Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Understanding Your Users

      • 2nd Edition
      • May 20, 2015
      • Kathy Baxter + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 3 2 2
      • eBook
        9 7 8 0 1 2 8 0 0 6 0 9 2
      This new and completely updated edition is a comprehensive, easy-to-read, "how-to" guide on user research methods. You'll learn about many distinct user research methods and also pre- and post-method considerations such as recruiting, facilitating activities or moderating, negotiating with product developments teams/customers, and getting your results incorporated into the product. For each method, you'll understand how to prepare for and conduct the activity, as well as analyze and present the data - all in a practical and hands-on way. Each method presented provides different information about the users and their requirements (e.g., functional requirements, information architecture). The techniques can be used together to form a complete picture of the users' needs or they can be used separately throughout the product development lifecycle to address specific product questions. These techniques have helped product teams understand the value of user experience research by providing insight into how users behave and what they need to be successful. You will find brand new case studies from leaders in industry and academia that demonstrate each method in action. This book has something to offer whether you are new to user experience or a seasoned UX professional. After reading this book, you'll be able to choose the right user research method for your research question and conduct a user research study. Then, you will be able to apply your findings to your own products.
    • Heterogeneous Computing with OpenCL 2.0

      • 1st Edition
      • May 18, 2015
      • David R. Kaeli + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 4 1 4 1
      • eBook
        9 7 8 0 1 2 8 0 1 6 4 9 7
      Heterogeneous Computing with OpenCL 2.0 teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs). This fully-revised edition includes the latest enhancements in OpenCL 2.0 including: • Shared virtual memory to increase programming flexibility and reduce data transfers that consume resources • Dynamic parallelism which reduces processor load and avoids bottlenecks • Improved imaging support and integration with OpenGL Designed to work on multiple platforms, OpenCL will help you more effectively program for a heterogeneous future. Written by leaders in the parallel computing and OpenCL communities, this book explores memory spaces, optimization techniques, extensions, debugging and profiling. Multiple case studies and examples illustrate high-performance algorithms, distributing work across heterogeneous systems, embedded domain-specific languages, and will give you hands-on OpenCL experience to address a range of fundamental parallel algorithms.
    • To MOOC or Not to MOOC

      • 1st Edition
      • May 11, 2015
      • Sarah Porter
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 0 4 8 9
      • eBook
        9 7 8 0 0 8 1 0 0 0 6 1 8
      Scarcely a week goes by without coverage in the UK and international media about the latest MOOC revelation. Despite some significant initiatives in the dotcom era, online learning has somehow never delivered on its promise to revolutionize education. To MOOC or not to MOOC explores the history of MOOCs and analyses the current MOOC context by describing six institutions and the story of their engagement with MOOCs. Looking at each of the different type of institution in turn, it analyses the processes behind their decision to engage with online learning and MOOCs, how the MOOC project is managed and led, and discusses issues such as quality assurance, governance and partnerships. Chapters draw together and analyse the data and draw out advice for institutions, to help them make choices about how to respond to MOOCs and other high-impact changes in digital education. The book contains checklists and planning tools to support strategy and planning, and concludes with a future look at MOOCs exploring some of the possible trends that may impact upon higher education, such as business models, data and analytics, learning design and competitors in the MOOC marketplace.
    • Knowledge-Based Systems and Legal Applications

      • 1st Edition
      • Volume 36
      • May 11, 2015
      • T.J.M. Bench-Capon
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 8 2 7
      • eBook
        9 7 8 1 4 8 3 2 9 5 3 4 3
      This book compiles the experience of the largest project in knowledge-based systems and the law yet undertaken. It provides an in-depth introduction to representation of law in computer programs, as well as more advanced discussion and description of large knowledge-based systems building, legal representation, cooperative work, and interface design in the context of the project.
    • Abstract Domains in Constraint Programming

      • 1st Edition
      • May 6, 2015
      • Marie Pelleau
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 1 0 2
      • eBook
        9 7 8 0 0 8 1 0 0 4 6 4 7
      Constraint Programming aims at solving hard combinatorial problems, with a computation time increasing in practice exponentially. The methods are today efficient enough to solve large industrial problems, in a generic framework. However, solvers are dedicated to a single variable type: integer or real. Solving mixed problems relies on ad hoc transformations. In another field, Abstract Interpretation offers tools to prove program properties, by studying an abstraction of their concrete semantics, that is, the set of possible values of the variables during an execution. Various representations for these abstractions have been proposed. They are called abstract domains. Abstract domains can mix any type of variables, and even represent relations between the variables. In this work, we define abstract domains for Constraint Programming, so as to build a generic solving method, dealing with both integer and real variables. We also study the octagons abstract domain, already defined in Abstract Interpretation. Guiding the search by the octagonal relations, we obtain good results on a continuous benchmark. We also define our solving method using Abstract Interpretation techniques, in order to include existing abstract domains. Our solver, AbSolute, is able to solve mixed problems and use relational domains.
    • Securing SQL Server

