Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Malware Diffusion Models for Modern Complex Networks

      • 1st Edition
      • February 2, 2016
      • Vasileios Karyotis + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 1 4 1
      • eBook
        9 7 8 0 1 2 8 0 2 7 1 6 5
      Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.
    • Energy Efficiency in Data Centers and Clouds

      • 1st Edition
      • Volume 100
      • January 26, 2016
      • English
      • Hardback
        9 7 8 0 1 2 8 0 4 7 7 8 1
      • eBook
        9 7 8 0 1 2 8 0 5 1 7 3 3
      Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.
    • PCs in the Factory

      • 1st Edition
      • January 22, 2016
      • Architecture Technology Architecture Technology Corpor
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 0 4 9 9
      • eBook
        9 7 8 1 4 8 3 2 8 5 0 1 6
      Please note this is a short discount publication.PCs have become as essential to the factory environment as they are to the office environment.This in-depth report examines how specially adapted PCs and peripherals are being established in Factory Process Control and Reporting.The report covers:* Hardware and Software* Typical Applications* Implementation Issues* Case Studies and Real Applications
    • Artificial Intelligence IV

      • 1st Edition
      • January 22, 2016
      • P. Jorrand + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 5 4 4
      • eBook
        9 7 8 1 4 8 3 2 9 7 7 8 1
      Presenting recent results and ongoing research in Artificial Intelligence, this book has a strong emphasis on fundamental questions in several key areas: programming languages, automated reasoning, natural language processing and computer vision.AI is at the source of major programming language design efforts. Different approaches are described, with some of their most significant results: languages combining logic and functional styles, logic and parallel, functional and parallel, logic with constraints.A central problem in AI is automated reasoning, and formal logic is, historically, at the root of research in this domain. This book presents results in automatic deduction, non-monotonic reasoning, non-standard logic, machine learning, and common-sense reasoning. Proposals for knowledge representation and knowledge engineering are described and the neural net challenger to classical symbolic AI is also defended.Finally, AI systems must be able to interact with their environment in a natural and autonomous way. Natural language processing is an important part of this. Various results are presented in discourse planning, natural language parsing, understanding and generation. The autonomy of a machine for perception of its physical environment is also an AI problem and some research in image processing and computer vision is described.
    • A Comparative Study of Parallel Programming Languages: The Salishan Problems

      • 1st Edition
      • January 22, 2016
      • J.T. Feo
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 4 7 6
      • eBook
        9 7 8 1 4 8 3 2 9 4 2 0 9
      As execution speeds reach the physical limits of single cpu computers, the only hope of achieving greater computing power is with parallel systems. Researchers have proposed countless new programming languages, but their differences, similarities, strengths, weaknesses and problem domains are subtle and often not well understood. Informed comparison of parallel languages is difficult.This volume compares eight parallel programming languages based on solutions to four problems. Each chapter includes a description of the language's philosophy, semantics and syntax, and a solution to each problem. By considering solutions rather than language features or theoretical properties, the gap is bridged between the language specialists and users. Both professionals and students in the fields of computer and computational science will find the discussions helpful and understandable.
    • Digital Libraries

      • 1st Edition
      • January 21, 2016
      • Fabrice Papy
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 4 5 4
      • eBook
        9 7 8 0 0 8 1 0 0 4 8 6 9
      The technological interoperability of digital libraries must be rethought in order to adapt to new uses and networks. Informative digital environments aimed at responding to heritage, cultural, scientific or commercial demands have taken over the global cyberspace and have redesigned the techno-informative landscape of the Web. However, while the technological models demonstrate their effectiveness and explain to a large extent the creation of digital libraries, archives and deposits, the subjacent concept of uses continues to cause debate. The information technologies used by heterogeneous digital libraries enable a technical interoperability of content. This is not enough to allow the adhesion of a public connected to very different information profiles and techniques. This book explores the avenues of a user-orientated interoperability where the questions of consultation interfaces and content description processes are studied.
    • Deploying Secure Containers for Training and Development

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 7 0
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 4 7
      In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.
    • Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 8 7
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 5 4
      Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.
    • Cyber Security Awareness for CEOs and Management

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 5 4 5
      • eBook
        9 7 8 0 1 2 8 0 5 1 1 0 8
      Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
    • Cyber Security Awareness for Accountants and CPAs

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 2 2 4
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 9 2
      Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.