Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Securing the Internet of Things

    • 1st Edition
    • Shancang Li + 1 more
    • English
    Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
  • Wheeled Mobile Robotics

    From Fundamentals Towards Autonomous Systems
    • 1st Edition
    • Gregor Klancar + 3 more
    • English
    Wheeled Mobile Robotics: From Fundamentals Towards Autonomous Systemscovers the main topics from the wide area of mobile robotics, explaining all applied theory and application. The book gives the reader a good foundation, enabling them to continue to more advanced topics. Several examples are included for better understanding, many of them accompanied by short MATLAB® script code making it easy to reuse in practical work. The book includes several examples of discussed methods and projects for wheeled mobile robots and some advanced methods for their control and localization. It is an ideal resource for those seeking an understanding of robotics, mechanics, and control, and for engineers and researchers in industrial and other specialized research institutions in the field of wheeled mobile robotics. Beginners with basic math knowledge will benefit from the examples, and engineers with an understanding of basic system theory and control will find it easy to follow the more demanding fundamental parts and advanced methods explained.
  • Human Recognition in Unconstrained Environments

    Using Computer Vision, Pattern Recognition and Machine Learning Methods for Biometrics
    • 1st Edition
    • Maria De Marsico + 2 more
    • English
    Human Recognition in Unconstrained Environments provides a unique picture of the complete ‘in-the-wild’ biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents. Coverage includes: Data hardware architecture fundamentals Background subtraction of humans in outdoor scenes Camera synchronization Biometric traits: Real-time detection and data segmentation Biometric traits: Feature encoding / matching Fusion at different levels Reaction against security incidents Ethical issues in non-cooperative biometric recognition in public spaces With this book readers will learn how to: Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security Choose the most suited biometric traits and recognition methods for uncontrolled settings Evaluate the performance of a biometric system on real world data
  • Federal Cloud Computing

    The Definitive Guide for Cloud Service Providers
    • 2nd Edition
    • Matthew Metheny
    • English
    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.
  • Creativity in Computing and DataFlow SuperComputing

    • 1st Edition
    • Volume 104
    • English
    Creativity in Computing and DataFlow Supercomputing, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. In addition, it provides contributors with a medium in which they can explore topics in greater depth and breadth than journal articles typically allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.
  • Misch's Avoiding Complications in Oral Implantology

    • 1st Edition
    • Carl E. Misch + 1 more
    • English
    See how to effectively manage ALL dental implant complications throughout ALL phases of treatment! Avoiding Complications in Oral Implantology provides evidence-based management protocols for a wide range of implant problems such as placement complications, malpositioning, bleeding, infection, and nerve injuries. Hundreds of high-quality, full-color photos and illustrations clearly demonstrate the complications and their resolution. Edited by Carl Misch and Randolph Resnik — both well-known names in dental implantology and prosthodontics — and with a team of expert contributors, this authoritative guide helps you handle the implant-related complications that can occur as more and more patients choose dental implants.
  • Computing and Visualization for Intravascular Imaging and Computer-Assisted Stenting

    • 1st Edition
    • Simone Balocco + 4 more
    • English
    Computing and Visualization for Intravascular Imaging and Computer-Assisted Stenting presents imaging, treatment, and computed assisted technological techniques for diagnostic and intraoperative vascular imaging and stenting. These techniques offer increasingly useful information on vascular anatomy and function, and are poised to have a dramatic impact on the diagnosis, analysis, modeling, and treatment of vascular diseases. After setting out the technical and clinical challenges of vascular imaging and stenting, the book gives a concise overview of the basics before presenting state-of-the-art methods for solving these challenges. Readers will learn about the main challenges in endovascular procedures, along with new applications of intravascular imaging and the latest advances in computer assisted stenting.
  • Rugged Embedded Systems

    Computing in Harsh Environments
    • 1st Edition
    • Augusto Vega + 2 more
    • English
    Rugged Embedded Systems: Computing in Harsh Environments describes how to design reliable embedded systems for harsh environments, including architectural approaches, cross-stack hardware/software techniques, and emerging challenges and opportunities. A "harsh environment" presents inherent characteristics, such as extreme temperature and radiation levels, very low power and energy budgets, strict fault tolerance and security constraints, etc. that challenge the computer system in its design and operation. To guarantee proper execution (correct, safe, and low-power) in such scenarios, this contributed work discusses multiple layers that involve firmware, operating systems, and applications, as well as power management units and communication interfaces. This book also incorporates use cases in the domains of unmanned vehicles (advanced cars and micro aerial robots) and space exploration as examples of computing designs for harsh environments.
  • E-Health Two-Sided Markets

    Implementation and Business Models
    • 1st Edition
    • Vivian Vimarlund
    • English
    E-health two-side Markets: Implementation and Business Models presents empirical models and suggestions that focus on how to remove barriers to deliver online services across borders and how actual barriers affect business models in a two-sided market with regard to eHealth. Technological innovation and business developments in online trade result in fast-evolving markets with the continuous emergence of new products and services, thus requiring a specific approach. This book discusses how to develop innovative and cost-effective implementation strategies for complex organizations, the importance of barriers and facilitators for two-sided markets when implementing e-health services and/or IT based innovations, which pre-requisites have to be achieved in complex organizations that act in two-sided markets when implementing e-services, the ecosystem for implementation of services and innovations in complex organizations, and its effects for business models. This book is a valuable source for researchers in medical informatics, and is also ideal for stakeholders, consultants, advisors, and product designers involved in eHealth services.
  • Certifiable Software Applications 2

    Support Processes
    • 1st Edition
    • Jean-Louis Boulanger
    • English
    Certifiable Software Applications 2: Support Processes explains the process to achieve a certifiable application. This concerns several major topics, skill management, data preparation, requirement management, software verification, and software validation. In addition, analysis of the impact of the use of COTS and pre-existing software on certifiable software is presented. Finally, the last support process concerns the management of commercial tools, the creation of a specific tools, and therefore the qualification of tools, which is based on their impact on the final software.