Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Meeting People via WiFi and Bluetooth

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 2 1 7
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 8 5
      Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
    • Cyber Security Awareness for Lawyers

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 2 0 0
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 7 8
      Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
    • Essential Skills for Hackers

      • 1st Edition
      • December 9, 2015
      • Kevin Cardwell + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 5 5 2
      • eBook
        9 7 8 0 1 2 8 0 5 1 1 1 5
      Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.
    • Multiscreen UX Design

      • 1st Edition
      • December 8, 2015
      • Wolfram Nagel
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 2 9 5
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 0 9
      People today use technology on different devices in different locations. Users expect to access information on all relevant screens and across multiple channels through smartphones, tablets, laptops/desktops, smart (internet-connected) TVs, and other devices, such as smartwatches for example. Multiscreen is no longer a nice add-on, it’s a requirement. In this environment, user experience needs to cater to multiple devices. This book provides a holistic approach that will help UX professionals to offer a hands-on guide for UX design across multiple screens. It presents an opportunity to learn how to cater designs for customers. Readers will find patterns, strategies, examples and case studies, methodologies, and insights to help inspire them to develop a viable strategy for their own digital products and services. UX professionals will walk through important elements of multiscreen UX: Investigating the devices and their capabilities Understanding the users and their capabilities Considering the context in which users use these devices Navigating next generation information experiences and the future of content management Designing content and UI architecture for multiscreen projects
    • Data Mapping for Data Warehouse Design

      • 1st Edition
      • December 8, 2015
      • Qamar Shahbaz
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 1 8 5 6
      • eBook
        9 7 8 0 1 2 8 0 5 3 3 5 5
      Data mapping in a data warehouse is the process of creating a link between two distinct data models’ (source and target) tables/attributes. Data mapping is required at many stages of DW life-cycle to help save processor overhead; every stage has its own unique requirements and challenges. Therefore, many data warehouse professionals want to learn data mapping in order to move from an ETL (extract, transform, and load data between databases) developer to a data modeler role. Data Mapping for Data Warehouse Design provides basic and advanced knowledge about business intelligence and data warehouse concepts including real life scenarios that apply the standard techniques to projects across various domains. After reading this book, readers will understand the importance of data mapping across the data warehouse life cycle.
    • Building Intelligent Information Systems Software

      • 1st Edition
      • December 7, 2015
      • Thomas D. Feigenbaum
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 1 0 1 6
      • eBook
        9 7 8 0 1 2 8 0 5 2 7 8 5
      Building Intelligent Information Systems Software shows scientists and engineers how to build applications that model complex information, data, and knowledge without the need for coding. Traditional software development takes time and leads to inflexible, complicated applications that almost, but don’t exactly, meet the intended needs. Requirements can change, sometimes mid-development, and adapting existing systems can be difficult. Individual solutions can be incompatible, leading to information silos and inefficiency throughout an organization. This book offers a solution – the Information Unit Model, an innovative architecture for translating domain knowledge into applications. By encapsulating the complexities of computing, the Unit Model allows engineers to focus on business or experimental needs. Author Tom Feigenbaum, inventor of the Unit Modeler, demonstrates this innovative software architecture for rapid application design and development. His approach promotes repurposing pre-existing tools and libraries, and collaborating across the cloud, to promote information sharing and efficient development practices. Each concept is illustrated with examples including file management, data management, and 3D visualization.
    • Security Controls Evaluation, Testing, and Assessment Handbook

      • 1st Edition
      • December 7, 2015
      • Leighton Johnson
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 2 4 2
      • eBook
        9 7 8 0 1 2 8 0 2 5 6 4 2
      Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.
    • Breaking into Information Security

      • 1st Edition
      • December 5, 2015
      • Josh More + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 8 3 9
      • eBook
        9 7 8 0 1 2 8 0 0 9 8 9 5
      Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.
    • RF and mm-Wave Power Generation in Silicon

      • 1st Edition
      • December 4, 2015
      • Hua Wang + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 4 0 8 0 5 2 2
      • eBook
        9 7 8 0 1 2 4 0 9 5 2 2 9
      RF and mm-Wave Power Generation in Silicon presents the challenges and solutions of designing power amplifiers at RF and mm-Wave frequencies in a silicon-based process technology. It covers practical power amplifier design methodologies, energy- and spectrum-efficient power amplifier design examples in the RF frequency for cellular and wireless connectivity applications, and power amplifier and power generation designs for enabling new communication and sensing applications in the mm-Wave and THz frequencies. With this book you will learn: Power amplifier design fundamentals and methodologies Latest advances in silicon-based RF power amplifier architectures and designs and their integration in wireless communication systems State-of-the-art mm-Wave/THz power amplifier and power generation circuits and systems in silicon
    • Automating Open Source Intelligence

      • 1st Edition
      • December 3, 2015
      • Robert Layton + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 9 1 6 9
      • eBook
        9 7 8 0 1 2 8 0 2 9 1 7 6
      Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data.