Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Parallel Programming with OpenACC

    • 1st Edition
    • Rob Farber
    • English
    Parallel Programming with OpenACC is a modern, practical guide to implementing dependable computing systems. The book explains how anyone can use OpenACC to quickly ramp-up application performance using high-level code directives called pragmas. The OpenACC directive-based programming model is designed to provide a simple, yet powerful, approach to accelerators without significant programming effort. Author Rob Farber, working with a team of expert contributors, demonstrates how to turn existing applications into portable GPU accelerated programs that demonstrate immediate speedups. The book also helps users get the most from the latest NVIDIA and AMD GPU plus multicore CPU architectures (and soon for Intel® Xeon Phi™ as well). Downloadable example codes provide hands-on OpenACC experience for common problems in scientific, commercial, big-data, and real-time systems. Topics include writing reusable code, asynchronous capabilities, using libraries, multicore clusters, and much more. Each chapter explains how a specific aspect of OpenACC technology fits, how it works, and the pitfalls to avoid. Throughout, the book demonstrates how the use of simple working examples that can be adapted to solve application needs.
  • Network Storage

    Tools and Technologies for Storing Your Company’s Data
    • 1st Edition
    • James O'Reilly
    • English
    Network Storage: Tools and Technologies for Storing Your Company’s Data explains the changes occurring in storage, what they mean, and how to negotiate the minefields of conflicting technologies that litter the storage arena, all in an effort to help IT managers create a solid foundation for coming decades. The book begins with an overview of the current state of storage and its evolution from the network perspective, looking closely at the different protocols and connection schemes and how they differentiate in use case and operational behavior. The book explores the software changes that are motivating this evolution, ranging from data management, to in-stream processing and storage in virtual systems, and changes in the decades-old OS stack. It explores Software-Defined Storage as a way to construct storage networks, the impact of Big Data, high-performance computing, and the cloud on storage networking. As networks and data integrity are intertwined, the book looks at how data is split up and moved to the various appliances holding that dataset and its impact. Because data security is often neglected, users will find a comprehensive discussion on security issues that offers remedies that can be applied. The book concludes with a look at technologies on the horizon that will impact storage and its networks, such as NVDIMMs, The Hybrid Memory Cube, VSANs, and NAND Killers.
  • Successful Fundraising for the Academic Library

    Philanthropy in Higher Education
    • 1st Edition
    • Kathryn Dilworth + 1 more
    • English
    Successful Fundraising for the Academic Library: Philanthropy in Higher Education covers fundraising, a task that is often grouped into a combination role that may include, for example, the university museum or performance venue, thus diluting the opportunity for successful fundraising. Because the traditional model for higher education fundraising entails the cultivation of alumni from specific departments and colleges, the library is traditionally left out, often becoming a low-performing development area with smaller appropriations for fundraising positions. Most higher education development professionals consider the library fundraising position a stepping stone into another position with higher pay and more potential for professional advancement down the road rather than as a focus for their career. However, for universities that invest in development professionals who know how to leverage the mission of libraries to the larger alumni and friend community, the results include innovative and successful approaches to messaging that resonates with donors. This book provides information that applies to all fundraising professionals and academic leaders looking to strengthen their programs with philanthropic support, even those beyond university libraries.
  • Complex Systems and Clouds

    A Self-Organization and Self-Management Perspective
    • 1st Edition
    • Dan C. Marinescu
    • English
    Complex Systems and Clouds: A Self-Organization and Self-Management Perspective provides insights into the intricate world of self-organizing systems. Large scale distributed computer systems have evolved into very complex systems and are at the point where they need to borrow self-adapting organizing concepts from nature. The book explores complexity in big distributed systems and in the natural processes in physics and chemistry, building a platform for understanding how self-organization in big distributed systems can be achieved. It goes beyond the theoretical description of self-organization to present principles for designing self-organizing systems, and concludes by showing the need for a paradigm shift in the development of large-scale systems from strictly deterministic to non-deterministic and adaptive.
  • Building a Practical Information Security Program

    • 1st Edition
    • Jason Andress + 1 more
    • English
    Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.
  • Data Mining

    Practical Machine Learning Tools and Techniques
    • 4th Edition
    • Ian H. Witten + 3 more
    • English
    Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches. Extensive updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including substantial new chapters on probabilistic methods and on deep learning. Accompanying the book is a new version of the popular WEKA machine learning software from the University of Waikato. Authors Witten, Frank, Hall, and Pal include today's techniques coupled with the methods at the leading edge of contemporary research. Please visit the book companion website at https://www.cs.waika... It contains Powerpoint slides for Chapters 1-12. This is a very comprehensive teaching resource, with many PPT slides covering each chapter of the book Online Appendix on the Weka workbench; again a very comprehensive learning aid for the open source software that goes with the book Table of contents, highlighting the many new sections in the 4th edition, along with reviews of the 1st edition, errata, etc.
  • Physically Based Rendering

    From Theory to Implementation
    • 3rd Edition
    • Matt Pharr + 2 more
    • English
    Physically Based Rendering: From Theory to Implementation, Third Edition, describes both the mathematical theory behind a modern photorealistic rendering system and its practical implementation. Through a method known as 'literate programming', the authors combine human-readable documentation and source code into a single reference that is specifically designed to aid comprehension. The result is a stunning achievement in graphics education. Through the ideas and software in this book, users will learn to design and employ a fully-featured rendering system for creating stunning imagery. This completely updated and revised edition includes new coverage on ray-tracing hair and curves primitives, numerical precision issues with ray tracing, LBVHs, realistic camera models, the measurement equation, and much more. It is a must-have, full color resource on physically-based rendering.
  • Social Media in the Marketing Context

    A State of the Art Analysis and Future Directions
    • 1st Edition
    • Cherniece J. Plume + 2 more
    • English
    Social media has provided endless opportunities for marketers, fuelling their desire to learn more about their consumers through this dynamic online environment. Yet many organisations are finding it difficult to create effective marketing strategies, making decisions that are based on research that is highly focused on the nature and boundaries of social media. The changing behaviour of consumers, variety of platforms and changing culture indicates that much of the research around this topic is still highly fragmented. Social Media in the Marketing Context: A State of the Art Analysis and Future Directions provides a comprehensive overview of the current literature surrounding social media and the marketing discipline, highlighting future development opportunities in both knowledge and practice.
  • Protocol Specification, Testing and Verification, XII

    Proceedings of the IFIP TC6/WG6.1. Twelfth International Symposium on Protocol Specification, Testing and Verification, Lake Buena Vista, Florida, U.S.A., 22-25 June, 1992
    • 1st Edition
    • Volume 8
    • R.J. Linn + 1 more
    • English
    For more than a decade, researchers and engineers have been addressing the problem of the application of formal description techniques to protocol specification, implementation, testing and verification. This book identifies the many successes that have been achieved within the industrial framework and the difficulties encountered in applying theoretical methods to practical situations.Issues discussed include: testing and certification; verification; validation; environments and automated tools; formal specifications; protocol conversion; implementation; specification languages and models.Consideration is also given to the concerns surrounding education available to students and the need to upgrade and develop this through sponsorship of a study of an appropriate curriculum at both undergraduate and graduate levels. It is hoped this publication will stimulate such support and inspire further research in this important arena.
  • Penetration Tester's Open Source Toolkit

    • 4th Edition
    • Jeremy Faircloth
    • English
    Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.