      • 3rd Edition
      • April 23, 2015
      • Denny Cherry
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 2 7 5 8
      • eBook
        9 7 8 0 1 2 8 0 1 3 7 5 5
      SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.
    • Electronic Textiles

      • 1st Edition
      • April 22, 2015
      • Tilak Dias
      • English
      • Hardback
        9 7 8 0 0 8 1 0 0 2 0 1 8
      • eBook
        9 7 8 0 0 8 1 0 0 2 2 3 0
      The integration of electronics into textiles and clothing has opened up an array of functions beyond those of conventional textiles. These novel materials are beginning to find applications in commercial products, in fields such as communication, healthcare, protection and wearable technology. Electronic Textiles: Smart Fabrics and Wearable Technology opens with an initiation to the area from the editor, Tilak Dias. Part One introduces conductive fibres, carbon nano-tubes and polymer yarns. Part Two discusses techniques for integrating textiles and electronics, including the design of textile-based sensors and actuators, and energy harvesting methods. Finally, Part Three covers a range of electronic textile applications, from wearable electronics to technical textiles featuring expert chapters on embroidered antennas for communication systems and wearable sensors for athletes.
    • Modeling and Simulation of Computer Networks and Systems

      • 1st Edition
      • April 21, 2015
      • Faouzi Zarai + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 8 7 4
      • eBook
        9 7 8 0 1 2 8 0 1 1 5 8 4
      Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications introduces you to a broad array of modeling and simulation issues related to computer networks and systems. It focuses on the theories, tools, applications and uses of modeling and simulation in order to effectively optimize networks. It describes methodologies for modeling and simulation of new generations of wireless and mobiles networks and cloud and grid computing systems. Drawing upon years of practical experience and using numerous examples and illustrative applications recognized experts in both academia and industry, discuss: Important and emerging topics in computer networks and systems including but not limited to; modeling, simulation, analysis and security of wireless and mobiles networks especially as they relate to next generation wireless networks Methodologies, strategies and tools, and strategies needed to build computer networks and systems modeling and simulation from the bottom up Different network performance metrics including, mobility, congestion, quality of service, security and more... Modeling and Simulation of Computer Networks and Systems is a must have resource for network architects, engineers and researchers who want to gain insight into optimizing network performance through the use of modeling and simulation.
    • Entity Information Life Cycle for Big Data

      • 1st Edition
      • April 20, 2015
      • John R. Talburt + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 3 7 8
      • eBook
        9 7 8 0 1 2 8 0 0 6 6 5 8
      Entity Information Life Cycle for Big Data walks you through the ins and outs of managing entity information so you can successfully achieve master data management (MDM) in the era of big data. This book explains big data’s impact on MDM and the critical role of entity information management system (EIMS) in successful MDM. Expert authors Dr. John R. Talburt and Dr. Yinle Zhou provide a thorough background in the principles of managing the entity information life cycle and provide practical tips and techniques for implementing an EIMS, strategies for exploiting distributed processing to handle big data for EIMS, and examples from real applications. Additional material on the theory of EIIM and methods for assessing and evaluating EIMS performance also make this book appropriate for use as a textbook in courses on entity and identity management, data management, customer relationship management (CRM), and related topics.
    • Advances in Independent Component Analysis and Learning Machines

      • 1st Edition
      • April 15, 2015
      • Ella Bingham + 3 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 8 0 6 3
      • eBook
        9 7 8 0 1 2 8 0 2 8 0 7 0
      In honour of Professor Erkki Oja, one of the pioneers of Independent Component Analysis (ICA), this book reviews key advances in the theory and application of ICA, as well as its influence on signal processing, pattern recognition, machine learning, and data mining. Examples of topics which have developed from the advances of ICA, which are covered in the book are: A unifying probabilistic model for PCA and ICA Optimization methods for matrix decompositions Insights into the FastICA algorithm Unsupervised deep learning Machine vision and image retrieval