Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Passive and Discrete Circuits

    • 1st Edition
    • Volume 2
    • R M MARSTON
    • English
    Passive components and discrete devices form the bedrocks on which all modern electronic circuits are built. This Pocket Book is a single volume applications guide to the most popular and useful of these devices, containing 670 diagrams, tables and carefully selected practical circuits. Throughout the Pocket Book great emphasis is placed on practical user information and circuitry. All of the active devices used are modestly priced and readily available.The book is split into twenty chapters. The first three explain important practical features of the ranges of modern passive electrical components, including relays, meters, motors, sensors and transducers. Chapters 4 to 6 deal with the design ofpractical attenuators, filters, and 'bridge' circuits. The remaining fourteen chapters deal with specific types of discrete semiconductor device, including various types of diode, transistors, JFETs, MOSFETs, VMOS devices, UJTs, SCRs, TRIACs, and various optoelectronic devices. This easy-to-read, concise, highly practical and largely non-mathematical volume is aimed directly at engineers, technicians, students and competent experimenters who can build a design directly from a circuit diagram, and if necessary modify it to suit individual needs. Ray Marston is the author of the multi-volume series of Newnes Circuits Manuals. His magazine articles on circuit design appear regularly in a wide range of publications worldwide.
  • Information Security Science

    Measuring the Vulnerability to Data Compromises
    • 1st Edition
    • Carl Young
    • English
    Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
  • 26th European Symposium on Computer Aided Process Engineering

    Part A and B
    • 1st Edition
    • Volume 38
    • English
    26th European Symposium on Computer Aided Process Engineering contains the papers presented at the 26th European Society of Computer-Aided Process Engineering (ESCAPE) Event held at Portorož Slovenia, from June 12th to June 15th, 2016. Themes discussed at the conference include Process-product Synthesis, Design and Integration, Modelling, Numerical analysis, Simulation and Optimization, Process Operations and Control and Education in CAPE/PSE.
  • DNS Security

    Defending the Domain Name System
    • 1st Edition
    • Allan Liska + 1 more
    • English
    DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.
  • Participatory Health Through Social Media

    • 1st Edition
    • Shabbir Syed-Abdul + 2 more
    • English
    Participatory Health through Social Media explores how traditional models of healthcare can be delivered differently through social media and online games, and how these technologies are changing the relationship between patients and healthcare professionals, as well as their impact on health behavior change. The book also examines how the hospitals, public health authorities, and inspectorates are currently using social media to facilitate both information distribution and collection. Also looks into the opportunities and risks to record and analyze epidemiologically relevant data retrieved from the Internet, social media, sensor data, and other digital sources. The book encompasses topics such as patient empowerment, gamification and social games, and the relationships between social media, health behavior change, and health communication crisis during epidemics. Additionally, the book analyzes the possibilities of big data generated through social media. Authored by IMIA Social Media working group, this book is a valuable resource for healthcare researchers and professionals, as well as clinicians interested in using new media as part of their practice or research.
  • From Information Literacy to Social Epistemology

    Insights from Psychology
    • 1st Edition
    • Anthony Anderson + 1 more
    • English
    From Information Literacy to Social Epistemology: Insights from Psychology focuses on information and the ways in which information literacy relates to critical thinking in education, the workplace, and in our social life. The broad context for our interest is the development in internet technologies often characterised by terms like the ‘digital age’, leading to questions of digital participation, digital divides, and the role of thinking in the information society. In short, to what extent is the ‘digital age’ engendering changes in learning directed towards the better use of information, and in addition, encouraging or even requiring improvements in critical thinking?
  • Wireless Public Safety Networks 2

    A Systematic Approach
    • 1st Edition
    • Daniel Camara + 1 more
    • English
    Wireless Public Safety Networks, Volume Two: A Systematic Approach presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or those used for support during crisis and normalization phases. Maintaining communication capabilities in a disaster scenario is crucial for avoiding loss of lives and damages to property. This book examines past communication failures that have directly contributed to the loss of lives, giving readers in-depth discussions of the public networks that impact emergency management, covering social media, crowdsourcing techniques, wearable wireless sensors, moving-cells scenarios, mobility management protocols, 5G networks, broadband networks, data dissemination, and the resources of the frequency spectrum.
  • The Designer's Guide to the Cortex-M Processor Family

    • 2nd Edition
    • Trevor Martin
    • English
    The Designer’s Guide to the Cortex-M Microcontrollers gives you an easy-to-understand introduction to the concepts required to develop programs in C with a Cortex-M based microcontroller. The book begins with an overview of the Cortex-M family, giving architectural descriptions supported with practical examples, enabling you to easily develop basic C programs to run on the Cortex-M0/M0+/M3 and M4 and M7. It then examines the more advanced features of the Cortex architecture such as memory protection, operating modes, and dual stack operation. Once a firm grounding in the Cortex-M processor has been established the book introduces the use of a small footprint RTOS and the CMSIS-DSP library. The book also examines techniques for software testing and code reuse specific to Cortex-M microcontrollers. With this book you will learn: the key differences between the Cortex-M0/M0+/M3 and M4 and M7; how to write C programs to run on Cortex-M based processors; how to make the best use of the CoreSight debug system; the Cortex-M operating modes and memory protection; advanced software techniques that can be used on Cortex-M microcontrollers; how to use a Real Time Operating System with Cortex-M devices; how to optimize DSP code for the Cortex-M4; and how to build real time DSP systems.
  • Big Data

    Principles and Paradigms
    • 1st Edition
    • Rajkumar Buyya + 2 more
    • English
    Big Data: Principles and Paradigms captures the state-of-the-art research on the architectural aspects, technologies, and applications of Big Data. The book identifies potential future directions and technologies that facilitate insight into numerous scientific, business, and consumer applications. To help realize Big Data’s full potential, the book addresses numerous challenges, offering the conceptual and technological solutions for tackling them. These challenges include life-cycle data management, large-scale storage, flexible processing infrastructure, data modeling, scalable machine learning, data analysis algorithms, sampling techniques, and privacy and ethical issues.
  • Intel Xeon Phi Processor High Performance Programming

    Knights Landing Edition
    • 2nd Edition
    • James Jeffers + 2 more
    • English
    Intel Xeon Phi Processor High Performance Programming is an all-in-one source of information for programming the Second-Generation Intel Xeon Phi product family also called Knights Landing. The authors provide detailed and timely Knights Landingspecific details, programming advice, and real-world examples. The authors distill their years of Xeon Phi programming experience coupled with insights from many expert customers — Intel Field Engineers, Application Engineers, and Technical Consulting Engineers — to create this authoritative book on theessentials of programming for Intel Xeon Phi products. Intel® Xeon Phi™ Processor High-Performance Programming is useful even before you ever program a system with an Intel Xeon Phi processor. To help ensure that your applications run at maximum efficiency, the authors emphasize key techniques for programming any modern parallel computing system whether based on Intel Xeon processors, Intel Xeon Phi processors, or other high-performance microprocessors. Applying these techniques will generally increase your program performance on any system and prepareyou better for Intel Xeon Phi processors.