Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Coordinating User Interfaces for Consistency

    • 1st Edition
    • Jakob Nielsen
    • English
    In the years since Jakob Nielsen's classic collection on interface consistency first appeared, much has changed, and much has stayed the same. On the one hand, there's been exponential growth in the opportunities for following or disregarding the principles of interface consistency-more computers, more applications, more users, and of course the vast expanse of the Web. On the other, there are the principles themselves, as persistent and as valuable as ever. In these contributed chapters, you'll find details on many methods for seeking and enforcing consistency, along with bottom-line analyses of its benefits and some warnings about its possible dangers. Most of what you'll learn applies equally to hardware and software development, and all of it holds real benefits for both your organization and your users.
  • Clustering Windows Server

    A Road Map for Enterprise Solutions
    • 1st Edition
    • Gary Mauler + 1 more
    • English
    An IT decision-maker's road map to creating scalable and reliable Windows 2000 clustered systems.Clustering Windows 2000 explains what a cluster is and what it is not. It explains the concepts and technology from the perspective of Microsoft's Windows family of operating systems. Mauler and Beebe thoroughly explore the critical interaction and integration of state-of-the-art computer hardware with these operating systems and also with third-party layered solutions. However, more than teaching technology, the book provides a unique framework by which readers can evaluate their organizations' own clustering needs. The new Cluster Configuration MatrixC presented here allows them to determine the utility of the many clustering products and solutions given their companies' specific requirements for high availability. Clustering Windows 2000 enables IT professionals to create a highly effective clustering strategy that can grow with their organizations' needs and accommodate ongoing developments in clustering technology.This unique book is for everyone from system designers to IT managers who want a solid understanding of the optimal products and technologies they can use in creating "clusters" of computers to support truly enterprise-caliber programs.
  • Mathematical Logic

    • 1st Edition
    • Volume 4
    • R.O. Gandy + 1 more
    • English
    Mathematical Logic is a collection of the works of one of the leading figures in 20th-century science. This collection of A.M. Turing's works is intended to include all his mature scientific writing, including a substantial quantity of unpublished material. His work in pure mathematics and mathematical logic extended considerably further; the work of his last years, on morphogenesis in plants, is also of the greatest originality and of permanent importance. This book is divided into three parts. The first part focuses on computability and ordinal logics and covers Turing's work between 1937 and 1938. The second part covers type theory; it provides a general introduction to Turing's work on type theory and covers his published and unpublished works between 1941 and 1948. Finally, the third part focuses on enigmas, mysteries, and loose ends. This concluding section of the book discusses Turing's Treatise on the Enigma, with excerpts from the Enigma Paper. It also delves into Turing's papers on programming and on minimum cost sequential analysis, featuring an excerpt from the unpublished manuscript. This book will be of interest to mathematicians, logicians, and computer scientists.
  • Webmasters Guide To The Wireless Internet

    • 1st Edition
    • Syngress
    • English
    The wireless Web is a reality - don't get left behind!The wireless Web is not a future dream. It is here today. Already, more than 20 million people have access the Internet through PDAs, mobile phones, pagers and other wireless devices. What will people find on the Wireless Internet? This is the question that every Webmaster and Web developer is being challenged to answer. The Webmaster's Guide to the Wireless Internet provides the Wireless Webmaster with all of the tools necessary to build the next generation Internet. Packed with the essential information they need to design, develop, and secure robust, e-commerce enabled wireless Web sites. This book is written for advanced Webmasters who are experienced with conventional Web site design and are now faced with the challenge of creating sites that fit on the display of a Web enabled phone or PDA.
  • Networking Explained

    • 2nd Edition
    • Michael Gallo + 1 more
    • English
    Networking Explained 2e offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence. Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.
  • Tru64 UNIX System Administrator's Guide

    • 1st Edition
    • Matthew Cheek + 4 more
    • English
    Tru64 UNIX System Administrator's Guide is an indispensable aid for Tru64 UNIX system administrators. Its clear explanations and practical, step-by-step instructions are invaluable to both new and experienced administrators dealing with the latest UNIX operating systems. Several top Compaq employees from their Tru64 UNIX group co-authored this revision and reveal their most useful shortcuts and "how-tos" as well as pointing out pitfalls to be avoided. The material included in its pages can't be found in any other publication. The Digital Press title Tru64 UNIX File System Administration Handbook by Steve Hancock offers complementary coverage for Compaq's UNIX users. This is the only book available for Tru64 UNIX system administrators. It provides practical, step-by-step tutelage to system administrators dealing with the latest (version 5.1) UNIX operating systems. Several top Compaq employees from their Tru64 UNIX group co-authored this book and added their expertise and experience to the material included in its pages. The Digital Press title Tru64 UNIX File System Administration Handbook by Steve Hancock offers complementary coverage for Compaq's UNIX users.
  • TCP/IP Sockets in C

    Practical Guide for Programmers
    • 1st Edition
    • Michael J. Donahoo + 1 more
    • English
    For example code from the text, Winsock adaptations of text code, sample programming exercises and more,click on the grey "COMPANION SITE" button to the right. Note: This title was formerly known as Pocket Guide to TCP/IP Socket Programming in C, ISBN 1-55860-686-6.TCP/IP Sockets in C: Practical Guide for Programmers is a quick and affordable way to gain the knowledge and skills you need to develop sophisticated and powerful networked-based programs using sockets. Written by two experienced networking instructors, this book provides a series of examples that demonstrate basic sockets techniques for clients and servers. Using plenty of real-world examples, this book is a complete beginner's guide to socket programming and a springboard to more advanced networking topics, including multimedia protocols.
  • Subdivision Methods for Geometric Design

    A Constructive Approach
    • 1st Edition
    • Joe Warren + 1 more
    • English
    Subdivision Methods for Geometric Design provides computer graphics students and designers with a comprehensive guide to subdivision methods, including the background information required to grasp underlying concepts, techniques for manipulating subdivision algorithms to achieve specific effects, and a wide array of digital resources on a dynamic companion Web site. Subdivision Methods promises to be a groundbreaking book, important for both advanced students and working professionals in the field of computer graphics.
  • Hack Proofing Windows 2000 Server

    • 1st Edition
    • Syngress
    • English
    The complete, authoritative guide to protecting your Windows 2000 Network"Essential reading for your IT security organization." -Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5.
  • Hack Proofing Sun Solaris 8

    • 1st Edition
    • Syngress
    • English
    The only way to stop a hacker is to think like one! Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers.