Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Sentiment Analysis in Social Networks

    • 1st Edition
    • Federico Alberto Pozzi + 3 more
    • English
    The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker. Sentiment analysis has gained even more value with the advent and growth of social networking. Sentiment Analysis in Social Networks begins with an overview of the latest research trends in the field. It then discusses the sociological and psychological processes underling social network interactions. The book explores both semantic and machine learning models and methods that address context-dependent and dynamic text in online social networks, showing how social network streams pose numerous challenges due to their large-scale, short, noisy, context- dependent and dynamic nature. Further, this volume: Takes an interdisciplinary approach from a number of computing domains, including natural language processing, machine learning, big data, and statistical methodologies Provides insights into opinion spamming, reasoning, and social network analysis Shows how to apply sentiment analysis tools for a particular application and domain, and how to get the best results for understanding the consequences Serves as a one-stop reference for the state-of-the-art in social media analytics
  • Quantum Inspired Computational Intelligence

    Research and Applications
    • 1st Edition
    • Siddhartha Bhattacharyya + 2 more
    • English
    Quantum Inspired Computational Intelligence: Research and Applications explores the latest quantum computational intelligence approaches, initiatives, and applications in computing, engineering, science, and business. The book explores this emerging field of research that applies principles of quantum mechanics to develop more efficient and robust intelligent systems. Conventional computational intelligence—or soft computing—is conjoined with quantum computing to achieve this objective. The models covered can be applied to any endeavor which handles complex and meaningful information.
  • RIoT Control

    Understanding and Managing Risks and the Internet of Things
    • 1st Edition
    • Tyson Macaulay
    • English
    RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
  • Mobile Security and Privacy

    Advances, Challenges and Future Research Directions
    • 1st Edition
    • Man Ho Au + 1 more
    • English
    Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.
  • Computers as Components

    Principles of Embedded Computing System Design
    • 4th Edition
    • Marilyn Wolf
    • English
    Computers as Components: Principles of Embedded Computing System Design, Fourth Edition, continues to focus on foundational content in embedded systems technology and design while introducing new content on security and safety, the design of Internet-of-Things devices and systems, and wireless communications standards like Bluetooth® and ZigBee®.
  • Building the Agile Enterprise

    With Capabilities, Collaborations and Values
    • 2nd Edition
    • Fred A. Cummins
    • English
    Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition covers advances that make technology more powerful and pervasive while, at the same time, improving alignment of technology with business. Using numerous examples, illustrations, and case studies, Fred Cummins, an industry expert, author and former fellow with EDS and Hewlett Packard, updates his first edition incorporating the following industry developments: The ubiquitous use of the Internet along with intelligent, mobile devices, which have enabled everyone and everything to be connected anytime, anywhere The emergence of a “business architecture” discipline that has driven improvements in business design and transformation practices The development of CMMN (Case Management Model and Notation) that will provide automation to support the collaboration of knowledge workers and managers The development of VDML (Value Delivery Modeling Language) that supports modeling of business design from a management perspective The importance of “big data” management and analysis as a new source of insight into evolution of the business and the ecosystem How the architecture of the agile enterprise and business modeling change enterprise governance, management and innovation Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition is a must have reference for business leaders, CTOs; business architects, information systems architects and business process modeling professionals who wish to close the gap between strategic planning and business operations as well as the gap between business and IT and enhance the creation and delivery of business value.
  • Data Hiding Techniques in Windows OS

    A Practical Approach to Investigation and Defense
    • 1st Edition
    • Nihad Ahmad Hassan + 1 more
    • English
    "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.
  • Advances in GPU Research and Practice

    • 1st Edition
    • Hamid Sarbazi-Azad
    • English
    Advances in GPU Research and Practice focuses on research and practices in GPU based systems. The topics treated cover a range of issues, ranging from hardware and architectural issues, to high level issues, such as application systems, parallel programming, middleware, and power and energy issues. Divided into six parts, this edited volume provides the latest research on GPU computing. Part I: Architectural Solutions focuses on the architectural topics that improve on performance of GPUs, Part II: System Software discusses OS, compilers, libraries, programming environment, languages, and paradigms that are proposed and analyzed to help and support GPU programmers. Part III: Power and Reliability Issues covers different aspects of energy, power, and reliability concerns in GPUs. Part IV: Performance Analysis illustrates mathematical and analytical techniques to predict different performance metrics in GPUs. Part V: Algorithms presents how to design efficient algorithms and analyze their complexity for GPUs. Part VI: Applications and Related Topics provides use cases and examples of how GPUs are used across many sectors.
  • Eleventh Hour CISSP®

    Study Guide
    • 3rd Edition
    • Joshua Feldman + 2 more
    • English
    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.
  • Coding for Penetration Testers

    Building Better Tools
    • 2nd Edition
    • Jason Andress + 1 more
    • English
    Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.