Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Advances in Computers

      • 1st Edition
      • Volume 99
      • August 18, 2015
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 1 3 1 6
      • eBook
        9 7 8 0 1 2 8 0 2 3 3 9 6
      Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.
    • Internet Congestion Control

      • 1st Edition
      • August 17, 2015
      • Subir Varma
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 5 8 3 2
      • eBook
        9 7 8 0 1 2 8 0 3 6 0 0 6
      Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of application domains such as Data Center Networks, Video Streaming, High Speed Links and Broadband Wireless Networks. When seen through the lens of analytical modeling, there are a number of common threads that run through the design and analysis of congestion control protocols in all these different areas, which are emphasized in this book. The book also cuts a path through the profusion of algorithms in the literature, and puts the topic on a systematic and logical footing. Internet Congestion Control provides practicing network engineers and researchers with a comprehensive and accessible coverage of analytical models of congestion control algorithms, and gives readers everything needed to understand the latest developments and research in this area.
    • Effective Security Management

      • 6th Edition
      • August 15, 2015
      • Charles A. Sennewald + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 7 7 4 5
      • eBook
        9 7 8 0 1 2 8 0 2 7 9 0 5
      Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.
    • Securing Social Media in the Enterprise

      • 1st Edition
      • August 11, 2015
      • Henry Dalziel
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 1 8 0 2
      • eBook
        9 7 8 0 1 2 8 0 4 1 9 6 3
      Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
    • Bent Functions

      • 1st Edition
      • August 6, 2015
      • Natalia Tokareva
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 1 8 1
      • eBook
        9 7 8 0 1 2 8 0 2 5 5 5 0
      Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more.
    • Learning Processing

      • 2nd Edition
      • August 6, 2015
      • Daniel Shiffman
      • English
      • Paperback
        9 7 8 0 1 2 3 9 4 4 4 3 6
      • eBook
        9 7 8 0 1 2 3 9 4 7 9 2 5
      Learning Processing, Second Edition, is a friendly start-up guide to Processing, a free, open-source alternative to expensive software and daunting programming languages. Requiring no previous experience, this book is for the true programming beginner. It teaches the basic building blocks of programming needed to create cutting-edge graphics applications including interactive art, live video processing, and data visualization. Step-by-step examples, thorough explanations, hands-on exercises, and sample code, supports your learning curve.A unique lab-style manual, the book gives graphic and web designers, artists, and illustrators of all stripes a jumpstart on working with the Processing programming environment by providing instruction on the basic principles of the language, followed by careful explanations of select advanced techniques. The book has been developed with a supportive learning experience at its core. From algorithms and data mining to rendering and debugging, it teaches object-oriented programming from the ground up within the fascinating context of interactive visual media.This book is ideal for graphic designers and visual artists without programming background who want to learn programming. It will also appeal to students taking college and graduate courses in interactive media or visual computing, and for self-study.
    • Successful User Experience: Strategies and Roadmaps

      • 1st Edition
      • August 3, 2015
      • Elizabeth Rosenzweig
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 9 8 5 7
      • eBook
        9 7 8 0 1 2 8 0 1 0 6 1 7
      Successful User Experience: Strategy and Roadmaps provides you with a hands-on guide for pulling all of the User Experience (UX) pieces together to create a strategy that includes tactics, tools, and methodologies. Leveraging material honed in user experience courses and over 25 years in the field, the author explains the value of strategic models to refine goals against available data and resources. You will learn how to think about UX from a high level, design the UX while setting goals for a product or project, and how to turn that into concrete actionable steps. After reading this book, you’ll understand: How to bring high-level planning into concrete actionable steps How Design Thinking relates to creating a good UX How to set UX Goals for a product or project How to decide which tool or methodology to use at what point in product lifecycle This book takes UX acceptance as a point of departure, and builds on it with actionable steps and case studies to develop a complete strategy, from the big picture of product design, development and commercialization, to how UX can help create stronger products. This is a must-have book for your complete UX library.
    • Formal Verification

      • 1st Edition
      • July 24, 2015
      • Erik Seligman + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 2 7 3
      • eBook
        9 7 8 0 1 2 8 0 0 8 1 5 7
      Formal Verification: An Essential Toolkit for Modern VLSI Design presents practical approaches for design and validation, with hands-on advice to help working engineers integrate these techniques into their work. Formal Verification (FV) enables a designer to directly analyze and mathematically explore the quality or other aspects of a Register Transfer Level (RTL) design without using simulations. This can reduce time spent validating designs and more quickly reach a final design for manufacturing. Building on a basic knowledge of SystemVerilog, this book demystifies FV and presents the practical applications that are bringing it into mainstream design and validation processes at Intel and other companies. After reading this book, readers will be prepared to introduce FV in their organization and effectively deploy FV techniques to increase design and validation productivity.
    • High Performance Parallelism Pearls Volume Two

      • 1st Edition
      • July 23, 2015
      • Jim Jeffers + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 8 1 9 2
      • eBook
        9 7 8 0 1 2 8 0 3 8 9 0 1
      High Performance Parallelism Pearls Volume 2 offers another set of examples that demonstrate how to leverage parallelism. Similar to Volume 1, the techniques included here explain how to use processors and coprocessors with the same programming – illustrating the most effective ways to combine Xeon Phi coprocessors with Xeon and other multicore processors. The book includes examples of successful programming efforts, drawn from across industries and domains such as biomed, genetics, finance, manufacturing, imaging, and more. Each chapter in this edited work includes detailed explanations of the programming techniques used, while showing high performance results on both Intel Xeon Phi coprocessors and multicore processors. Learn from dozens of new examples and case studies illustrating "success stories" demonstrating not just the features of Xeon-powered systems, but also how to leverage parallelism across these heterogeneous systems.
    • Dissecting the Hack

      • 1st Edition
      • July 20, 2015
      • Jayson E Street
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 2 7 8 6
      • eBook
        9 7 8 0 1 2 8 0 4 2 8 2 3
      Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.