Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Social Media in the Marketing Context

    A State of the Art Analysis and Future Directions
    • 1st Edition
    • Cherniece J. Plume + 2 more
    • English
    Social media has provided endless opportunities for marketers, fuelling their desire to learn more about their consumers through this dynamic online environment. Yet many organisations are finding it difficult to create effective marketing strategies, making decisions that are based on research that is highly focused on the nature and boundaries of social media. The changing behaviour of consumers, variety of platforms and changing culture indicates that much of the research around this topic is still highly fragmented. Social Media in the Marketing Context: A State of the Art Analysis and Future Directions provides a comprehensive overview of the current literature surrounding social media and the marketing discipline, highlighting future development opportunities in both knowledge and practice.
  • Penetration Tester's Open Source Toolkit

    • 4th Edition
    • Jeremy Faircloth
    • English
    Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.
  • Protocol Specification, Testing and Verification, XII

    Proceedings of the IFIP TC6/WG6.1. Twelfth International Symposium on Protocol Specification, Testing and Verification, Lake Buena Vista, Florida, U.S.A., 22-25 June, 1992
    • 1st Edition
    • Volume 8
    • R.J. Linn + 1 more
    • English
    For more than a decade, researchers and engineers have been addressing the problem of the application of formal description techniques to protocol specification, implementation, testing and verification. This book identifies the many successes that have been achieved within the industrial framework and the difficulties encountered in applying theoretical methods to practical situations.Issues discussed include: testing and certification; verification; validation; environments and automated tools; formal specifications; protocol conversion; implementation; specification languages and models.Consideration is also given to the concerns surrounding education available to students and the need to upgrade and develop this through sponsorship of a study of an appropriate curriculum at both undergraduate and graduate levels. It is hoped this publication will stimulate such support and inspire further research in this important arena.
  • Sentiment Analysis in Social Networks

    • 1st Edition
    • Federico Alberto Pozzi + 3 more
    • English
    The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker. Sentiment analysis has gained even more value with the advent and growth of social networking. Sentiment Analysis in Social Networks begins with an overview of the latest research trends in the field. It then discusses the sociological and psychological processes underling social network interactions. The book explores both semantic and machine learning models and methods that address context-dependent and dynamic text in online social networks, showing how social network streams pose numerous challenges due to their large-scale, short, noisy, context- dependent and dynamic nature. Further, this volume: Takes an interdisciplinary approach from a number of computing domains, including natural language processing, machine learning, big data, and statistical methodologies Provides insights into opinion spamming, reasoning, and social network analysis Shows how to apply sentiment analysis tools for a particular application and domain, and how to get the best results for understanding the consequences Serves as a one-stop reference for the state-of-the-art in social media analytics
  • Quantum Inspired Computational Intelligence

    Research and Applications
    • 1st Edition
    • Siddhartha Bhattacharyya + 2 more
    • English
    Quantum Inspired Computational Intelligence: Research and Applications explores the latest quantum computational intelligence approaches, initiatives, and applications in computing, engineering, science, and business. The book explores this emerging field of research that applies principles of quantum mechanics to develop more efficient and robust intelligent systems. Conventional computational intelligence—or soft computing—is conjoined with quantum computing to achieve this objective. The models covered can be applied to any endeavor which handles complex and meaningful information.
  • RIoT Control

    Understanding and Managing Risks and the Internet of Things
    • 1st Edition
    • Tyson Macaulay
    • English
    RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
  • Mobile Security and Privacy

    Advances, Challenges and Future Research Directions
    • 1st Edition
    • Man Ho Au + 1 more
    • English
    Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.
  • Computers as Components

    Principles of Embedded Computing System Design
    • 4th Edition
    • Marilyn Wolf
    • English
    Computers as Components: Principles of Embedded Computing System Design, Fourth Edition, continues to focus on foundational content in embedded systems technology and design while introducing new content on security and safety, the design of Internet-of-Things devices and systems, and wireless communications standards like Bluetooth® and ZigBee®.
  • Social Network Analysis of Disaster Response, Recovery, and Adaptation

    • 1st Edition
    • Eric C Jones + 1 more
    • English
    Social Network Analysis of Disaster Response, Recovery, and Adaptation covers systematic social network analysis and how people and institutions function in disasters, after disasters, and the ways they adapt to hazard settings. As hazards become disasters, the opportunities and constraints for maintaining a safe and secure life and livelihood become too strained for many people. Anecdotally, and through many case studies, we know that social interactions exacerbate or mitigate those strains, necessitating a concerted, intellectual effort to understand the variation in how ties within, and outside, communities respond and are affected by hazards and disasters.
  • Data Hiding Techniques in Windows OS

    A Practical Approach to Investigation and Defense
    • 1st Edition
    • Nihad Ahmad Hassan + 1 more
    • English
    "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.