Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Data Hiding Techniques in Windows OS

      • 1st Edition
      • September 8, 2016
      • Nihad Ahmad Hassan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 4 9 0
      • eBook
        9 7 8 0 1 2 8 0 4 4 9 6 4
      "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.
    • Essential MATLAB for Engineers and Scientists

      • 6th Edition
      • September 1, 2016
      • Daniel T. Valentine + 1 more
      • English
      • eBook
        9 7 8 0 1 2 8 0 5 2 7 1 6
      Essential MATLAB for Engineers and Scientists, Sixth Edition, provides a concise, balanced overview of MATLAB's functionality that facilitates independent learning, with coverage of both the fundamentals and applications. The essentials of MATLAB are illustrated throughout, featuring complete coverage of the software's windows and menus. Program design and algorithm development are presented clearly and intuitively, along with many examples from a wide range of familiar scientific and engineering areas. This updated edition includes the latest MATLAB versions through 2016a, and is an ideal book for a first course on MATLAB, or for an engineering problem-solving course using MATLAB, as well as a self-learning tutorial for professionals and students expected to learn and apply MATLAB.
    • Biostatistics and Computer-based Analysis of Health Data using R

      • 1st Edition
      • July 11, 2016
      • Christophe Lalanne + 1 more
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 8 8 1
      • eBook
        9 7 8 0 0 8 1 0 1 1 7 5 1
      Biostatistics and Computer-Based Analysis of Health Data Using the R Software addresses the concept that many of the actions performed by statistical software comes back to the handling, manipulation, or even transformation of digital data. It is therefore of primary importance to understand how statistical data is displayed and how it can be exploited by software such as R. In this book, the authors explore basic and variable commands, sample comparisons, analysis of variance, epidemiological studies, and censored data. With proposed applications and examples of commands following each chapter, this book allows readers to apply advanced statistical concepts to their own data and software.
    • Executing Windows Command Line Investigations

      • 1st Edition
      • June 11, 2016
      • Chet Hosmer + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 2 6 8 2
      • eBook
        9 7 8 0 1 2 8 0 9 2 7 1 2
      The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.
    • e-Health Systems

      • 1st Edition
      • July 21, 2016
      • Joel J.P.C. Rodrigues + 2 more
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 9 1 1
      • eBook
        9 7 8 0 0 8 1 0 1 2 0 5 5
      e-Health Systems: Theory, Advances and Technical Applications offers a global vision of all the parties involved with e-health system deployment and its operation process, presenting the state of the art in major trends for improving healthcare quality and efficiency of healthcare management. The authors focus on ICT technologies and solutions for health management and healthcare applications, specifically emerging ICT to help reduce costs and improve healthcare quality, and healthcare trends in consumer empowerment and information-rich "Smart Care", with ubiquitous care access from anywhere, at any time, by any authorized person(s) when needed. Split into two parts, this book provides a comprehensive introduction to the concepts of e-health and delves into the processes carried out to store information, as well as the standards that are used; the authors explore applications and implementation of e-health systems, explaining in depth the types of wireless networks and security protocols employed to convert these systems into robust solutions avoiding any kind of data corruption and vulnerabilities.
    • Relational Database Design and Implementation

      • 4th Edition
      • April 15, 2016
      • Jan L. Harrington
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 3 9 9 8
      • eBook
        9 7 8 0 1 2 8 4 9 9 0 2 3
      Relational Database Design and Implementation: Clearly Explained, Fourth Edition, provides the conceptual and practical information necessary to develop a database design and management scheme that ensures data accuracy and user satisfaction while optimizing performance. Database systems underlie the large majority of business information systems. Most of those in use today are based on the relational data model, a way of representing data and data relationships using only two-dimensional tables. This book covers relational database theory as well as providing a solid introduction to SQL, the international standard for the relational database data manipulation language. The book begins by reviewing basic concepts of databases and database design, then turns to creating, populating, and retrieving data using SQL. Topics such as the relational data model, normalization, data entities, and Codd's Rules (and why they are important) are covered clearly and concisely. In addition, the book looks at the impact of big data on relational databases and the option of using NoSQL databases for that purpose.
    • Certifiable Software Applications 2

      • 1st Edition
      • November 28, 2016
      • Jean-Louis Boulanger
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 1 1 8 5
      • eBook
        9 7 8 0 0 8 1 0 1 1 6 4 5
      Certifiable Software Applications 2: Support Processes explains the process to achieve a certifiable application. This concerns several major topics, skill management, data preparation, requirement management, software verification, and software validation. In addition, analysis of the impact of the use of COTS and pre-existing software on certifiable software is presented. Finally, the last support process concerns the management of commercial tools, the creation of a specific tools, and therefore the qualification of tools, which is based on their impact on the final software.
    • Cloud Computing in Ocean and Atmospheric Sciences

      • 1st Edition
      • March 24, 2016
      • Tiffany C Vance + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 1 9 2 6
      • eBook
        9 7 8 0 1 2 8 0 3 1 9 3 3
      Cloud Computing in Ocean and Atmospheric Sciences provides the latest information on this relatively new platform for scientific computing, which has great possibilities and challenges, including pricing and deployments costs and applications that are often presented as primarily business oriented. In addition, scientific users may be very familiar with these types of models and applications, but relatively unfamiliar with the intricacies of the hardware platforms they use. The book provides a range of practical examples of cloud applications that are written to be accessible to practitioners, researchers, and students in affiliated fields. By providing general information on the use of the cloud for oceanographic and atmospheric computing, as well as examples of specific applications, this book encourages and educates potential users of the cloud. The chapters provide an introduction to the practical aspects of deploying in the cloud, also providing examples of workflows and techniques that can be reused in new projects.
    • Learning-Based Adaptive Control

      • 1st Edition
      • July 11, 2016
      • Mouhacine Benosman
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 1 3 6 0
      • eBook
        9 7 8 0 1 2 8 0 3 1 5 1 3
      Adaptive control has been one of the main problems studied in control theory. The subject is well understood, yet it has a very active research frontier. This book focuses on a specific subclass of adaptive control, namely, learning-based adaptive control. As systems evolve during time or are exposed to unstructured environments, it is expected that some of their characteristics may change. This book offers a new perspective about how to deal with these variations. By merging together Model-Free and Model-Based learning algorithms, the author demonstrates, using a number of mechatronic examples, how the learning process can be shortened and optimal control performance can be reached and maintained.
    • The Academic Librarian as Blended Professional

      • 1st Edition
      • April 6, 2016
      • Michael Perini
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 9 2 7 7
      • eBook
        9 7 8 0 0 8 1 0 1 0 1 5 0
      The Academic Librarian as Blended Professional employs a model that allows for individual and managerial reconceptualization of the librarian's role, also helping to mitigate obstacles to professional development both internal and external to the library. Using traditional and personal narrative, the book extends Whitchurch’s blended professional model, designed to consider the merging of academicians’ roles across several spheres of professional and academic influence in a higher education setting, to academic librarians. The book is significant due to its use of higher education theory to examine the professional identity of academic librarians and the issues impacting librarian professional development. The work offers a constructive, replicable research design appropriate for the analysis of librarians in other academic settings, providing additional insights into how these professionals might perceive their roles within the larger context of a higher education environment. Following the application of the blended professional model, this book contends that academic librarians have similar roles concerning research, instruction, and service when compared to an institution’s tenure-track faculty. The scope of professional productivity and the expectation of the librarians, though, are much less regimented. Consequently, the academic librarians find themselves in a tenuous working space where their blended role is inhibited by real and perceived barriers.