Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Cloud Storage Security

    A Practical Guide
    • 1st Edition
    • Aaron Wheeler + 1 more
    • English
    Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.
  • Advances in Computers

    • 1st Edition
    • Volume 98
    • English
    Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.
  • The Definitive Guide to ARM® Cortex®-M0 and Cortex-M0+ Processors

    • 2nd Edition
    • Joseph Yiu
    • English
    The Definitive Guide to the ARM® Cortex®-M0 and Cortex-M0+ Processors, Second Edition explains the architectures underneath ARM’s Cortex-M0 and Cortex-M0+ processors and their programming techniques. Written by ARM’s Senior Embedded Technology Manager, Joseph Yiu, the book is packed with examples on how to use the features in the Cortex-M0 and Cortex-M0+ processors. It provides detailed information on the instruction set architecture, how to use a number of popular development suites, an overview of the software development flow, and information on how to locate problems in the program code and software porting. This new edition includes the differences between the Cortex-M0 and Cortex-M0+ processors such as architectural features (e.g. unprivileged execution level, vector table relocation), new chapters on low power designs and the Memory Protection Unit (MPU), the benefits of the Cortex-M0+ processor, such as the new single cycle I/O interface, higher energy efficiency, better performance and the Micro Trace Buffer (MTB) feature, updated software development tools, updated Real Time Operating System examples using Keil™ RTX with CMSIS-RTOS APIs, examples of using various Cortex-M0 and Cortex-M0+ based microcontrollers, and much more.
  • Python Passive Network Mapping

    P2NMAP
    • 1st Edition
    • Chet Hosmer
    • English
    Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.
  • Ensuring Digital Accessibility through Process and Policy

    • 1st Edition
    • Jonathan Lazar + 2 more
    • English
    Ensuring Digital Accessibility through Process and Policy provides readers with a must-have resource to digital accessibility from both a technical and policy perspective. Inaccessible digital interfaces and content often lead to forms of societal discrimination that may be illegal under various laws. This book is unique in that it provides a multi-disciplinary understanding of digital accessibility. The book discusses the history of accessible computing, an understanding of why digital accessibility is socially and legally important, and provides both technical details (interface standards, evaluation methods) and legal details (laws, lawsuits, and regulations). The book provides real-world examples throughout, highlighting organizations that are doing an effective job with providing equal access to digital information for people with disabilities. This isn’t a book strictly about interface design, nor is it a book strictly about law. For people who are charged with implementing accessible technology and content, this book will serve as a one-stop guide to understanding digital accessibility, offering an overview of current laws, regulations, technical standards, evaluation techniques, as well as best practices and suggestions for implementing solutions and monitoring for compliance. This combination of skills from the three authors—law, technical, and research, with experience in both corporate, government, and educational settings, is unique to this book, and does not exist in any other book about any aspect of IT accessibility. The authors’ combination of skills marks a unique and valuable perspective, and provides insider knowledge on current best practices, corporate policies, and technical instructions. Together, we can ensure that the world of digital information is open to all users.
  • How Nursing has Changed with Technology, An Issue of Nursing Clinics

    • 1st Edition
    • Volume 50-2
    • Maria Overstreet
    • English
    How has technology changed the art and science of nursing practice?Many facets of nursing practice have stayed constant over the years such as the way we advocate for our patients and the art of caring for our patients. However, nursing practice has evolved over the years especially in the bedside delivery of state of the art nursing care. Technology at the bedside has forced nurse educators to change the ways in which we always have taught nursing students. Technology has also begun to change the methods used in the actual bedside nursing care. In this issue, you will hear from some of the nursing experts in areas of nursing care that has changed in either the delivery of care or method of assessing care of the patient. Nursing experts will describe some of the historical changes and intrigue you in the changes expected to come to the bedside. Why is this issue important? First, we gain insight from a review of where we have been and nurses tend to reminisce on our past as well as romance our historical roots. Second, technology is ever changing and it is good practice to keep abreast of what is happening in other areas of nursing so that we can apply others successes in our own specific areas of nursing. Third, informatics in nursing is a growing field and nursing must embrace technology and learn to adapt various methods of delivery so that we can appropriately care for and advocate for our patients.With the changes in our national healthcare system, we must encourage nurses to try out new methods of delivery as well as encourage their ideas of how nursing can change. The articles in this issue reflect these changes.
  • The Cloud Security Ecosystem

    Technical, Legal, Business and Management Issues
    • 1st Edition
    • Raymond Choo + 1 more
    • English
    Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.
  • Understanding Your Users

    A Practical Guide to User Research Methods
    • 2nd Edition
    • Kathy Baxter + 2 more
    • English
    This new and completely updated edition is a comprehensive, easy-to-read, "how-to" guide on user research methods. You'll learn about many distinct user research methods and also pre- and post-method considerations such as recruiting, facilitating activities or moderating, negotiating with product developments teams/customers, and getting your results incorporated into the product. For each method, you'll understand how to prepare for and conduct the activity, as well as analyze and present the data - all in a practical and hands-on way. Each method presented provides different information about the users and their requirements (e.g., functional requirements, information architecture). The techniques can be used together to form a complete picture of the users' needs or they can be used separately throughout the product development lifecycle to address specific product questions. These techniques have helped product teams understand the value of user experience research by providing insight into how users behave and what they need to be successful. You will find brand new case studies from leaders in industry and academia that demonstrate each method in action. This book has something to offer whether you are new to user experience or a seasoned UX professional. After reading this book, you'll be able to choose the right user research method for your research question and conduct a user research study. Then, you will be able to apply your findings to your own products.
  • Heterogeneous Computing with OpenCL 2.0

    • 1st Edition
    • David R. Kaeli + 3 more
    • English
    Heterogeneous Computing with OpenCL 2.0 teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs). This fully-revised edition includes the latest enhancements in OpenCL 2.0 including: • Shared virtual memory to increase programming flexibility and reduce data transfers that consume resources • Dynamic parallelism which reduces processor load and avoids bottlenecks • Improved imaging support and integration with OpenGL Designed to work on multiple platforms, OpenCL will help you more effectively program for a heterogeneous future. Written by leaders in the parallel computing and OpenCL communities, this book explores memory spaces, optimization techniques, extensions, debugging and profiling. Multiple case studies and examples illustrate high-performance algorithms, distributing work across heterogeneous systems, embedded domain-specific languages, and will give you hands-on OpenCL experience to address a range of fundamental parallel algorithms.
  • Knowledge-Based Systems and Legal Applications

    • 1st Edition
    • Volume 36
    • T.J.M. Bench-Capon
    • English
    This book compiles the experience of the largest project in knowledge-based systems and the law yet undertaken. It provides an in-depth introduction to representation of law in computer programs, as well as more advanced discussion and description of large knowledge-based systems building, legal representation, cooperative work, and interface design in the context of the project.