Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Data Analysis in the Cloud

      • 1st Edition
      • September 15, 2015
      • Domenico Talia + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 8 8 1 0
      • eBook
        9 7 8 0 1 2 8 0 2 9 1 4 5
      Data Analysis in the Cloud introduces and discusses models, methods, techniques, and systems to analyze the large number of digital data sources available on the Internet using the computing and storage facilities of the cloud. Coverage includes scalable data mining and knowledge discovery techniques together with cloud computing concepts, models, and systems. Specific sections focus on map-reduce and NoSQL models. The book also includes techniques for conducting high-performance distributed analysis of large data on clouds. Finally, the book examines research trends such as Big Data pervasive computing, data-intensive exascale computing, and massive social network analysis.
    • Cloud Storage Security

      • 1st Edition
      • July 6, 2015
      • Aaron Wheeler + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 9 3 0 5
      • eBook
        9 7 8 0 1 2 8 0 2 9 3 1 2
      Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.
    • The Art and Science of Analyzing Software Data

      • 1st Edition
      • August 27, 2015
      • Christian Bird + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 5 1 9 4
      • eBook
        9 7 8 0 1 2 4 1 1 5 4 3 9
      The Art and Science of Analyzing Software Data provides valuable information on analysis techniques often used to derive insight from software data. This book shares best practices in the field generated by leading data scientists, collected from their experience training software engineering students and practitioners to master data science. The book covers topics such as the analysis of security data, code reviews, app stores, log files, and user telemetry, among others. It covers a wide variety of techniques such as co-change analysis, text analysis, topic analysis, and concept analysis, as well as advanced topics such as release planning and generation of source code comments. It includes stories from the trenches from expert data scientists illustrating how to apply data analysis in industry and open source, present results to stakeholders, and drive decisions.
    • Security Controls Evaluation, Testing, and Assessment Handbook

      • 1st Edition
      • December 7, 2015
      • Leighton Johnson
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 2 4 2
      • eBook
        9 7 8 0 1 2 8 0 2 5 6 4 2
      Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.
    • Medical Image Recognition, Segmentation and Parsing

      • 1st Edition
      • December 2, 2015
      • S. Kevin Zhou
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 5 8 1 9
      • eBook
        9 7 8 0 1 2 8 0 2 6 7 6 2
      This book describes the technical problems and solutions for automatically recognizing and parsing a medical image into multiple objects, structures, or anatomies. It gives all the key methods, including state-of- the-art approaches based on machine learning, for recognizing or detecting, parsing or segmenting, a cohort of anatomical structures from a medical image. Written by top experts in Medical Imaging, this book is ideal for university researchers and industry practitioners in medical imaging who want a complete reference on key methods, algorithms and applications in medical image recognition, segmentation and parsing of multiple objects. Learn: Research challenges and problems in medical image recognition, segmentation and parsing of multiple objects Methods and theories for medical image recognition, segmentation and parsing of multiple objects Efficient and effective machine learning solutions based on big datasets Selected applications of medical image parsing using proven algorithms
    • Ensuring Digital Accessibility through Process and Policy

      • 1st Edition
      • June 3, 2015
      • Jonathan Lazar + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 6 4 6 7
      • eBook
        9 7 8 0 1 2 8 0 0 7 1 0 5
      Ensuring Digital Accessibility through Process and Policy provides readers with a must-have resource to digital accessibility from both a technical and policy perspective. Inaccessible digital interfaces and content often lead to forms of societal discrimination that may be illegal under various laws. This book is unique in that it provides a multi-disciplinary understanding of digital accessibility. The book discusses the history of accessible computing, an understanding of why digital accessibility is socially and legally important, and provides both technical details (interface standards, evaluation methods) and legal details (laws, lawsuits, and regulations). The book provides real-world examples throughout, highlighting organizations that are doing an effective job with providing equal access to digital information for people with disabilities. This isn’t a book strictly about interface design, nor is it a book strictly about law. For people who are charged with implementing accessible technology and content, this book will serve as a one-stop guide to understanding digital accessibility, offering an overview of current laws, regulations, technical standards, evaluation techniques, as well as best practices and suggestions for implementing solutions and monitoring for compliance. This combination of skills from the three authors—law, technical, and research, with experience in both corporate, government, and educational settings, is unique to this book, and does not exist in any other book about any aspect of IT accessibility. The authors’ combination of skills marks a unique and valuable perspective, and provides insider knowledge on current best practices, corporate policies, and technical instructions. Together, we can ensure that the world of digital information is open to all users.
    • Entity Information Life Cycle for Big Data

