Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Building a Practical Information Security Program

      • 1st Edition
      • October 3, 2016
      • Jason Andress + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 0 4 2 5
      • eBook
        9 7 8 0 1 2 8 0 2 0 8 8 3
      Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.
    • Data Mining

      • 4th Edition
      • October 1, 2016
      • Ian H. Witten + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 2 9 1 5
      • eBook
        9 7 8 0 1 2 8 0 4 3 5 7 8
      Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches. Extensive updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including substantial new chapters on probabilistic methods and on deep learning. Accompanying the book is a new version of the popular WEKA machine learning software from the University of Waikato. Authors Witten, Frank, Hall, and Pal include today's techniques coupled with the methods at the leading edge of contemporary research. Please visit the book companion website at https://www.cs.waika... It contains Powerpoint slides for Chapters 1-12. This is a very comprehensive teaching resource, with many PPT slides covering each chapter of the book Online Appendix on the Weka workbench; again a very comprehensive learning aid for the open source software that goes with the book Table of contents, highlighting the many new sections in the 4th edition, along with reviews of the 1st edition, errata, etc.
    • Physically Based Rendering

      • 3rd Edition
      • September 30, 2016
      • Matt Pharr + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 6 4 5 0
      • eBook
        9 7 8 0 1 2 8 0 0 7 0 9 9
      Physically Based Rendering: From Theory to Implementation, Third Edition, describes both the mathematical theory behind a modern photorealistic rendering system and its practical implementation. Through a method known as 'literate programming', the authors combine human-readable documentation and source code into a single reference that is specifically designed to aid comprehension. The result is a stunning achievement in graphics education. Through the ideas and software in this book, users will learn to design and employ a fully-featured rendering system for creating stunning imagery. This completely updated and revised edition includes new coverage on ray-tracing hair and curves primitives, numerical precision issues with ray tracing, LBVHs, realistic camera models, the measurement equation, and much more. It is a must-have, full color resource on physically-based rendering.
    • Social Media in the Marketing Context

      • 1st Edition
      • September 29, 2016
      • Cherniece J. Plume + 2 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 1 7 5 4 8
      • eBook
        9 7 8 0 0 8 1 0 1 7 5 7 9
      Social media has provided endless opportunities for marketers, fuelling their desire to learn more about their consumers through this dynamic online environment. Yet many organisations are finding it difficult to create effective marketing strategies, making decisions that are based on research that is highly focused on the nature and boundaries of social media. The changing behaviour of consumers, variety of platforms and changing culture indicates that much of the research around this topic is still highly fragmented. Social Media in the Marketing Context: A State of the Art Analysis and Future Directions provides a comprehensive overview of the current literature surrounding social media and the marketing discipline, highlighting future development opportunities in both knowledge and practice.
    • Penetration Tester's Open Source Toolkit

      • 4th Edition
      • September 20, 2016
      • Jeremy Faircloth
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 4 9 1
      • eBook
        9 7 8 0 1 2 8 0 2 3 5 3 2
      Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.
    • Protocol Specification, Testing and Verification, XII

      • 1st Edition
      • Volume 8
      • September 20, 2016
      • R.J. Linn + 1 more
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 3 3 4 9
      For more than a decade, researchers and engineers have been addressing the problem of the application of formal description techniques to protocol specification, implementation, testing and verification. This book identifies the many successes that have been achieved within the industrial framework and the difficulties encountered in applying theoretical methods to practical situations.Issues discussed include: testing and certification; verification; validation; environments and automated tools; formal specifications; protocol conversion; implementation; specification languages and models.Consideration is also given to the concerns surrounding education available to students and the need to upgrade and develop this through sponsorship of a study of an appropriate curriculum at both undergraduate and graduate levels. It is hoped this publication will stimulate such support and inspire further research in this important arena.
    • Sentiment Analysis in Social Networks

      • 1st Edition
      • September 15, 2016
      • Federico Alberto Pozzi + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 1 2 4
      • eBook
        9 7 8 0 1 2 8 0 4 4 3 8 4
      The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker. Sentiment analysis has gained even more value with the advent and growth of social networking. Sentiment Analysis in Social Networks begins with an overview of the latest research trends in the field. It then discusses the sociological and psychological processes underling social network interactions. The book explores both semantic and machine learning models and methods that address context-dependent and dynamic text in online social networks, showing how social network streams pose numerous challenges due to their large-scale, short, noisy, context- dependent and dynamic nature. Further, this volume: Takes an interdisciplinary approach from a number of computing domains, including natural language processing, machine learning, big data, and statistical methodologies Provides insights into opinion spamming, reasoning, and social network analysis Shows how to apply sentiment analysis tools for a particular application and domain, and how to get the best results for understanding the consequences Serves as a one-stop reference for the state-of-the-art in social media analytics
    • RIoT Control

      • 1st Edition
      • September 15, 2016
      • Tyson Macaulay
      • English
      • Paperback
        9 7 8 0 1 2 4 1 9 9 7 1 2
      • eBook
        9 7 8 0 1 2 4 1 9 9 9 0 3
      RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
    • Quantum Inspired Computational Intelligence

      • 1st Edition
      • September 15, 2016
      • Siddhartha Bhattacharyya + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 0 9 4
      • eBook
        9 7 8 0 1 2 8 0 4 4 3 7 7
      Quantum Inspired Computational Intelligence: Research and Applications explores the latest quantum computational intelligence approaches, initiatives, and applications in computing, engineering, science, and business. The book explores this emerging field of research that applies principles of quantum mechanics to develop more efficient and robust intelligent systems. Conventional computational intelligence—or soft computing—is conjoined with quantum computing to achieve this objective. The models covered can be applied to any endeavor which handles complex and meaningful information.
    • Mobile Security and Privacy

      • 1st Edition
      • September 13, 2016
      • Man Ho Au + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 6 2 9 6
      • eBook
        9 7 8 0 1 2 8 0 4 7 4 6 0
      Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.