Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Essential Java for Scientists and Engineers

    • 1st Edition
    • Brian H. Hahn + 1 more
    • English
    Essential Java serves as an introduction to the programming language, Java, for scientists and engineers, and can also be used by experienced programmers wishing to learn Java as an additional language. The book focuses on how Java, and object-oriented programming, can be used to solve science and engineering problems.Many examples are included from a number of different scientific and engineering areas, as well as from business and everyday life. Pre-written packages of code are provided to help in such areas as input/output, matrix manipulation and scientific graphing.
  • Building a Cisco Wireless Lan

    • 1st Edition
    • Syngress
    • English
    Enable enterprise-wide information access using Cisco wireless networksWireless networks are rapidly becoming a viable alternative to traditional wired LANs (Local Area Networks), mainly because of the convenience they provide. By implementing a wireless network, companies eliminate the need and expense of installing fixed cables, outlet ports or patch panels. Building a Cisco Wireless LAN is for individuals designing and supporting a Cisco wireless LAN. The book contains detailed information on the process for the thorough and accurate network design for the Cisco 340, 350, and UBR 7200 series. The contains detailed information on the configuration and troubleshooting of a Cisco WLAN installation. The book offers an introduction to wireless technology from the fundamental principles to the actual implementation.
  • Database Tuning

    Principles, Experiments, and Troubleshooting Techniques
    • 1st Edition
    • Dennis Shasha + 1 more
    • English
    Tuning your database for optimal performance means more than following a few short steps in a vendor-specific guide. For maximum improvement, you need a broad and deep knowledge of basic tuning principles, the ability to gather data in a systematic way, and the skill to make your system run faster. This is an art as well as a science, and Database Tuning: Principles, Experiments, and Troubleshooting Techniques will help you develop portable skills that will allow you to tune a wide variety of database systems on a multitude of hardware and operating systems. Further, these skills, combined with the scripts provided for validating results, are exactly what you need to evaluate competing database products and to choose the right one.
  • Configuring Citrix MetaFrame XP for Windows

    Including Feature Release 1
    • 1st Edition
    • Syngress
    • English
    Syngress's best-selling Citrix MetaFrame author to deliver world class support for this new product As the newest member of the Citrix MetaFrame product family, Citrix MetaFrame XP and recent add-on Feature Release 1 is making a slash in the IT community. Configuring Citrix MetaFrame XP for Windows offers system administrators and network engineers an in-depth look at configuring, optimizing, implemnting and troubleshooting their Windows applications deployed using Citrix MetaFrame XP. Real-world examples and step-by-step exercises will help system administrators maxinise the capabilities of this revolutionary product from Citrix.
  • Disappearing Cryptography

    Information Hiding: Steganography & Watermarking
    • 2nd Edition
    • Peter Wayner
    • English
    Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books... contains implementations for hiding information in lists, sentences, and images.
  • Managing Systems Migrations and Upgrades

    Demystifying the Technology Puzzle
    • 1st Edition
    • Charles Breakfield + 1 more
    • English
    Managing Systems Migrations and Upgrades is the perfect book for technology managers who want a rational guide to evaluating the business aspects of various possible technical solutions. Enterprises today are in the middle of the R&D race for technology leadership, with providers who increasingly need to create markets for new technologies while shortening development, implementation, and life cycles. The cost for the current tempo of technology life cycles is endless change-management controls, organizational chaos, production use of high-risk beta products, and greater potential for failure of existing systems during migration.Burkey and Breakfield help you answer questions such as, "Is the only solution open to me spending more that the industry average in order to succeed?" and "What are the warning signs that tell me to pass on a particular product offering?" as well as "How can my organization avoid the 'technical death marches' typical of the industry?" This book will take the confusion out of when to make shifts in your systems and help you evaluate the value proposition of these technology changes.
  • Moving Objects Databases

    • 1st Edition
    • Ralf Hartmut Güting + 1 more
    • English
    Moving Objects Databases is the first uniform treatment of moving objects databases, the technology that supports GPS and RFID. It focuses on the modeling and design of data from moving objects — such as people, animals, vehicles, hurricanes, forest fires, oil spills, armies, or other objects — as well as the storage, retrieval, and querying of that very voluminous data. It includes homework assignments at the end of each chapter, exercises throughout the text that students can complete as they read, and a solutions manual in the back of the book. This book is intended for graduate or advanced undergraduate students. It is also recommended for computer scientists and database systems engineers and programmers in government, industry and academia; professionals from other disciplines, e.g., geography, geology, soil science, hydrology, urban and regional planning, mobile computing, bioterrorism and homeland security, etc.
  • Programming Lego Mindstorms with Java

    • 1st Edition
    • Syngress
    • English
    Lego robots! The first book that teaches you to program Lego Mindstorms using Java Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs. Since Lego launched Lego Mindstorms in late 1998 sales have skyrocketed - with no sign of slowing down. Mindstorms have captured the imagination of adults and children alike, creating a subculture of Mindstorm enthusiasts around the world. The kits are now a staple part of engineering and computer science classes at many high profile Universities. Up until very recently, the only languages available to program Lego Mindstorms were NQC, pbForth, and legOS. This is the first book detailing how to program Lego Mindstorms using the newly released Java Virtual Machine for Lego Mindstorm programming. Programming Lego Mindstorms provides readers with all of the information they need to construct and program Lego Mindstorm Robots.
  • Hack Proofing ColdFusion

    • 1st Edition
    • Syngress
    • English
    The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance.Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications.
  • XML Net Developers Guide

    • 1st Edition
    • Syngress
    • English
    Compete with the big players in today's E-commerce marketplaceElectroni... Data Interchange (EDI) has long been the standard for large business enterprises to communicate in the B2B marketplace. However, EDI is a difficult technology - the cost and support of EDI standards is often too much for a small or medium business enterprise to bear. To compete in the current E-commerce marketplace, many organizations are beginning to take an interest in the interoperability that exists between XML (Extensible Markup Language) and EDI. XML .NET Developers Guide is written for information technology professionals responsible for supporting data management in both small and large organizations. This book appeals to both individuals working with an existing EDI environment, and small to medium businesses looking to increase their market presence by competing with current EDI players using XML/EDI.