Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Systems Programming

      • 1st Edition
      • February 25, 2015
      • Richard Anthony
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 2 9 7
      • eBook
        9 7 8 0 1 2 8 0 0 8 1 7 1
      Systems Programming: Designing and Developing Distributed Applications explains how the development of distributed applications depends on a foundational understanding of the relationship among operating systems, networking, distributed systems, and programming. Uniquely organized around four viewpoints (process, communication, resource, and architecture), the fundamental and essential characteristics of distributed systems are explored in ways which cut across the various traditional subject area boundaries. The structures, configurations and behaviours of distributed systems are all examined, allowing readers to explore concepts from different perspectives, and to understand systems in depth, both from the component level and holistically.
    • Design Recipes for FPGAs

      • 2nd Edition
      • September 23, 2015
      • Peter Wilson
      • English
      • Paperback
        9 7 8 0 0 8 0 9 7 1 2 9 2
      • eBook
        9 7 8 0 0 8 0 9 7 1 3 6 0
      Design Recipes for FPGAs provides a rich toolbox of design techniques and templates to solve practical, every-day problems using FPGAs. Using a modular structure, it provides design techniques and templates at all levels, together with functional code, which you can easily match and apply to your application. Written in an informal and easy to grasp style, this invaluable resource goes beyond the principles of FPGAs and hardware description languages to demonstrate how specific designs can be synthesized, simulated and downloaded onto an FPGA. In addition, the book provides advanced techniques to create ‘real world’ designs that fit the device required and which are fast and reliable to implement.
    • Hacking Web Intelligence

      • 1st Edition
      • April 13, 2015
      • Sudhanshu Chauhan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 8 6 7 5
      • eBook
        9 7 8 0 1 2 8 0 1 9 1 2 2
      Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
    • Learning-Based Local Visual Representation and Indexing

      • 1st Edition
      • March 23, 2015
      • Rongrong Ji + 4 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 4 0 9 6
      • eBook
        9 7 8 0 1 2 8 0 2 6 2 0 5
      Learning-Based Local Visual Representation and Indexing, reviews the state-of-the-art in visual content representation and indexing, introduces cutting-edge techniques in learning based visual representation, and discusses emerging topics in visual local representation, and introduces the most recent advances in content-based visual search techniques.
    • Supporting Research in Area Studies

      • 1st Edition
      • August 19, 2015
      • Lesley Pitman
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 9 0 3
      • eBook
        9 7 8 1 7 8 0 6 3 4 7 1 5
      Supporting Research in Area Studies: A Guide for Academic Libraries focuses on the study of other countries or regions of the world, crossing traditional disciplinary boundaries in the humanities and social sciences. The book provides a comprehensive guide for academic libraries supporting communities of researchers, exploring the specialist requirements of these researchers in information resources, resource discovery tools, information skills, and the challenges of working with materials in multiple languages. The book makes the case that adapting systems and procedures to meet these needs will help academic libraries be better placed to support their institutions’ international agenda. Early chapters cover the academic landscape, its history, area studies, librarianship, and acquisitions. Subsequent chapters discuss collections management, digital products, and the digital humanities, and their role in academic projects, with final sections exploring information skills and the various disciplinary skills that facilitate the needs of researchers during their careers.
    • Cognitive Ergonomics

      • 1st Edition
      • September 3, 2015
      • Pierre Falzon
      • English
      • eBook
        9 7 8 1 4 8 3 2 8 8 4 9 9
      This reference work covers the breadth of cognitive ergonomics in human*b1computer interaction (HCI). Covering models for design, learning procedures, and planning and understanding, this book is specifically concerned with the cognitive ergonomics of human*b1computer interaction--from analogical thinking to spreadsheet calculation, office organization to process control. It provides an overview of HCI issues from the cognitive perspective.
    • Agent-Based Spatial Simulation with NetLogo Volume 1

      • 1st Edition
      • August 19, 2015
      • Arnaud Banos + 2 more
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 5 5 3
      • eBook
        9 7 8 0 0 8 1 0 0 7 2 3 5
      Agent-based modeling is a flexible and intuitive approach that is close to both data and theories, which gives it a special position in the majority of scientific communities. Agent models are as much tools of understanding, exploration and adaptation as they are media for interdisciplinary exchange. It is in this kind of framework that this book is situated, beginning with agent-based modeling of spatialized phenomena with a methodological and practical orientation. Through a governing example, taking inspiration from a real problem in epidemiology, this book proposes, with pedagogy and economy, a guide to good practices of agent modeling. The reader will thus be able to understand and put the modeling into practice and acquire a certain amount of autonomy.
    • Python Passive Network Mapping

      • 1st Edition
      • June 10, 2015
      • Chet Hosmer
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 2 1 9
      • eBook
        9 7 8 0 1 2 8 0 2 7 4 2 4
      Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.
    • Social Sensing

      • 1st Edition
      • March 23, 2015
      • Dong Wang + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 6 7 6
      • eBook
        9 7 8 0 1 2 8 0 1 1 3 1 7
      Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion.
    • Green Information Technology

      • 1st Edition
      • March 3, 2015
      • Mohammad Dastbaz + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 7 9 3
      • eBook
        9 7 8 0 1 2 8 0 1 6 7 1 8
      We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres) currently use 7 giga watts of electricity during peak loads. This translates into about 61 billion kilowatt hours of electricity used. By the EPA’s estimates, power-hungry data centres consume the annual output of 15 average-sized power plants. One of the top constraints to increasing computing power, besides the ability to cool, is simply delivering enough power to a given physical space. Green Information Technology: A Sustainable Approach offers in a single volume a broad collection of practical techniques and methodologies for designing, building and implementing a green technology strategy in any large enterprise environment, which up until now has been scattered in difficult-to-find scholarly resources. Included here is the latest information on emerging technologies and their environmental impact, how to effectively measure sustainability, discussions on sustainable hardware and software design, as well as how to use big data and cloud computing to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Written by recognized experts in both academia and industry, Green Information Technology: A Sustainable Approach is a must-have guide for researchers, computer architects, computer engineers and IT professionals with an interest in greater efficiency with less environmental impact.