Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • How Nursing has Changed with Technology, An Issue of Nursing Clinics

      • 1st Edition
      • Volume 50-2
      • June 2, 2015
      • Maria Overstreet
      • English
      • Hardback
        9 7 8 0 3 2 3 3 8 8 9 6 2
      • eBook
        9 7 8 0 3 2 3 3 8 8 9 7 9
      How has technology changed the art and science of nursing practice?Many facets of nursing practice have stayed constant over the years such as the way we advocate for our patients and the art of caring for our patients. However, nursing practice has evolved over the years especially in the bedside delivery of state of the art nursing care. Technology at the bedside has forced nurse educators to change the ways in which we always have taught nursing students. Technology has also begun to change the methods used in the actual bedside nursing care. In this issue, you will hear from some of the nursing experts in areas of nursing care that has changed in either the delivery of care or method of assessing care of the patient. Nursing experts will describe some of the historical changes and intrigue you in the changes expected to come to the bedside. Why is this issue important? First, we gain insight from a review of where we have been and nurses tend to reminisce on our past as well as romance our historical roots. Second, technology is ever changing and it is good practice to keep abreast of what is happening in other areas of nursing so that we can apply others successes in our own specific areas of nursing. Third, informatics in nursing is a growing field and nursing must embrace technology and learn to adapt various methods of delivery so that we can appropriately care for and advocate for our patients.With the changes in our national healthcare system, we must encourage nurses to try out new methods of delivery as well as encourage their ideas of how nursing can change. The articles in this issue reflect these changes.
    • Bio-inspired Networking

      • 1st Edition
      • August 19, 2015
      • Daniel Câmara
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 2 1 8
      • eBook
        9 7 8 0 0 8 1 0 0 4 6 5 4
      Bio-inspired techniques are based on principles, or models, of biological systems. In general, natural systems present remarkable capabilities of resilience and adaptability. In this book, we explore how bio-inspired methods can solve different problems linked to computer networks.Future networks are expected to be autonomous, scalable and adaptive. During millions of years of evolution, nature has developed a number of different systems that present these and other characteristics required for the next generation networks. Indeed, a series of bio-inspired methods have been successfully used to solve the most diverse problems linked to computer networks. This book presents some of these techniques from a theoretical and practical point of view.
    • Ecological Design of Smart Home Networks

      • 1st Edition
      • March 31, 2015
      • N. Saito + 1 more
      • English
      • Hardback
        9 7 8 1 7 8 2 4 2 1 1 9 1
      • eBook
        9 7 8 1 7 8 2 4 2 1 2 4 5
      This book provides an authoritative guide for postgraduate students and academic researchers in electronics, computer and network engineering, telecommunications, energy technology and home automation, as well as R&D managers in industrial sectors such as wireless technology, consumer electronics, telecommunications and networking, information technology, energy technology and home automation. Part One outlines the key principles and technologies needed for ecological smart home networks. Beginning with a thorough overview of the concept behind ecological smart home network design, the book reviews such important areas as power line communications, hybrid systems and middleware platforms. Part Two then goes on to discuss some important applications of this technology, with wireless smart sensor networks for home and telecare, and smart home networking for content and energy management (including the intelligent Zero Emission Urban System), all explored in detail.
    • Deploying Secure Containers for Training and Development

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 7 0
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 4 7
      In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.
    • Digital Identity Management

      • 1st Edition
      • March 24, 2015
      • Maryline Laurent + 1 more
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 0 4 1
      • eBook
        9 7 8 0 0 8 1 0 0 5 9 1 0
      In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analysis on the digital ID issue, it describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, identity federation techniques and privacy preservation solutions. The limitations of these solutions and research issues in this field are also discussed to further understand the changes that are taking place.
    • Industrial Tomography

      • 1st Edition
      • March 30, 2015
      • Mi Wang
      • English
      • Hardback
        9 7 8 1 7 8 2 4 2 1 1 8 4
      • eBook
        9 7 8 1 7 8 2 4 2 1 2 3 8
      Industrial Tomography: Systems and Applications thoroughly explores the important tomographic techniques of industrial tomography, also discussing image reconstruction, systems, and applications. The text presents complex processes, including the way three-dimensional imaging is used to create multiple cross-sections, and how computer software helps monitor flows, filtering, mixing, drying processes, and chemical reactions inside vessels and pipelines. Readers will find a comprehensive discussion on the ways tomography systems can be used to optimize the performance of a wide variety of industrial processes.
    • Essential Skills for Hackers

      • 1st Edition
      • December 9, 2015
      • Kevin Cardwell + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 5 5 2
      • eBook
        9 7 8 0 1 2 8 0 5 1 1 1 5
      Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.
    • Topics in Parallel and Distributed Computing

      • 1st Edition
      • August 21, 2015
      • Sushil K Prasad + 4 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 8 9 9 4
      • eBook
        9 7 8 0 1 2 8 0 3 9 3 8 0
      Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.
    • Introduction to Neural Networks

      • 1st Edition
      • November 24, 2015
      • Architecture Technology Architecture Technology Corpor
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 1 2 0 5
      • eBook
        9 7 8 1 4 8 3 2 9 5 3 0 5
      Please note this is a Short Discount publication.Neural network technology has been a curiosity since the early days of computing. Research in the area went into a near dormant state for a number of years, but recently there has been a new increased interest in the subject. This has been due to a number of factors: interest in the military, apparent ease of implementation, and the ability of the technology to develop computers which are able to learn from experience.This report summarizes the topic, providing the reader with an overview of the field and its potential direction. Included is an introduction to the technology and its future directions, as well as a set of examples of possible applications and potential implementation technologies.
    • Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 8 7
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 5 4
      Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.