      • 1st Edition
      • April 20, 2015
      • John R. Talburt + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 3 7 8
      • eBook
        9 7 8 0 1 2 8 0 0 6 6 5 8
      Entity Information Life Cycle for Big Data walks you through the ins and outs of managing entity information so you can successfully achieve master data management (MDM) in the era of big data. This book explains big data’s impact on MDM and the critical role of entity information management system (EIMS) in successful MDM. Expert authors Dr. John R. Talburt and Dr. Yinle Zhou provide a thorough background in the principles of managing the entity information life cycle and provide practical tips and techniques for implementing an EIMS, strategies for exploiting distributed processing to handle big data for EIMS, and examples from real applications. Additional material on the theory of EIIM and methods for assessing and evaluating EIMS performance also make this book appropriate for use as a textbook in courses on entity and identity management, data management, customer relationship management (CRM), and related topics.
    • Research 2.0 and the Future of Information Literacy

      • 1st Edition
      • November 24, 2015
      • Tibor Koltay + 2 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 0 7 5 5
      • eBook
        9 7 8 0 0 8 1 0 0 0 8 9 2
      Research 2.0 and the Future of Information Literacy examines possible congruencies between information literacy and Research 2.0, because the work of today’s researcher mobilizes a number of literacies. From among the various types of relevant literacies, at least three types of literacies can be mentioned in this relation: information literacy, scientific literacy and academic literacy. This book addresses these literacies in the light of the changing research landscape. Broad contexts of the researcher’s abilities, as adaptive and innovative thinking, problem solving skills, self-management and design mindset are also examined. Computational thinking and the computational paradigm in a number of fields of research are taken into consideration, as well. Researchers differ to non-researchers when populating social media, which means that these two different groups require different literacies. The relationship between information literacy and information is approached in a new way. Among the multitude of issues, we introduce a new interface between information literacy and Research 2.0. It encompasses the issues of research data management and data literacy, which represent also a challenge both for the academic library and for the communities of researchers. Similarly, the questions of new metrics of scientific output are addressed in the book.
    • Software Quality Assurance

      • 1st Edition
      • October 12, 2015
      • Ivan Mistrik + 4 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 0 1 3
      • eBook
        9 7 8 0 1 2 8 0 2 5 4 1 3
      Software Quality Assurance in Large Scale and Complex Software-intensive Systems presents novel and high-quality research related approaches that relate the quality of software architecture to system requirements, system architecture and enterprise-architect... or software testing. Modern software has become complex and adaptable due to the emergence of globalization and new software technologies, devices and networks. These changes challenge both traditional software quality assurance techniques and software engineers to ensure software quality when building today (and tomorrow’s) adaptive, context-sensitive, and highly diverse applications. This edited volume presents state of the art techniques, methodologies, tools, best practices and guidelines for software quality assurance and offers guidance for future software engineering research and practice. Each contributed chapter considers the practical application of the topic through case studies, experiments, empirical validation, or systematic comparisons with other approaches already in practice. Topics of interest include, but are not limited, to: quality attributes of system/software architectures; aligning enterprise, system, and software architecture from the point of view of total quality; design decisions and their influence on the quality of system/software architecture; methods and processes for evaluating architecture quality; quality assessment of legacy systems and third party applications; lessons learned and empirical validation of theories and frameworks on architectural quality; empirical validation and testing for assessing architecture quality.
    • The Cloud Security Ecosystem

      • 1st Edition
      • June 1, 2015
      • Raymond Choo + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 9 5 7
      • eBook
        9 7 8 0 1 2 8 0 1 7 8 0 7
      Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.