Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Computational Systems Biology

    Inference and Modelling
    • 1st Edition
    • Paola Lecca + 4 more
    • English
    Computational Systems Biology: Inference and Modelling provides an introduction to, and overview of, network analysis inference approaches which form the backbone of the model of the complex behavior of biological systems. This book addresses the challenge to integrate highly diverse quantitative approaches into a unified framework by highlighting the relationships existing among network analysis, inference, and modeling. The chapters are light in jargon and technical detail so as to make them accessible to the non-specialist reader. The book is addressed at the heterogeneous public of modelers, biologists, and computer scientists.
  • Hiding Behind the Keyboard

    Uncovering Covert Communication Methods with Forensic Analysis
    • 1st Edition
    • Brett Shavers + 1 more
    • English
    Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
  • The Visual Imperative

    Creating a Visual Culture of Data Discovery
    • 1st Edition
    • Lindy Ryan
    • English
    Data is powerful. It separates leaders from laggards and it drives business disruption, transformation, and reinvention. Today’s most progressive companies are using the power of data to propel their industries into new areas of innovation, specialization, and optimization. The horsepower of new tools and technologies have provided more opportunities than ever to harness, integrate, and interact with massive amounts of disparate data for business insights and value – something that will only continue in the era of the Internet of Things. And, as a new breed of tech-savvy and digitally native knowledge workers rise to the ranks of data scientist and visual analyst, the needs and demands of the people working with data are changing, too. The world of data is changing fast. And, it’s becoming more visual. Visual insights are becoming increasingly dominant in information management, and with the reinvigorated role of data visualization, this imperative is a driving force to creating a visual culture of data discovery. The traditional standards of data visualizations are making way for richer, more robust and more advanced visualizations and new ways of seeing and interacting with data. However, while data visualization is a critical tool to exploring and understanding bigger and more diverse and dynamic data, by understanding and embracing our human hardwiring for visual communication and storytelling and properly incorporating key design principles and evolving best practices, we take the next step forward to transform data visualizations from tools into unique visual information assets.
  • Network Performance and Security

    Testing and Analyzing Using Open Source and Low-Cost Tools
    • 1st Edition
    • Chris Chapman
    • English
    Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.
  • Foundations of Quantum Programming

    • 1st Edition
    • Mingsheng Ying
    • English
    Foundations of Quantum Programming discusses how new programming methodologies and technologies developed for current computers can be extended to exploit the unique power of quantum computers, which promise dramatic advantages in processing speed over currently available computer systems. Governments and industries around the globe are now investing vast amounts of money with the expectation of building practical quantum computers. Drawing upon years of experience and research in quantum computing research and using numerous examples and illustrations, Mingsheng Ying has created a very useful reference on quantum programming languages and important tools and techniques required for quantum programming, making the book a valuable resource for academics, researchers, and developers.
  • Data Simplification

    Taming Information With Open Source Tools
    • 1st Edition
    • Jules J. Berman
    • English
    Data Simplification: Taming Information With Open Source Tools addresses the simple fact that modern data is too big and complex to analyze in its native form. Data simplification is the process whereby large and complex data is rendered usable. Complex data must be simplified before it can be analyzed, but the process of data simplification is anything but simple, requiring a specialized set of skills and tools. This book provides data scientists from every scientific discipline with the methods and tools to simplify their data for immediate analysis or long-term storage in a form that can be readily repurposed or integrated with other data. Drawing upon years of practical experience, and using numerous examples and use cases, Jules Berman discusses the principles, methods, and tools that must be studied and mastered to achieve data simplification, open source tools, free utilities and snippets of code that can be reused and repurposed to simplify data, natural language processing and machine translation as a tool to simplify data, and data summarization and visualization and the role they play in making data useful for the end user.
  • Adaptive User Interfaces

    • 1st Edition
    • Dermot Browne
    • English
    This book describes techniques for designing and building adaptive user interfaces developed in the large AID project undertaken by the contributors.
  • Windows Registry Forensics

    Advanced Digital Forensic Analysis of the Windows Registry
    • 2nd Edition
    • Harlan Carvey
    • English
    Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.
  • Computer Organization and Design ARM Edition

    The Hardware Software Interface
    • 1st Edition
    • David A. Patterson + 1 more
    • English
    The new ARM Edition of Computer Organization and Design features a subset of the ARMv8-A architecture, which is used to present the fundamentals of hardware technologies, assembly language, computer arithmetic, pipelining, memory hierarchies, and I/O. With the post-PC era now upon us, Computer Organization and Design moves forward to explore this generational change with examples, exercises, and material highlighting the emergence of mobile computing and the Cloud. Updated content featuring tablet computers, Cloud infrastructure, and the ARM (mobile computing devices) and x86 (cloud computing) architectures is included. An online companion Web site provides links to a free version of the DS-5 Community Edition (a free professional quality tool chain developed by ARM), as well as additional advanced content for further study, appendices, glossary, references, and recommended reading.
  • Advances in Computers

    • 1st Edition
    • Volume 101
    • English
    Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.