Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

    • 1st Edition
    • Henry Dalziel + 1 more
    • English
    Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.
  • Deploying Secure Containers for Training and Development

    • 1st Edition
    • Henry Dalziel + 1 more
    • English
    In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.
  • Essential Skills for Hackers

    • 1st Edition
    • Kevin Cardwell + 1 more
    • English
    Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.
  • Meeting People via WiFi and Bluetooth

    • 1st Edition
    • Henry Dalziel + 1 more
    • English
    Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
  • Cyber Security Awareness for Accountants and CPAs

    • 1st Edition
    • Henry Dalziel + 1 more
    • English
    Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
  • Multiscreen UX Design

    Developing for a Multitude of Devices
    • 1st Edition
    • Wolfram Nagel
    • English
    People today use technology on different devices in different locations. Users expect to access information on all relevant screens and across multiple channels through smartphones, tablets, laptops/desktops, smart (internet-connected) TVs, and other devices, such as smartwatches for example. Multiscreen is no longer a nice add-on, it’s a requirement. In this environment, user experience needs to cater to multiple devices. This book provides a holistic approach that will help UX professionals to offer a hands-on guide for UX design across multiple screens. It presents an opportunity to learn how to cater designs for customers. Readers will find patterns, strategies, examples and case studies, methodologies, and insights to help inspire them to develop a viable strategy for their own digital products and services. UX professionals will walk through important elements of multiscreen UX: Investigating the devices and their capabilities Understanding the users and their capabilities Considering the context in which users use these devices Navigating next generation information experiences and the future of content management Designing content and UI architecture for multiscreen projects
  • Data Mapping for Data Warehouse Design

    • 1st Edition
    • Qamar Shahbaz
    • English
    Data mapping in a data warehouse is the process of creating a link between two distinct data models’ (source and target) tables/attributes. Data mapping is required at many stages of DW life-cycle to help save processor overhead; every stage has its own unique requirements and challenges. Therefore, many data warehouse professionals want to learn data mapping in order to move from an ETL (extract, transform, and load data between databases) developer to a data modeler role. Data Mapping for Data Warehouse Design provides basic and advanced knowledge about business intelligence and data warehouse concepts including real life scenarios that apply the standard techniques to projects across various domains. After reading this book, readers will understand the importance of data mapping across the data warehouse life cycle.
  • Security Controls Evaluation, Testing, and Assessment Handbook

    • 1st Edition
    • Leighton Johnson
    • English
    Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.
  • Building Intelligent Information Systems Software

    Introducing the Unit Modeler Development Technology
    • 1st Edition
    • Thomas D. Feigenbaum
    • English
    Building Intelligent Information Systems Software shows scientists and engineers how to build applications that model complex information, data, and knowledge without the need for coding. Traditional software development takes time and leads to inflexible, complicated applications that almost, but don’t exactly, meet the intended needs. Requirements can change, sometimes mid-development, and adapting existing systems can be difficult. Individual solutions can be incompatible, leading to information silos and inefficiency throughout an organization. This book offers a solution – the Information Unit Model, an innovative architecture for translating domain knowledge into applications. By encapsulating the complexities of computing, the Unit Model allows engineers to focus on business or experimental needs. Author Tom Feigenbaum, inventor of the Unit Modeler, demonstrates this innovative software architecture for rapid application design and development. His approach promotes repurposing pre-existing tools and libraries, and collaborating across the cloud, to promote information sharing and efficient development practices. Each concept is illustrated with examples including file management, data management, and 3D visualization.
  • Breaking into Information Security

    Crafting a Custom Career Path to Get the Job You Really Want
    • 1st Edition
    • Josh More + 2 more
    • English
    Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.