Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Windows Registry Forensics

      • 2nd Edition
      • March 3, 2016
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 2 9 1 6
      • eBook
        9 7 8 0 1 2 8 0 3 3 3 5 7
      Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.
    • Protocol Specification, Testing and Verification, XII

      • 1st Edition
      • Volume 8
      • September 20, 2016
      • R.J. Linn + 1 more
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 3 3 4 9
      For more than a decade, researchers and engineers have been addressing the problem of the application of formal description techniques to protocol specification, implementation, testing and verification. This book identifies the many successes that have been achieved within the industrial framework and the difficulties encountered in applying theoretical methods to practical situations.Issues discussed include: testing and certification; verification; validation; environments and automated tools; formal specifications; protocol conversion; implementation; specification languages and models.Consideration is also given to the concerns surrounding education available to students and the need to upgrade and develop this through sponsorship of a study of an appropriate curriculum at both undergraduate and graduate levels. It is hoped this publication will stimulate such support and inspire further research in this important arena.
    • FTTx Networks

      • 1st Edition
      • November 11, 2016
      • James Farmer + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 3 7 8
      • eBook
        9 7 8 0 1 2 8 0 0 4 5 8 6
      FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave rise to FTTX, provides a survey of the available FTTX technologies, and gives users the state-of-the-art knowledge needed for successful deployment of FTTX. The book includes hands-on project planning engineering design and operations checklists, as well as recommended best practices for configuring FTTH systems and the data networks preceding them for IPTV, voice, and data, with case studies of actual FTTH systems and a methodology for predicting the performance of real systems. This book is a must-read for all network engineers, technical businesspeople, and technical specialists engaged in building FTTX networks, from technology selection, to fielding the network in production, to implementation.
    • From Information Literacy to Social Epistemology

      • 1st Edition
      • June 8, 2016
      • Anthony Anderson + 1 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 5 4 5 3
      • eBook
        9 7 8 0 0 8 1 0 0 5 4 8 4
      From Information Literacy to Social Epistemology: Insights from Psychology focuses on information and the ways in which information literacy relates to critical thinking in education, the workplace, and in our social life. The broad context for our interest is the development in internet technologies often characterised by terms like the ‘digital age’, leading to questions of digital participation, digital divides, and the role of thinking in the information society. In short, to what extent is the ‘digital age’ engendering changes in learning directed towards the better use of information, and in addition, encouraging or even requiring improvements in critical thinking?
    • Transliteracy in Complex Information Environments

      • 1st Edition
      • October 24, 2016
      • Suzana Sukovic
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 8 7 5 1
      • eBook
        9 7 8 0 0 8 1 0 0 9 0 1 7
      Transliteracy in Complex Information Environments considers this relatively new concept, which has attracted a great deal of interest in the library and information field, particularly among practitioners. The notion of transliteracy arises in the context of increasingly complex information and communication environments characterised by multimodality and new roles of creators and consumers. Transliteracy concerns the ability to apply and transfer a range of skills and contextual insights to a variety of settings. Rather than focusing on any one skillset or technology, transliteracy is about fluidity of movement across a range of contexts. This book is concerned with processes of learning and knowledge creation. An understanding of transliteracy emergesfrom research data gathered in university and high school settings. Transliteracy is considered in relation to other literacies as an overarching framework. Applications in education and lifelong learning are discussed. Social aspects of transliteracy are considered in relation to academic cultures and broader social trends, particularly hybrid cultures
    • Building the Agile Enterprise

      • 2nd Edition
      • September 8, 2016
      • Fred A. Cummins
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 1 6 0 3
      • eBook
        9 7 8 0 1 2 8 0 5 2 9 2 1
      Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition covers advances that make technology more powerful and pervasive while, at the same time, improving alignment of technology with business. Using numerous examples, illustrations, and case studies, Fred Cummins, an industry expert, author and former fellow with EDS and Hewlett Packard, updates his first edition incorporating the following industry developments: The ubiquitous use of the Internet along with intelligent, mobile devices, which have enabled everyone and everything to be connected anytime, anywhere The emergence of a “business architecture” discipline that has driven improvements in business design and transformation practices The development of CMMN (Case Management Model and Notation) that will provide automation to support the collaboration of knowledge workers and managers The development of VDML (Value Delivery Modeling Language) that supports modeling of business design from a management perspective The importance of “big data” management and analysis as a new source of insight into evolution of the business and the ecosystem How the architecture of the agile enterprise and business modeling change enterprise governance, management and innovation Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition is a must have reference for business leaders, CTOs; business architects, information systems architects and business process modeling professionals who wish to close the gap between strategic planning and business operations as well as the gap between business and IT and enhance the creation and delivery of business value.
    • Building a Practical Information Security Program

      • 1st Edition
      • October 3, 2016
      • Jason Andress + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 0 4 2 5
      • eBook
        9 7 8 0 1 2 8 0 2 0 8 8 3
      Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.
    • Social Network Analysis of Disaster Response, Recovery, and Adaptation

      • 1st Edition
      • September 9, 2016
      • Eric C Jones + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 1 9 6 2
      • eBook
        9 7 8 0 1 2 8 0 5 2 8 3 9
      Social Network Analysis of Disaster Response, Recovery, and Adaptation covers systematic social network analysis and how people and institutions function in disasters, after disasters, and the ways they adapt to hazard settings. As hazards become disasters, the opportunities and constraints for maintaining a safe and secure life and livelihood become too strained for many people. Anecdotally, and through many case studies, we know that social interactions exacerbate or mitigate those strains, necessitating a concerted, intellectual effort to understand the variation in how ties within, and outside, communities respond and are affected by hazards and disasters.
    • Hiding Behind the Keyboard

      • 1st Edition
      • March 11, 2016
      • Brett Shavers + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 3 4 0 1
      • eBook
        9 7 8 0 1 2 8 0 3 3 5 2 4
      Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
    • Social Network Sites for Scientists

      • 1st Edition
      • July 22, 2016
      • Jose Luis Ortega
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 5 9 2 7
      • eBook
        9 7 8 0 0 8 1 0 0 5 8 9 7
      Social Network Sites for Scientists: A Quantitative Survey explores the newest social network sites (for example, ResearchGate and Academia.edu) and web bibliographic platforms (Mendeley, Zotero) that have recently emerged for the scholarly community to use in the interchange of information and documents. Chapters describe their main characteristics, what their advantages and limitations are, and the researchers that populate these websites. The surveys included in the book have been conducted following a quantitative approach, and measure the strength of the services provided by the sites in terms of use and activity. In addition, they also discuss the implications of new products in the future of scientific communication and their impact on research activities and evaluation.