Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Advanced Persistent Security

      • 1st Edition
      • November 22, 2016
      • Ira Winkler + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 3 1 6 0
      • eBook
        9 7 8 0 1 2 8 0 9 3 6 5 8
      Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
    • Health Information Exchange: Navigating and Managing a Network of Health Information Systems

      • 1st Edition
      • February 9, 2016
      • Brian Dixon
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 1 3 5 3
      • eBook
        9 7 8 0 1 2 8 0 3 1 5 0 6
      Health Information Exchange (HIE): Navigating and Managing a Network of Health Information Systems allows health professionals to appropriately access, and securely share, patients’ vital medical information electronically, thus improving the speed, quality, safety, and cost of patient care. The book presents foundational knowledge on HIE, covering the broad areas of technology, governance, and policy, providing a concise, yet in-depth, look at HIE that can be used as a teaching tool for universities, healthcare organizations with a training component, certification institutions, and as a tool for self-study for independent learners who want to know more about HIE when studying for certification exams. In addition, it not only provides coverage of the technical, policy, and organizational aspects of HIE, but also touches on HIE as a growing profession. In Part One, the book defines HIE, describing it as an emerging profession within HIT/Informatics. In Part Two, the book provides key information on the policy and governance of HIE, including stakeholder engagement, strategic planning, sustainability, etc. Part Three focuses on the technology behind HIE, defining and describing master person indexes, information infrastructure, interfacing, and messaging, etc. In Part Four, the authors discuss the value of HIE, and how to create and measure it. Finally, in Part Five, the book provides perspectives on the future of HIE, including emerging trends, unresolved challenges, etc.
    • PCs in the Factory

      • 1st Edition
      • January 22, 2016
      • Architecture Technology Architecture Technology Corpor
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 0 4 9 9
      • eBook
        9 7 8 1 4 8 3 2 8 5 0 1 6
      Please note this is a short discount publication.PCs have become as essential to the factory environment as they are to the office environment.This in-depth report examines how specially adapted PCs and peripherals are being established in Factory Process Control and Reporting.The report covers:* Hardware and Software* Typical Applications* Implementation Issues* Case Studies and Real Applications
    • The Data and Analytics Playbook

      • 1st Edition
      • August 12, 2016
      • Lowell Fryman + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 0 7 5
      • eBook
        9 7 8 0 1 2 8 0 2 5 4 7 5
      The Data and Analytics Playbook: Proven Methods for Governed Data and Analytic Quality explores the way in which data continues to dominate budgets, along with the varying efforts made across a variety of business enablement projects, including applications, web and mobile computing, big data analytics, and traditional data integration. The book teaches readers how to use proven methods and accelerators to break through data obstacles to provide faster, higher quality delivery of mission critical programs. Drawing upon years of practical experience, and using numerous examples and an easy to understand playbook, Lowell Fryman, Gregory Lampshire, and Dan Meers discuss a simple, proven approach to the execution of multiple data oriented activities. In addition, they present a clear set of methods to provide reliable governance, controls, risk, and exposure management for enterprise data and the programs that rely upon it. In addition, they discuss a cost-effective approach to providing sustainable governance and quality outcomes that enhance project delivery, while also ensuring ongoing controls. Example activities, templates, outputs, resources, and roles are explored, along with different organizational models in common use today and the ways they can be mapped to leverage playbook data governance throughout the organization.
    • RIoT Control

      • 1st Edition
      • September 15, 2016
      • Tyson Macaulay
      • English
      • Paperback
        9 7 8 0 1 2 4 1 9 9 7 1 2
      • eBook
        9 7 8 0 1 2 4 1 9 9 9 0 3
      RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
    • Emerging Trends in Applications and Infrastructures for Computational Biology, Bioinformatics, and Systems Biology

      • 1st Edition
      • March 22, 2016
      • Hamid R Arabnia + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 2 0 3 8
      • eBook
        9 7 8 0 1 2 8 0 4 2 5 9 5
      Emerging Trends in Applications and Infrastructures for Computational Biology, Bioinformatics, and Systems Biology: Systems and Applications covers the latest trends in the field with special emphasis on their applications. The first part covers the major areas of computational biology, development and application of data-analytical and theoretical methods, mathematical modeling, and computational simulation techniques for the study of biological and behavioral systems. The second part covers bioinformatics, an interdisciplinary field concerned with methods for storing, retrieving, organizing, and analyzing biological data. The book also explores the software tools used to generate useful biological knowledge. The third part, on systems biology, explores how to obtain, integrate, and analyze complex datasets from multiple experimental sources using interdisciplinary tools and techniques, with the final section focusing on big data and the collection of datasets so large and complex that it becomes difficult to process using conventional database management systems or traditional data processing applications.
    • DNS Security

      • 1st Edition
      • June 10, 2016
      • Allan Liska + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 3 0 6 7
      • eBook
        9 7 8 0 1 2 8 0 3 3 3 9 5
      DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.
    • Start-Up Creation

      • 1st Edition
      • May 13, 2016
      • F. Pacheco-Torgal + 5 more
      • English
      • Hardback
        9 7 8 0 0 8 1 0 0 5 4 6 0
      • eBook
        9 7 8 0 0 8 1 0 0 5 4 9 1
      Start-Up Creation: The Smart Eco-efficient Built Environment provides a state-of-the-art review on high-technology applications and explains how these can be applied to improve the eco-efficiency of the built environment. Divided into four main parts, the book explains the key factors behind successful startup companies that grow from university research, including the development of a business plan, the importance of intellectual property, necessary entrepreneurial skills, and innovative thinking. Part Two presents the latest research findings on nano and bio-based technologies and their application and use to the energy efficiency of the built environment. Part Three focuses on the use of genetic algorithms, Big Data, and the Internet of Things applications. Finally, the book ends with an entire section dedicated to App development using selected case studies that illustrate their application and use for monitoring building energy-efficiency.
    • Penetration Tester's Open Source Toolkit

      • 4th Edition
      • September 20, 2016
      • Jeremy Faircloth
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 4 9 1
      • eBook
        9 7 8 0 1 2 8 0 2 3 5 3 2
      Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.
    • The Basics of Cyber Safety

      • 1st Edition
      • August 20, 2016
      • John Sammons + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 5 0 9
      • eBook
        9 7 8 0 1 2 4 1 6 6 3 9 4
      The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.