Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Operating System Forensics

    • 1st Edition
    • Ric Messier
    • English
    Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.
  • Practical Deployment of Cisco Identity Services Engine (ISE)

    Real-World Examples of AAA Deployments
    • 1st Edition
    • Andy Richter + 1 more
    • English
    With the proliferation of mobile devices and bring-your-own-devic... (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
  • Google Hacking for Penetration Testers

    • 3rd Edition
    • Bill Gardner + 2 more
    • English
    Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.
  • Traffic Anomaly Detection

    • 1st Edition
    • Antonio Cuadra-Sánchez + 1 more
    • English
    Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".
  • Thor's OS Xodus

    Why And How I Left Windows For OS X
    • 1st Edition
    • Timothy "Thor" Mullen
    • English
    Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.
  • Shared Memory Application Programming

    Concepts and Strategies in Multicore Application Programming
    • 1st Edition
    • Victor Alessandrini
    • English
    Shared Memory Application Programming presents the key concepts and applications of parallel programming, in an accessible and engaging style applicable to developers across many domains. Multithreaded programming is today a core technology, at the basis of all software development projects in any branch of applied computer science. This book guides readers to develop insights about threaded programming and introduces two popular platforms for multicore development: OpenMP and Intel Threading Building Blocks (TBB). Author Victor Alessandrini leverages his rich experience to explain each platform’s design strategies, analyzing the focus and strengths underlying their often complementary capabilities, as well as their interoperability. The book is divided into two parts: the first develops the essential concepts of thread management and synchronization, discussing the way they are implemented in native multithreading libraries (Windows threads, Pthreads) as well as in the modern C++11 threads standard. The second provides an in-depth discussion of TBB and OpenMP including the latest features in OpenMP 4.0 extensions to ensure readers’ skills are fully up to date. Focus progressively shifts from traditional thread parallelism to modern task parallelism deployed by modern programming environments. Several chapter include examples drawn from a variety of disciplines, including molecular dynamics and image processing, with full source code and a software library incorporating a number of utilities that readers can adapt into their own projects.
  • Hidden Semi-Markov Models

    Theory, Algorithms and Applications
    • 1st Edition
    • Shun-Zheng Yu
    • English
    Hidden semi-Markov models (HSMMs) are among the most important models in the area of artificial intelligence / machine learning. Since the first HSMM was introduced in 1980 for machine recognition of speech, three other HSMMs have been proposed, with various definitions of duration and observation distributions. Those models have different expressions, algorithms, computational complexities, and applicable areas, without explicitly interchangeable forms. Hidden Semi-Markov Models: Theory, Algorithms and Applications provides a unified and foundational approach to HSMMs, including various HSMMs (such as the explicit duration, variable transition, and residential time of HSMMs), inference and estimation algorithms, implementation methods and application instances. Learn new developments and state-of-the-art emerging topics as they relate to HSMMs, presented with examples drawn from medicine, engineering and computer science.
  • Continuous Architecture

    Sustainable Architecture in an Agile and Cloud-Centric World
    • 1st Edition
    • Murat Erder + 1 more
    • English
    Continuous Architecture provides a broad architectural perspective for continuous delivery, and describes a new architectural approach that supports and enables it. As the pace of innovation and software releases increases, IT departments are tasked to deliver value quickly and inexpensively to their business partners. With a focus on getting software into end-users hands faster, the ultimate goal of daily software updates is in sight to allow teams to ensure that they can release every change to the system simply and efficiently. This book presents an architectural approach to support modern application delivery methods and provide a broader architectural perspective, taking architectural concerns into account when deploying agile or continuous delivery approaches. The authors explain how to solve the challenges of implementing continuous delivery at the project and enterprise level, and the impact on IT processes including application testing, software deployment and software architecture.
  • Robertson on Library Security and Disaster Planning

    • 1st Edition
    • Guy Robertson
    • English
    Robertson on Library Security and Disaster Planning presents a collection of highly-cited, author published articles on security and disaster planning for libraries. The book represents the only place where these articles are compiled, making it a go-to volume for practitioners. It includes topics covering all aspects of preparation and response, along with articles drawn from library journals, including Feliciter, Canadian Insurance, Disaster Recovery Journal, and Canadian Bookseller. The book represents a wealth of the author's experience and expertise garnered during a distinguished career working with significant institutions on both their current security problems and their plans for future security.
  • Artificial Neural Network for Drug Design, Delivery and Disposition

    • 1st Edition
    • Munish Puri + 4 more
    • English
    Artificial Neural Network for Drug Design, Delivery and Disposition provides an in-depth look at the use of artificial neural networks (ANN) in pharmaceutical research. With its ability to learn and self-correct in a highly complex environment, this predictive tool has tremendous potential to help researchers more effectively design, develop, and deliver successful drugs. This book illustrates how to use ANN methodologies and models with the intent to treat diseases like breast cancer, cardiac disease, and more. It contains the latest cutting-edge research, an analysis of the benefits of ANN, and relevant industry examples. As such, this book is an essential resource for academic and industry researchers across the pharmaceutical and biomedical sciences.