Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • The Digital Evolution of Live Music

      • 1st Edition
      • July 17, 2015
      • Angela Jones + 1 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 0 6 7 0
      • eBook
        9 7 8 0 0 8 1 0 0 0 7 0 0
      The concept of ‘live’ has changed as a consequence of mediated culture. Interaction may occur in real time, but not necessarily in shared physical spaces with others. The Digital Evolution of Live Music considers notions of live music in time and space as influenced by digital technology. This book presents the argument that live music is a special case in digital experience due to its liminal status between mind and body, words and feelings, sight and sound, virtual and real. Digital live music occupies a multimodal role in a cultural contextual landscape shaped by technological innovation. The book consists of three sections. The first section looks at fan perspectives, digital technology and the jouissance of live music and music festival fans. The second section discusses music in popular culture, exploring YouTube and live music video culture and gaming soundtracks, followed by the concluding section which investigates the future of live music and digital culture.
    • Computational Materials Engineering

      • 1st Edition
      • July 13, 2015
      • Maciej Pietrzyk + 3 more
      • English
      • Hardback
        9 7 8 0 1 2 4 1 6 7 0 7 0
      • eBook
        9 7 8 0 1 2 4 1 6 7 2 4 7
      Computational Materials Engineering: Achieving High Accuracy and Efficiency in Metals Processing Simulations describes the most common computer modeling and simulation techniques used in metals processing, from so-called "fast" models to more advanced multiscale models, also evaluating possible methods for improving computational accuracy and efficiency. Beginning with a discussion of conventional fast models like internal variable models for flow stress and microstructure evolution, the book moves on to advanced multiscale models, such as the CAFÉ method, which give insights into the phenomena occurring in materials in lower dimensional scales. The book then delves into the various methods that have been developed to deal with problems, including long computing times, lack of proof of the uniqueness of the solution, difficulties with convergence of numerical procedures, local minima in the objective function, and ill-posed problems. It then concludes with suggestions on how to improve accuracy and efficiency in computational materials modeling, and a best practices guide for selecting the best model for a particular application.
    • Up and Running with AutoCAD 2016

      • 1st Edition
      • July 11, 2015
      • Elliot J. Gindis
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 5 7 2 6
      • eBook
        9 7 8 0 1 2 8 0 3 5 7 3 3
      Get up and running with AutoCAD using Gindis’ combination of step-by-step instruction, examples and insightful explanations. The emphasis from the beginning is on core concepts and practical application of AutoCAD in engineering, architecture, and design. Equally useful in instructor-led classroom training, self-study, or as a professional reference, the book is written with the user in mind by a long-time AutoCAD professional and instructor based on what works in the industry and the classroom.
    • Cloud Storage Security

      • 1st Edition
      • July 6, 2015
      • Aaron Wheeler + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 9 3 0 5
      • eBook
        9 7 8 0 1 2 8 0 2 9 3 1 2
      Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.
    • Advances in Computers

      • 1st Edition
      • Volume 98
      • June 17, 2015
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 1 3 2 3
      • eBook
        9 7 8 0 1 2 8 0 2 3 4 0 2
      Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.
    • The Definitive Guide to ARM® Cortex®-M0 and Cortex-M0+ Processors

      • 2nd Edition
      • June 15, 2015
      • Joseph Yiu
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 2 7 7 0
      • eBook
        9 7 8 0 1 2 8 0 3 2 7 8 7
      The Definitive Guide to the ARM® Cortex®-M0 and Cortex-M0+ Processors, Second Edition explains the architectures underneath ARM’s Cortex-M0 and Cortex-M0+ processors and their programming techniques. Written by ARM’s Senior Embedded Technology Manager, Joseph Yiu, the book is packed with examples on how to use the features in the Cortex-M0 and Cortex-M0+ processors. It provides detailed information on the instruction set architecture, how to use a number of popular development suites, an overview of the software development flow, and information on how to locate problems in the program code and software porting. This new edition includes the differences between the Cortex-M0 and Cortex-M0+ processors such as architectural features (e.g. unprivileged execution level, vector table relocation), new chapters on low power designs and the Memory Protection Unit (MPU), the benefits of the Cortex-M0+ processor, such as the new single cycle I/O interface, higher energy efficiency, better performance and the Micro Trace Buffer (MTB) feature, updated software development tools, updated Real Time Operating System examples using Keil™ RTX with CMSIS-RTOS APIs, examples of using various Cortex-M0 and Cortex-M0+ based microcontrollers, and much more.
    • Python Passive Network Mapping

