Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Object-oriented Programming with Smalltalk

    • 1st Edition
    • Harald Wertz
    • English
    Object oriented programming is a way of thinking about problems. Smalltalk is one of the purest incarnations of an object-oriented programming language. Using a pedagogical approach, this book covers all aspects of object oriented programming: first through the study of various preexisting Smalltalk classes, their implementation and use; then through a detailed description of an implementation of an interactive Lindenmayer system and through implementation of a series of calculators. The author addresses such subjects as graphics programming, dependency mechanisms and hierarchical specialization. This book fills the gap for an in-depth self-study reference, permitting the reader to master all aspects of object-oriented programming through a large set of exercises with highly detailed resources.
  • Research 2.0 and the Future of Information Literacy

    • 1st Edition
    • Tibor Koltay + 2 more
    • English
    Research 2.0 and the Future of Information Literacy examines possible congruencies between information literacy and Research 2.0, because the work of today’s researcher mobilizes a number of literacies. From among the various types of relevant literacies, at least three types of literacies can be mentioned in this relation: information literacy, scientific literacy and academic literacy. This book addresses these literacies in the light of the changing research landscape. Broad contexts of the researcher’s abilities, as adaptive and innovative thinking, problem solving skills, self-management and design mindset are also examined. Computational thinking and the computational paradigm in a number of fields of research are taken into consideration, as well. Researchers differ to non-researchers when populating social media, which means that these two different groups require different literacies. The relationship between information literacy and information is approached in a new way. Among the multitude of issues, we introduce a new interface between information literacy and Research 2.0. It encompasses the issues of research data management and data literacy, which represent also a challenge both for the academic library and for the communities of researchers. Similarly, the questions of new metrics of scientific output are addressed in the book.
  • Introduction to Neural Networks

    2nd Edition
    • 1st Edition
    • Architecture Technology Architecture Technology Corpor
    • English
    Please note this is a Short Discount publication.Neural network technology has been a curiosity since the early days of computing. Research in the area went into a near dormant state for a number of years, but recently there has been a new increased interest in the subject. This has been due to a number of factors: interest in the military, apparent ease of implementation, and the ability of the technology to develop computers which are able to learn from experience.This report summarizes the topic, providing the reader with an overview of the field and its potential direction. Included is an introduction to the technology and its future directions, as well as a set of examples of possible applications and potential implementation technologies.
  • Heterogeneous System Architecture

    A New Compute Platform Infrastructure
    • 1st Edition
    • Wen-mei W. Hwu
    • English
    Heterogeneous Systems Architecture - a new compute platform infrastructure presents a next-generation hardware platform, and associated software, that allows processors of different types to work efficiently and cooperatively in shared memory from a single source program. HSA also defines a virtual ISA for parallel routines or kernels, which is vendor and ISA independent thus enabling single source programs to execute across any HSA compliant heterogeneous processer from those used in smartphones to supercomputers. The book begins with an overview of the evolution of heterogeneous parallel processing, associated problems, and how they are overcome with HSA. Later chapters provide a deeper perspective on topics such as the runtime, memory model, queuing, context switching, the architected queuing language, simulators, and tool chains. Finally, three real world examples are presented, which provide an early demonstration of how HSA can deliver significantly higher performance thru C++ based applications. Contributing authors are HSA Foundation members who are experts from both academia and industry. Some of these distinguished authors are listed here in alphabetical order: Yeh-Ching Chung, Benedict R. Gaster, Juan Gómez-Luna, Derek Hower, Lee Howes, Shih-Hao HungThomas B. Jablin, David Kaeli,Phil Rogers, Ben Sander, I-Jui (Ray) Sung.
  • Multicore Software Development Techniques

    Applications, Tips, and Tricks
    • 1st Edition
    • Robert Oshana
    • English
    This book provides a set of practical processes and techniques used for multicore software development. It is written with a focus on solving day to day problems using practical tips and tricks and industry case studies to reinforce the key concepts in multicore software development. Coverage includes: The multicore landscape Principles of parallel computing Multicore SoC architectures Multicore programming models The Multicore development process Multicore programming with threads Concurrency abstraction layers Debugging Multicore Systems Practical techniques for getting started in multicore development Case Studies in Multicore Systems Development Sample code to reinforce many of the concepts discussed
  • System on Chip Interfaces for Low Power Design

    • 1st Edition
    • Sanjeeb Mishra + 2 more
    • English
    System on Chip Interfaces for Low Power Design provides a top-down understanding of interfaces available to SoC developers, not only the underlying protocols and architecture of each, but also how they interact and the tradeoffs involved. The book offers a common context to help understand the variety of available interfaces and make sense of technology from different vendors aligned with multiple standards. With particular emphasis on power as a factor, the authors explain how each interface performs in various usage scenarios and discuss their advantages and disadvantages. Readers learn to make educated decisions on what interfaces to use when designing systems and gain insight for innovating new/custom interfaces for a subsystem and their potential impact.
  • Google Hacking for Penetration Testers

    • 3rd Edition
    • Bill Gardner + 2 more
    • English
    Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.
  • Practical Deployment of Cisco Identity Services Engine (ISE)

    Real-World Examples of AAA Deployments
    • 1st Edition
    • Andy Richter + 1 more
    • English
    With the proliferation of mobile devices and bring-your-own-devic... (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
  • Operating System Forensics

    • 1st Edition
    • Ric Messier
    • English
    Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.
  • Thor's OS Xodus

    Why And How I Left Windows For OS X
    • 1st Edition
    • Timothy "Thor" Mullen
    • English
    Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.