Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Python Passive Network Mapping

    P2NMAP
    • 1st Edition
    • Chet Hosmer
    • English
    Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.
  • Ensuring Digital Accessibility through Process and Policy

    • 1st Edition
    • Jonathan Lazar + 2 more
    • English
    Ensuring Digital Accessibility through Process and Policy provides readers with a must-have resource to digital accessibility from both a technical and policy perspective. Inaccessible digital interfaces and content often lead to forms of societal discrimination that may be illegal under various laws. This book is unique in that it provides a multi-disciplinary understanding of digital accessibility. The book discusses the history of accessible computing, an understanding of why digital accessibility is socially and legally important, and provides both technical details (interface standards, evaluation methods) and legal details (laws, lawsuits, and regulations). The book provides real-world examples throughout, highlighting organizations that are doing an effective job with providing equal access to digital information for people with disabilities. This isn’t a book strictly about interface design, nor is it a book strictly about law. For people who are charged with implementing accessible technology and content, this book will serve as a one-stop guide to understanding digital accessibility, offering an overview of current laws, regulations, technical standards, evaluation techniques, as well as best practices and suggestions for implementing solutions and monitoring for compliance. This combination of skills from the three authors—law, technical, and research, with experience in both corporate, government, and educational settings, is unique to this book, and does not exist in any other book about any aspect of IT accessibility. The authors’ combination of skills marks a unique and valuable perspective, and provides insider knowledge on current best practices, corporate policies, and technical instructions. Together, we can ensure that the world of digital information is open to all users.
  • How Nursing has Changed with Technology, An Issue of Nursing Clinics

    • 1st Edition
    • Volume 50-2
    • Maria Overstreet
    • English
    How has technology changed the art and science of nursing practice?Many facets of nursing practice have stayed constant over the years such as the way we advocate for our patients and the art of caring for our patients. However, nursing practice has evolved over the years especially in the bedside delivery of state of the art nursing care. Technology at the bedside has forced nurse educators to change the ways in which we always have taught nursing students. Technology has also begun to change the methods used in the actual bedside nursing care. In this issue, you will hear from some of the nursing experts in areas of nursing care that has changed in either the delivery of care or method of assessing care of the patient. Nursing experts will describe some of the historical changes and intrigue you in the changes expected to come to the bedside. Why is this issue important? First, we gain insight from a review of where we have been and nurses tend to reminisce on our past as well as romance our historical roots. Second, technology is ever changing and it is good practice to keep abreast of what is happening in other areas of nursing so that we can apply others successes in our own specific areas of nursing. Third, informatics in nursing is a growing field and nursing must embrace technology and learn to adapt various methods of delivery so that we can appropriately care for and advocate for our patients.With the changes in our national healthcare system, we must encourage nurses to try out new methods of delivery as well as encourage their ideas of how nursing can change. The articles in this issue reflect these changes.
  • The Cloud Security Ecosystem

    Technical, Legal, Business and Management Issues
    • 1st Edition
    • Raymond Choo + 1 more
    • English
    Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.
  • Understanding Your Users

    A Practical Guide to User Research Methods
    • 2nd Edition
    • Kathy Baxter + 2 more
    • English
    This new and completely updated edition is a comprehensive, easy-to-read, "how-to" guide on user research methods. You'll learn about many distinct user research methods and also pre- and post-method considerations such as recruiting, facilitating activities or moderating, negotiating with product developments teams/customers, and getting your results incorporated into the product. For each method, you'll understand how to prepare for and conduct the activity, as well as analyze and present the data - all in a practical and hands-on way. Each method presented provides different information about the users and their requirements (e.g., functional requirements, information architecture). The techniques can be used together to form a complete picture of the users' needs or they can be used separately throughout the product development lifecycle to address specific product questions. These techniques have helped product teams understand the value of user experience research by providing insight into how users behave and what they need to be successful. You will find brand new case studies from leaders in industry and academia that demonstrate each method in action. This book has something to offer whether you are new to user experience or a seasoned UX professional. After reading this book, you'll be able to choose the right user research method for your research question and conduct a user research study. Then, you will be able to apply your findings to your own products.
  • Heterogeneous Computing with OpenCL 2.0

    • 1st Edition
    • David R. Kaeli + 3 more
    • English
    Heterogeneous Computing with OpenCL 2.0 teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs). This fully-revised edition includes the latest enhancements in OpenCL 2.0 including: • Shared virtual memory to increase programming flexibility and reduce data transfers that consume resources • Dynamic parallelism which reduces processor load and avoids bottlenecks • Improved imaging support and integration with OpenGL Designed to work on multiple platforms, OpenCL will help you more effectively program for a heterogeneous future. Written by leaders in the parallel computing and OpenCL communities, this book explores memory spaces, optimization techniques, extensions, debugging and profiling. Multiple case studies and examples illustrate high-performance algorithms, distributing work across heterogeneous systems, embedded domain-specific languages, and will give you hands-on OpenCL experience to address a range of fundamental parallel algorithms.
  • Knowledge-Based Systems and Legal Applications

    • 1st Edition
    • Volume 36
    • T.J.M. Bench-Capon
    • English
    This book compiles the experience of the largest project in knowledge-based systems and the law yet undertaken. It provides an in-depth introduction to representation of law in computer programs, as well as more advanced discussion and description of large knowledge-based systems building, legal representation, cooperative work, and interface design in the context of the project.
  • To MOOC or Not to MOOC

    How Can Online Learning Help to Build the Future of Higher Education?
    • 1st Edition
    • Sarah Porter
    • English
    Scarcely a week goes by without coverage in the UK and international media about the latest MOOC revelation. Despite some significant initiatives in the dotcom era, online learning has somehow never delivered on its promise to revolutionize education. To MOOC or not to MOOC explores the history of MOOCs and analyses the current MOOC context by describing six institutions and the story of their engagement with MOOCs. Looking at each of the different type of institution in turn, it analyses the processes behind their decision to engage with online learning and MOOCs, how the MOOC project is managed and led, and discusses issues such as quality assurance, governance and partnerships. Chapters draw together and analyse the data and draw out advice for institutions, to help them make choices about how to respond to MOOCs and other high-impact changes in digital education. The book contains checklists and planning tools to support strategy and planning, and concludes with a future look at MOOCs exploring some of the possible trends that may impact upon higher education, such as business models, data and analytics, learning design and competitors in the MOOC marketplace.
  • Abstract Domains in Constraint Programming

    • 1st Edition
    • Marie Pelleau
    • English
    Constraint Programming aims at solving hard combinatorial problems, with a computation time increasing in practice exponentially. The methods are today efficient enough to solve large industrial problems, in a generic framework. However, solvers are dedicated to a single variable type: integer or real. Solving mixed problems relies on ad hoc transformations. In another field, Abstract Interpretation offers tools to prove program properties, by studying an abstraction of their concrete semantics, that is, the set of possible values of the variables during an execution. Various representations for these abstractions have been proposed. They are called abstract domains. Abstract domains can mix any type of variables, and even represent relations between the variables. In this work, we define abstract domains for Constraint Programming, so as to build a generic solving method, dealing with both integer and real variables. We also study the octagons abstract domain, already defined in Abstract Interpretation. Guiding the search by the octagonal relations, we obtain good results on a continuous benchmark. We also define our solving method using Abstract Interpretation techniques, in order to include existing abstract domains. Our solver, AbSolute, is able to solve mixed problems and use relational domains.
  • Securing SQL Server

    Protecting Your Database from Attackers
    • 3rd Edition
    • Denny Cherry
    • English
    SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.