Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Configuring Citrix Metaframe for Windows 2000 Terminal Services

    • 1st Edition
    • Melissa Craft
    • English
    Configuring Citrix Metaframe for Windows 2000 Terminal Services describes all the means in using both Microsoft Windows 2000 Terminal Services and Citrix MetaFrame in an environment. The book specifically covers ways on designing the infrastructure, implementing the plan, troubleshooting the deployment, and configuring servers and clients. The text also explains the process of deploying applications over the Internet, monitoring end users, and securing applications and data. The book also directs how to improve applications' performance with thin clients.
  • Building Cisco Remote Access Networks

    • 1st Edition
    • Wayne Lawson
    • English
    An increasing number of companies are designing and implementing Remote Access Networks, which allow users who are not physically connected to a Wide Area Network (WAN) or Local Area Network (LAN) to access the network's servers, applications and databases or to participate in video conferencing and conference calls. The ability for a remote user to function as if they were in the next office dramatically improves overall efficiency while reducing total cost of ownership. Cisco Systems, the world's largest internetworking vendor, is the pioneer of the enabling technologies for Remote Access Networks. This book will identify and explain all of the Cisco products necessary for designing and building a remote access network and integrating it with legacy systems.This book is a professional reference detailing all of the strategies, tactics and methods for designing, configuring and maintaining Cisco Remote Access Networks. It will include thorough discussions of all Cisco Access Servers and routers.
  • E-Mail Virus Protection Handbook

    Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
    • 1st Edition
    • Syngress
    • English
    The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.
  • Object-Oriented Implementation of Numerical Methods

    An Introduction with Java & Smalltalk
    • 1st Edition
    • Didier H. Besset
    • English
    Numerical methods naturally lend themselves to an object-oriented approach. Mathematics builds high- level ideas on top of previously described, simpler ones. Once a property is demonstrated for a given concept, it can be applied to any new concept sharing the same premise as the original one, similar to the ideas of reuse and inheritance in object-oriented (OO) methodology. Few books on numerical methods teach developers much about designing and building good code. Good computing routines are problem-specific. Insight and understanding are what is needed, rather than just recipes and black box routines. Developers need the ability to construct new programs for different applications.Object-... Implementation of Numerical Methods reveals a complete OO design methodology in a clear and systematic way. Each method is presented in a consistent format, beginning with a short explanation and following with a description of the general OO architecture for the algorithm. Next, the code implementations are discussed and presented along with real-world examples that the author, an experienced software engineer, has used in a variety of commercial applications.
  • The E-Commerce Book

    Building the E-Empire
    • 2nd Edition
    • Steffano Korper + 1 more
    • English
    New in the Second EditionContains over 60% new materialComplete and extensive glossary will be addedComplete revision and update of the security chapter (reflecting the recent Yahoo experience)Strengthe... coverage of E-Business to BusinessIncreased and redesigned case studiesIncreased European and international coverageRevised, expanded, and enhanced illustrationsNew, attractive text design with features such as margin notesIncreased size of tables containing website contactsRedesigned cover
  • IT Manager's Handbook

    Getting Your New Job Done
    • 1st Edition
    • Bill Holtsnider + 1 more
    • English
    Are you one of many new IT managers with limited managerial experience? Are you a technician or programmer contemplating a move into IT management? Or, has your technical position evolved to include significant management responsibilities?The IT Manager's Handbook provides essential information to help you manage your new responsibilities. This unique book provides a guide to help you create budgets, manage projects, evaluate technology and hire and motivate personnel. The authors provide sound advice to equip you with an overall, winning strategy for success.
  • Parallel Computational Fluid Dynamics '99

    Towards Teraflops, Optimization and Novel Formulations
    • 1st Edition
    • D. Keyes + 4 more
    • English
    Contributed presentations were given by over 50 researchers representing the state of parallel CFD art and architecture from Asia, Europe, and North America. Major developments at the 1999 meeting were: (1) the effective use of as many as 2048 processors in implicit computations in CFD, (2) the acceptance that parallelism is now the 'easy part' of large-scale CFD compared to the difficulty of getting good per-node performance on the latest fast-clocked commodity processors with cache-based memory systems, (3) favorable prospects for Lattice-Boltzmann computations in CFD (especially for problems that Eulerian and even Lagrangian techniques do not handle well, such as two-phase flows and flows with exceedingly multiple-connected demains with a lot of holes in them, but even for conventional flows already handled well with the continuum-based approaches of PDEs), and (4) the nascent integration of optimization and very large-scale CFD. Further details of Parallel CFD'99, as well as other conferences in this series, are available at http://www.parcfd.or...
  • Web Project Management

    Delivering Successful Commercial Web Sites
    • 1st Edition
    • Ashley Friedlein
    • English
    Web Project Management presents a solid Web project management method for building commercial Web sites. Developed by pres.co, a leading interactive agency, this refined eight-stage approach lets you closely manage your project's contributors, quality, costs, and schedules. Importantly, the book also details how to define, measure and understand the success of your project on an ongoing basis. This book is an indispensable resource, whether you are a project manager, online manager, Web director, consultant or producer.
  • Building CISCO Networks for Windows 2000

    • 1st Edition
    • Syngress
    • English
    Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. This book is a practical guide to managing CNS/AD. It focuses on how to promote system efficiency and improve network service by using CNS/AD to centralize network management, using the directory as a repository for all policies that govern network usage. The book also describes how to manage Cisco Internetworking Operating System (IOS) networking features and network resources in the same unified way as other enterprise resources, such as user access controls, files, and printers.
  • Component Database Systems

    • 1st Edition
    • Klaus R. Dittrich + 1 more
    • English
    Component Database Systems is a collection of invited chapters by the researchers making the most influential contributions in the database industry's trend toward componentizationThis book represents the sometimes-divergent, sometimes-convergent approaches taken by leading database vendors as they seek to establish commercially viable componentization strategies. Together, these contributions form the first book devoted entirely to the technical and architectural design of component-based database systems. In addition to detailing the current state of their research, the authors also take up many of the issues affecting the likely future directions of component databases.If you have a stake in the evolution of any of today's leading database systems, this book will make fascinating reading. It will also help prepare you for the technology that is likely to become widely available over the next several years.