Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Network Function Virtualization

    • 1st Edition
    • Ken Gray + 1 more
    • English
    Network Function Virtualization provides an architectural, vendor-neutral level overview of the issues surrounding the large levels of data storage and transmission requirements needed for today's companies, also enumerating the benefits of NFV for the enterprise. Drawing upon years of practical experience, and using numerous examples and an easy-to-understand framework, authors Tom Nadeau and Ken Gary discuss the relevancy of NFV and how it can be effectively used to create and deploy new services. Readers will learn how to determine if network function virtualization is right for their enterprise network, be able to use hands-on, step-by-step guides to design, deploy, and manage NFV in an enterprise, and learn how to evaluate all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight.
  • Certifiable Software Applications 1

    Main Processes
    • 1st Edition
    • Jean-Louis Boulanger
    • English
    Certifiable Software Applications 1: Main Processes is dedicated to the establishment of quality assurance and safety assurance. It establishes the context for achieving a certifiable software application. In it, the author covers recent developments such as the module, component and product line approach. Applicable standards are presented and security principles are described and discussed. Finally, the requirements for mastering quality and configuration are explained. In this book the reader will find the fundamental practices from the field and an introduction to the concept of software application.
  • Advances in Computers

    • 1st Edition
    • Volume 102
    • English
    Advances in Computers, an ongoing series since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references and continue to be of significant, lasting value in this rapidly expanding field.
  • Passive and Discrete Circuits

    • 1st Edition
    • Volume 2
    • R M MARSTON
    • English
    Passive components and discrete devices form the bedrocks on which all modern electronic circuits are built. This Pocket Book is a single volume applications guide to the most popular and useful of these devices, containing 670 diagrams, tables and carefully selected practical circuits. Throughout the Pocket Book great emphasis is placed on practical user information and circuitry. All of the active devices used are modestly priced and readily available.The book is split into twenty chapters. The first three explain important practical features of the ranges of modern passive electrical components, including relays, meters, motors, sensors and transducers. Chapters 4 to 6 deal with the design ofpractical attenuators, filters, and 'bridge' circuits. The remaining fourteen chapters deal with specific types of discrete semiconductor device, including various types of diode, transistors, JFETs, MOSFETs, VMOS devices, UJTs, SCRs, TRIACs, and various optoelectronic devices. This easy-to-read, concise, highly practical and largely non-mathematical volume is aimed directly at engineers, technicians, students and competent experimenters who can build a design directly from a circuit diagram, and if necessary modify it to suit individual needs. Ray Marston is the author of the multi-volume series of Newnes Circuits Manuals. His magazine articles on circuit design appear regularly in a wide range of publications worldwide.
  • Information Security Science

    Measuring the Vulnerability to Data Compromises
    • 1st Edition
    • Carl Young
    • English
    Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
  • 26th European Symposium on Computer Aided Process Engineering

    Part A and B
    • 1st Edition
    • Volume 38
    • English
    26th European Symposium on Computer Aided Process Engineering contains the papers presented at the 26th European Society of Computer-Aided Process Engineering (ESCAPE) Event held at Portorož Slovenia, from June 12th to June 15th, 2016. Themes discussed at the conference include Process-product Synthesis, Design and Integration, Modelling, Numerical analysis, Simulation and Optimization, Process Operations and Control and Education in CAPE/PSE.
  • Communications for Control in Cyber Physical Systems

    Theory, Design and Applications in Smart Grids
    • 1st Edition
    • Husheng Li
    • English
    Communications and Controls in Cyber Physical Systems: Theory, Design and Applications in Smart Grids provides readers with all they need to know about cyber physical systems (CPSs), such as smart grids, which have attracted intensive studies in recent years. Communications and controls are of key importance for maintaining and stabilizing the operation of the physical dynamics in these complicated systems. This book presents a systematic treatment on the communication and control aspects of CPSs, along with applications to the smart grid in four parts, including the basics of CPS, communications and controls, an explanation of the integration with CPS, coverage of controls with information constraints in CPS, and an applications oriented focus on smart grids as a CPS. Drawing upon years of practical experience and using numerous examples and illustrations, the authors’ discuss key communication and controls design methods that can be integrated into a CPS, how communication and control schemes can be applied in practical systems such as smart grids, new directions and approaches for traditional engineers and researchers in communications, and controls and power systems as they relates to CPSs.
  • DNS Security

    Defending the Domain Name System
    • 1st Edition
    • Allan Liska + 1 more
    • English
    DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.
  • Participatory Health Through Social Media

    • 1st Edition
    • Shabbir Syed-Abdul + 2 more
    • English
    Participatory Health through Social Media explores how traditional models of healthcare can be delivered differently through social media and online games, and how these technologies are changing the relationship between patients and healthcare professionals, as well as their impact on health behavior change. The book also examines how the hospitals, public health authorities, and inspectorates are currently using social media to facilitate both information distribution and collection. Also looks into the opportunities and risks to record and analyze epidemiologically relevant data retrieved from the Internet, social media, sensor data, and other digital sources. The book encompasses topics such as patient empowerment, gamification and social games, and the relationships between social media, health behavior change, and health communication crisis during epidemics. Additionally, the book analyzes the possibilities of big data generated through social media. Authored by IMIA Social Media working group, this book is a valuable resource for healthcare researchers and professionals, as well as clinicians interested in using new media as part of their practice or research.
  • From Information Literacy to Social Epistemology

    Insights from Psychology
    • 1st Edition
    • Anthony Anderson + 1 more
    • English
    From Information Literacy to Social Epistemology: Insights from Psychology focuses on information and the ways in which information literacy relates to critical thinking in education, the workplace, and in our social life. The broad context for our interest is the development in internet technologies often characterised by terms like the ‘digital age’, leading to questions of digital participation, digital divides, and the role of thinking in the information society. In short, to what extent is the ‘digital age’ engendering changes in learning directed towards the better use of information, and in addition, encouraging or even requiring improvements in critical thinking?