      • 1st Edition
      • June 10, 2015
      • Chet Hosmer
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 2 1 9
      • eBook
        9 7 8 0 1 2 8 0 2 7 4 2 4
      Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.
    • Ensuring Digital Accessibility through Process and Policy

      • 1st Edition
      • June 3, 2015
      • Jonathan Lazar + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 6 4 6 7
      • eBook
        9 7 8 0 1 2 8 0 0 7 1 0 5
      Ensuring Digital Accessibility through Process and Policy provides readers with a must-have resource to digital accessibility from both a technical and policy perspective. Inaccessible digital interfaces and content often lead to forms of societal discrimination that may be illegal under various laws. This book is unique in that it provides a multi-disciplinary understanding of digital accessibility. The book discusses the history of accessible computing, an understanding of why digital accessibility is socially and legally important, and provides both technical details (interface standards, evaluation methods) and legal details (laws, lawsuits, and regulations). The book provides real-world examples throughout, highlighting organizations that are doing an effective job with providing equal access to digital information for people with disabilities. This isn’t a book strictly about interface design, nor is it a book strictly about law. For people who are charged with implementing accessible technology and content, this book will serve as a one-stop guide to understanding digital accessibility, offering an overview of current laws, regulations, technical standards, evaluation techniques, as well as best practices and suggestions for implementing solutions and monitoring for compliance. This combination of skills from the three authors—law, technical, and research, with experience in both corporate, government, and educational settings, is unique to this book, and does not exist in any other book about any aspect of IT accessibility. The authors’ combination of skills marks a unique and valuable perspective, and provides insider knowledge on current best practices, corporate policies, and technical instructions. Together, we can ensure that the world of digital information is open to all users.
    • How Nursing has Changed with Technology, An Issue of Nursing Clinics

      • 1st Edition
      • Volume 50-2
      • June 2, 2015
      • Maria Overstreet
      • English
      • Hardback
        9 7 8 0 3 2 3 3 8 8 9 6 2
      • eBook
        9 7 8 0 3 2 3 3 8 8 9 7 9
      How has technology changed the art and science of nursing practice?Many facets of nursing practice have stayed constant over the years such as the way we advocate for our patients and the art of caring for our patients. However, nursing practice has evolved over the years especially in the bedside delivery of state of the art nursing care. Technology at the bedside has forced nurse educators to change the ways in which we always have taught nursing students. Technology has also begun to change the methods used in the actual bedside nursing care. In this issue, you will hear from some of the nursing experts in areas of nursing care that has changed in either the delivery of care or method of assessing care of the patient. Nursing experts will describe some of the historical changes and intrigue you in the changes expected to come to the bedside. Why is this issue important? First, we gain insight from a review of where we have been and nurses tend to reminisce on our past as well as romance our historical roots. Second, technology is ever changing and it is good practice to keep abreast of what is happening in other areas of nursing so that we can apply others successes in our own specific areas of nursing. Third, informatics in nursing is a growing field and nursing must embrace technology and learn to adapt various methods of delivery so that we can appropriately care for and advocate for our patients.With the changes in our national healthcare system, we must encourage nurses to try out new methods of delivery as well as encourage their ideas of how nursing can change. The articles in this issue reflect these changes.
    • The Cloud Security Ecosystem

      • 1st Edition
      • June 1, 2015
      • Raymond Choo + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 9 5 7
      • eBook
        9 7 8 0 1 2 8 0 1 7 8 0 7
      Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.