Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Improving the User Experience through Practical Data Analytics

      • 1st Edition
      • March 3, 2015
      • Mike Fritz + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 6 3 5 1
      • eBook
        9 7 8 0 1 2 8 0 0 6 7 8 8
      Improving the User Experience through Practical Data Analytics shows you how to make UX design decisions based on data—not hunches. Authors Fritz and Berger help the UX professional recognize the enormous potential of user data that is collected as a natural by-product of routine UX research methods, including moderated usability tests, unmoderated usability tests, surveys, and contextual inquiries. Then, step-by-step, they explain how to utilize both descriptive and predictive statistical techniques to gain meaningful insight with that data. By mastering the use of these techniques, you’ll delight your users, increase your bottom line and gain a powerful competitive advantage for your company—and yourself. Key features include: Practical advise on choosing the right data analysis technique for each project. A step-by-step methodology for applying each technique, including examples and scenarios drawn from the UX field. Detailed screen shots and instructions for performing the techniques using Excel (both for PC and Mac) and SPSS. Clear and concise guidance on interpreting the data output. Exercises to practice the techniques
    • System on Chip Interfaces for Low Power Design

      • 1st Edition
      • November 17, 2015
      • Sanjeeb Mishra + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 6 3 0 5
      • eBook
        9 7 8 0 1 2 8 0 1 7 9 0 6
      System on Chip Interfaces for Low Power Design provides a top-down understanding of interfaces available to SoC developers, not only the underlying protocols and architecture of each, but also how they interact and the tradeoffs involved. The book offers a common context to help understand the variety of available interfaces and make sense of technology from different vendors aligned with multiple standards. With particular emphasis on power as a factor, the authors explain how each interface performs in various usage scenarios and discuss their advantages and disadvantages. Readers learn to make educated decisions on what interfaces to use when designing systems and gain insight for innovating new/custom interfaces for a subsystem and their potential impact.
    • Development of Online Hybrid Testing

      • 1st Edition
      • September 14, 2015
      • Peng Pan + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 3 3 7 8 4
      • eBook
        9 7 8 0 1 2 8 0 3 3 9 2 0
      Development of Online Hybrid Testing: Theory and Applications to Structural Engineering provides comprehensive treatments of several topics pertinent to substructure online hybrid tests. Emphasis has been placed on explaining the three frameworks: the host-station framework, separated model framework and peer to peer framework These have been developed within the Internet environment and are particularly suitable for distributed hybrid testing. In order to help readers to understand the essence of online hybrid testing and further to build up their own systems, an engineering practice has been introduced at the end of this book with the source code appended. Development of Online Hybrid Testing: Theory and Applications to Structural Engineering is primarily written for readers with some background in structural dynamics, finite elements, and computer science. Material that has previously only appeared in journal articles has been consolidated and simplified which provides the reader with a perspective of the state-of-the-art.
    • Bent Functions

      • 1st Edition
      • August 6, 2015
      • Natalia Tokareva
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 1 8 1
      • eBook
        9 7 8 0 1 2 8 0 2 5 5 5 0
      Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more.
    • Digital Identities

      • 1st Edition
      • September 29, 2015
      • Rob Cover
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 0 8 3 8
      • eBook
        9 7 8 0 1 2 8 0 0 4 2 7 2
      Online Identities: Creating and Communicating the Online Self presents a critical investigation of the ways in which representations of identities have shifted since the advent of digital communications technologies. Critical studies over the past century have pointed to the multifaceted nature of identity, with a number of different theories and approaches used to explain how everyday people have a sense of themselves, their behaviors, desires, and representations. In the era of interactive, digital, and networked media and communication, identity can be understood as even more complex, with digital users arguably playing a more extensive role in fashioning their own self-representations online, as well as making use of the capacity to co-create common and group narratives of identity through interactivity and the proliferation of audio-visual user-generated content online.
    • The Definitive Guide to ARM® Cortex®-M0 and Cortex-M0+ Processors

      • 2nd Edition
      • June 15, 2015
      • Joseph Yiu
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 2 7 7 0
      • eBook
        9 7 8 0 1 2 8 0 3 2 7 8 7
      The Definitive Guide to the ARM® Cortex®-M0 and Cortex-M0+ Processors, Second Edition explains the architectures underneath ARM’s Cortex-M0 and Cortex-M0+ processors and their programming techniques. Written by ARM’s Senior Embedded Technology Manager, Joseph Yiu, the book is packed with examples on how to use the features in the Cortex-M0 and Cortex-M0+ processors. It provides detailed information on the instruction set architecture, how to use a number of popular development suites, an overview of the software development flow, and information on how to locate problems in the program code and software porting. This new edition includes the differences between the Cortex-M0 and Cortex-M0+ processors such as architectural features (e.g. unprivileged execution level, vector table relocation), new chapters on low power designs and the Memory Protection Unit (MPU), the benefits of the Cortex-M0+ processor, such as the new single cycle I/O interface, higher energy efficiency, better performance and the Micro Trace Buffer (MTB) feature, updated software development tools, updated Real Time Operating System examples using Keil™ RTX with CMSIS-RTOS APIs, examples of using various Cortex-M0 and Cortex-M0+ based microcontrollers, and much more.
    • Effective Security Management

      • 6th Edition
      • August 15, 2015
      • Charles A. Sennewald + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 7 7 4 5
      • eBook
        9 7 8 0 1 2 8 0 2 7 9 0 5
      Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.
    • Thor's OS Xodus

      • 1st Edition
      • October 28, 2015
      • Timothy "Thor" Mullen
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 4 6 3 1
      • eBook
        9 7 8 0 1 2 4 1 0 5 0 6 5
      Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.
    • Breaking into Information Security

      • 1st Edition
      • December 5, 2015
      • Josh More + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 8 3 9
      • eBook
        9 7 8 0 1 2 8 0 0 9 8 9 5
      Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.
    • Multi-Domain Master Data Management

      • 1st Edition
      • March 21, 2015
      • Mark Allen + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 3 5 5
      • eBook
        9 7 8 0 1 2 8 0 1 1 4 7 8
      Multi-Domain Master Data Management delivers practical guidance and specific instruction to help guide planners and practitioners through the challenges of a multi-domain master data management (MDM) implementation. Authors Mark Allen and Dalton Cervo bring their expertise to you in the only reference you need to help your organization take master data management to the next level by incorporating it across multiple domains. Written in a business friendly style with sufficient program planning guidance, this book covers a comprehensive set of topics and advanced strategies centered on the key MDM disciplines of Data Governance, Data Stewardship, Data Quality Management, Metadata Management, and Data Integration.