Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Securing Social Media in the Enterprise

    • 1st Edition
    • Henry Dalziel
    • English
    Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
  • Learning Processing

    A Beginner's Guide to Programming Images, Animation, and Interaction
    • 2nd Edition
    • Daniel Shiffman
    • English
    Learning Processing, Second Edition, is a friendly start-up guide to Processing, a free, open-source alternative to expensive software and daunting programming languages. Requiring no previous experience, this book is for the true programming beginner. It teaches the basic building blocks of programming needed to create cutting-edge graphics applications including interactive art, live video processing, and data visualization. Step-by-step examples, thorough explanations, hands-on exercises, and sample code, supports your learning curve.A unique lab-style manual, the book gives graphic and web designers, artists, and illustrators of all stripes a jumpstart on working with the Processing programming environment by providing instruction on the basic principles of the language, followed by careful explanations of select advanced techniques. The book has been developed with a supportive learning experience at its core. From algorithms and data mining to rendering and debugging, it teaches object-oriented programming from the ground up within the fascinating context of interactive visual media.This book is ideal for graphic designers and visual artists without programming background who want to learn programming. It will also appeal to students taking college and graduate courses in interactive media or visual computing, and for self-study.
  • Bent Functions

    Results and Applications to Cryptography
    • 1st Edition
    • Natalia Tokareva
    • English
    Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more.
  • Successful User Experience: Strategies and Roadmaps

    • 1st Edition
    • Elizabeth Rosenzweig
    • English
    Successful User Experience: Strategy and Roadmaps provides you with a hands-on guide for pulling all of the User Experience (UX) pieces together to create a strategy that includes tactics, tools, and methodologies. Leveraging material honed in user experience courses and over 25 years in the field, the author explains the value of strategic models to refine goals against available data and resources. You will learn how to think about UX from a high level, design the UX while setting goals for a product or project, and how to turn that into concrete actionable steps. After reading this book, you’ll understand: How to bring high-level planning into concrete actionable steps How Design Thinking relates to creating a good UX How to set UX Goals for a product or project How to decide which tool or methodology to use at what point in product lifecycle This book takes UX acceptance as a point of departure, and builds on it with actionable steps and case studies to develop a complete strategy, from the big picture of product design, development and commercialization, to how UX can help create stronger products. This is a must-have book for your complete UX library.
  • Formal Verification

    An Essential Toolkit for Modern VLSI Design
    • 1st Edition
    • Erik Seligman + 2 more
    • English
    Formal Verification: An Essential Toolkit for Modern VLSI Design presents practical approaches for design and validation, with hands-on advice to help working engineers integrate these techniques into their work. Formal Verification (FV) enables a designer to directly analyze and mathematically explore the quality or other aspects of a Register Transfer Level (RTL) design without using simulations. This can reduce time spent validating designs and more quickly reach a final design for manufacturing. Building on a basic knowledge of SystemVerilog, this book demystifies FV and presents the practical applications that are bringing it into mainstream design and validation processes at Intel and other companies. After reading this book, readers will be prepared to introduce FV in their organization and effectively deploy FV techniques to increase design and validation productivity.
  • High Performance Parallelism Pearls Volume Two

    Multicore and Many-core Programming Approaches
    • 1st Edition
    • Jim Jeffers + 1 more
    • English
    High Performance Parallelism Pearls Volume 2 offers another set of examples that demonstrate how to leverage parallelism. Similar to Volume 1, the techniques included here explain how to use processors and coprocessors with the same programming – illustrating the most effective ways to combine Xeon Phi coprocessors with Xeon and other multicore processors. The book includes examples of successful programming efforts, drawn from across industries and domains such as biomed, genetics, finance, manufacturing, imaging, and more. Each chapter in this edited work includes detailed explanations of the programming techniques used, while showing high performance results on both Intel Xeon Phi coprocessors and multicore processors. Learn from dozens of new examples and case studies illustrating "success stories" demonstrating not just the features of Xeon-powered systems, but also how to leverage parallelism across these heterogeneous systems.
  • Dissecting the Hack

    The V3rb0t3n Network
    • 1st Edition
    • Jayson E Street
    • English
    Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
  • The Digital Evolution of Live Music

    • 1st Edition
    • Angela Jones + 1 more
    • English
    The concept of ‘live’ has changed as a consequence of mediated culture. Interaction may occur in real time, but not necessarily in shared physical spaces with others. The Digital Evolution of Live Music considers notions of live music in time and space as influenced by digital technology. This book presents the argument that live music is a special case in digital experience due to its liminal status between mind and body, words and feelings, sight and sound, virtual and real. Digital live music occupies a multimodal role in a cultural contextual landscape shaped by technological innovation. The book consists of three sections. The first section looks at fan perspectives, digital technology and the jouissance of live music and music festival fans. The second section discusses music in popular culture, exploring YouTube and live music video culture and gaming soundtracks, followed by the concluding section which investigates the future of live music and digital culture.
  • Computational Materials Engineering

    Achieving High Accuracy and Efficiency in Metals Processing Simulations
    • 1st Edition
    • Maciej Pietrzyk + 3 more
    • English
    Computational Materials Engineering: Achieving High Accuracy and Efficiency in Metals Processing Simulations describes the most common computer modeling and simulation techniques used in metals processing, from so-called "fast" models to more advanced multiscale models, also evaluating possible methods for improving computational accuracy and efficiency. Beginning with a discussion of conventional fast models like internal variable models for flow stress and microstructure evolution, the book moves on to advanced multiscale models, such as the CAFÉ method, which give insights into the phenomena occurring in materials in lower dimensional scales. The book then delves into the various methods that have been developed to deal with problems, including long computing times, lack of proof of the uniqueness of the solution, difficulties with convergence of numerical procedures, local minima in the objective function, and ill-posed problems. It then concludes with suggestions on how to improve accuracy and efficiency in computational materials modeling, and a best practices guide for selecting the best model for a particular application.
  • Up and Running with AutoCAD 2016

    2D and 3D Drawing and Modeling
    • 1st Edition
    • Elliot J. Gindis
    • English
    Get up and running with AutoCAD using Gindis’ combination of step-by-step instruction, examples and insightful explanations. The emphasis from the beginning is on core concepts and practical application of AutoCAD in engineering, architecture, and design. Equally useful in instructor-led classroom training, self-study, or as a professional reference, the book is written with the user in mind by a long-time AutoCAD professional and instructor based on what works in the industry and the classroom.