Web Services with Java APIs for XML (JAX Pack) provides exhaustive coverage of Sun's recently released JAX Pack. The book assumes that readers are experienced Java developers with a solid understanding of XML. As such, the book contains five parts covering each component of JAX Pack.
  • System Architecture with XML

    • 1st Edition
    • Berthold Daum + 1 more
    • English
    XML is bringing together some fairly disparate groups into a new cultural clash: document developers trying to understand what a transaction is, database analysts getting upset because the relational model doesn't fit anymore, and web designers having to deal with schemata and rule based transformations. The key to rising above the confusion is to understand the different semantic structures that lie beneath the standards of XML, and how to model the semantics to achieve the goals of the organization. A pure architecture of XML doesn't exist yet, and it may never exist as the underlying technologies are so diverse. Still, the key to understanding how to build the new web infrastructure for electronic business lies in understanding the landscape of these new standards.If your background is in document processing, this book will show how you can use conceptual modeling to model business scenarios consisting of business objects, relationships, processes, and transactions in a document-centric way. Database designers will learn if XML is subject to relational normalization and how this fits in with the hierarchical structure of XML documents. Web designers will discover that XML puts them into a position to automatically generate visually pleasing web pages and rich multimedia shows from otherwise dry product catalogues by using XSLT and other transformation tools. Business architects will see how XML can help them to define applications that can be quickly adapted the ever changing requirements of the market.
  • C# For Java Programmers

    • 1st Edition
    • Harold Cabrera
    • English
    Java Programmers, Preprare for Microsoft's .NET initiative while enhancing your repertoire and marketability with C# for Java Progammers! C# for Java Programmers will prepare readers for the .NET framework by building on what they already know about object-oriented languages and give them the means to maintain their flexibility and effectiveness in an un-certain marketplace. This book will compare and contrast the advantages and disadvantages of both Java and C# to allow programmers to make their own decisions regarding what each language is best used for. Whatever your feelings are about Microsoft and its .NET initiative, there can be no denying that C# is here to stay. The C# language, a close cousin to Java, is a new object-oriented programming language (OOPL) designed to work within the .NET framework. It improves upon many of the vague or ill-defined areas of C++ that frequently lead programmers into trouble. C# is a strongly-typed, object-oriented language designed to give the optimum blend of simplicity, expressiveness, and performance.
  • Data Networks

    Routing, Security, and Performance Optimization
    • 1st Edition
    • Tony Kenyon
    • English
    Data Networks builds on the foundation laid in Kenyon's first book, High-Performance Data Network Design, with expanded coverage of routing, security, multicasting, and advanced design topics such as performance optimization and fault tolerance. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for day-to-day problems facing network designers and IT managers. In this book, you will find optimization advice from an experienced practitioner that you can put to work in your own system.As security and network performance become more and more critical to a company's success, the system administrator's job becomes even more difficult. Use the principles, tips, and techniques Kenyon offers here to enhance and protect the flow of data within your enterprise.
  • Information Assurance

    Managing Organizational IT Security Risks
    • 1st Edition
    • Joseph Boyce + 1 more
    • English
    Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted information security posture to both public and private corporations and government run agencies.There is a growing concern among all corporations and within the security industry to come up with new approaches to measure an organization's information security risks and posture. Information Assurance explains and defines the theories and processes that will help a company protect its proprietary information including: * The need to assess the current level of risk.* The need to determine what can impact the risk.* The need to determine how risk can be reduced.The authors lay out a detailed strategy for defining information security, establishing IA goals, providing training for security awareness, and conducting airtight incident response to system compromise. Such topics as defense in depth, configuration management, IA legal issues, and the importance of establishing an IT baseline are covered in-depth from an organizational and managerial decision-making perspective.
  • ESSENTIAL JAVA FOR SCIENTISTS AND ENGINEERS

    • 1st Edition
    • Brian H. Hahn + 1 more
    • English
  • Essential Java for Scientists and Engineers

    • 1st Edition
    • Brian H. Hahn + 1 more
    • English
    Essential Java serves as an introduction to the programming language, Java, for scientists and engineers, and can also be used by experienced programmers wishing to learn Java as an additional language. The book focuses on how Java, and object-oriented programming, can be used to solve science and engineering problems.Many examples are included from a number of different scientific and engineering areas, as well as from business and everyday life. Pre-written packages of code are provided to help in such areas as input/output, matrix manipulation and scientific graphing.