Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Parallel Computational Fluid Dynamics 2001, Practice and Theory

    • 1st Edition
    • P. Wilders + 4 more
    • English
    ParCFD 2001, the thirteenth international conference on Parallel Computational Fluid Dynamics took place in Egmond aan Zee, the Netherlands, from May 21-23, 2001. The specialized, high-level ParCFD conferences are organized yearly on traveling locations all over the world. A strong back-up is given by the central organization located in the USA http://www.parcfd.or... proceedings of ParCFD 2001 represent 70% of the oral lectures presented at the meeting. All published papers were subjected to a refereeing process, which resulted in a uniformly high quality. The papers cover not only the traditional areas of the ParCFD conferences, e.g. numerical schemes and algorithms, tools and environments, interdisciplinary topics, industrial applications, but, following local interests, also environmental and medical issues. These proceedings present an up-to-date overview of the state of the art in parallel computational fluid dynamics.
  • Chips Challenging Champions

    Games, Computers and Artificial Intelligence
    • 1st Edition
    • J. Schaeffer + 1 more
    • English
    One of the earliest dreams of the fledgling field of artificial intelligence (AI) was to build computer programs that could play games as well as or better than the best human players. Despite early optimism in the field, the challenge proved to be surprisingly difficult. However, the 1990s saw amazing progress. Computers are now better than humans in checkers, Othello and Scrabble; are at least as good as the best humans in backgammon and chess; and are rapidly improving at hex, go, poker, and shogi. This book documents the progress made in computers playing games and puzzles. The book is the definitive source for material of high-performance game-playing programs.
  • Relational Database Design Clearly Explained

    • 2nd Edition
    • Jan L. Harrington
    • English
    Fully revised and updated, Relational Database Design, Second Edition is the most lucid and effective introduction to relational database design available. Here, you'll find the conceptual and practical information you need to develop a design that ensures data accuracy and user satisfaction while optimizing performance, regardless of your experience level or choice of DBMS.Supporting the book's step-by-step instruction are three case studies illustrating the planning, analysis, and design steps involved in arriving at a sound design. These real-world examples include object-relational design techniques, which are addressed in greater detail in a new chapter devoted entirely to this timely subject.
  • Non-Photorealistic Computer Graphics

    Modeling, Rendering, and Animation
    • 1st Edition
    • Thomas Strothotte + 1 more
    • English
    Even as developments in photorealistic computer graphics continue to affect our work and leisure activities, practitioners and researchers are devoting more and more attention to non-photorealistic (NPR) techniques for generating images that appear to have been created by hand. These efforts benefit every field in which illustrations—thanks to their ability to clarify, emphasize, and convey very precise meanings—offer advantages over photographs. These fields include medicine, architecture, entertainment, education, geography, publishing, and visualization.Non-Ph... Computer Graphics is the first and only resource to examine non-photorealistic efforts in depth, providing detailed accounts of the major algorithms, as well as the background information and implementation advice readers need to make headway with these increasingly important techniques.Already, an estimated 10% of computer graphics users require some form of non-photorealism. Strothotte and Schlechtweg's important new book is designed and destined to be the standard NPR reference for this large, diverse, and growing group of professionals.
  • Guide to Microsoft Excel 2002 for Business and Management

    • 2nd Edition
    • Bernard Liengme
    • English
    The essential guide for managers and business students who wish to use Microsoft Excel to its full potential As the industry standard spreadsheet for the analysis and presentation of results, Microsoft Excel is indispensable in the business world. This text provides a practical and straightforward guide to fully utilising the functions of Microsoft Excel, guiding the reader from basic principles through to the more complicated areas such as modelling, the analysis of charts, reporting, and automatic importing of data from the web directly into an Excel workbook. Bernard Liengme has written this book specifically to meet the requirements of business students and professionals working with Microsoft Excel. The text is illustrated throughout with screen-shots, as well as a wide variety of examples and case studies based in real-world business contexts, introduced with a minimum of maths, and readily adaptable to workplace situations. The new edition has been brought fully up to date with the new Microsoft Office XP release of Excel 2002 but can be used alongside any previous version of Excel, with new Excel 2002 features clearly indicated throughout.
  • Checkpoint Next Generation Security Administration

    • 1st Edition
    • Syngress
    • English
    Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations.CheckPoin... Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems. CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC ResearchOver 29,000 IT professionals are CheckPont Certified This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand!
  • Video Coding for Mobile Communications

    Efficiency, Complexity and Resilience
    • 1st Edition
    • Mohammed Al-Mualla + 2 more
    • English
    In order for wireless devices to function, the signals must be coded in standard ways so that the sender and the receiver can communicate. This area of video source coding is one of the key challenges in the worldwide push to deliver full video communications over wireless devices. Video Coding for Mobile Communications reviews current progress in this field and looks at how to solve some of the most important technology issues in the months and years ahead. The vision of being able to communicate from anywhere, at any time, and with any type of information is on its way to becoming reality. This natural convergence of mobile communications and multimedia is a field that is expected to achieve unprecedented growth and commercial success. Current wireless communication devices support a number of basic multimedia services (voice, messages, basic internet access), but have coding problems that need to be solved before "real-time" mobile video communication can be achieved.
  • Hack Proofing Your Network

    • 2nd Edition
    • Syngress
    • English
    A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:· The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure SystemsThe central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.
  • Hackproofing Your Wireless Network

    • 1st Edition
    • Syngress
    • English
    The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.
  • Information Security Best Practices

    205 Basic Rules
    • 1st Edition
    • George L Stefanek
    • English
    Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security.Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment.