Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Hacking Web Intelligence

      • 1st Edition
      • April 13, 2015
      • Sudhanshu Chauhan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 8 6 7 5
      • eBook
        9 7 8 0 1 2 8 0 1 9 1 2 2
      Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
    • Digital Design and Computer Architecture, ARM Edition

      • 1st Edition
      • April 9, 2015
      • Sarah Harris + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 0 5 6 4
      • eBook
        9 7 8 0 1 2 8 0 0 9 1 1 6
      Digital Design and Computer Architecture: ARM Edition covers the fundamentals of digital logic design and reinforces logic concepts through the design of an ARM microprocessor. Combining an engaging and humorous writing style with an updated and hands-on approach to digital design, this book takes the reader from the fundamentals of digital logic to the actual design of an ARM processor. By the end of this book, readers will be able to build their own microprocessor and will have a top-to-bottom understanding of how it works. Beginning with digital logic gates and progressing to the design of combinational and sequential circuits, this book uses these fundamental building blocks as the basis for designing an ARM processor. SystemVerilog and VHDL are integrated throughout the text in examples illustrating the methods and techniques for CAD-based circuit design. The companion website includes a chapter on I/O systems with practical examples that show how to use the Raspberry Pi computer to communicate with peripheral devices such as LCDs, Bluetooth radios, and motors. This book will be a valuable resource for students taking a course that combines digital logic and computer architecture or students taking a two-quarter sequence in digital logic and computer organization/archite...
    • Power and Performance

      • 1st Edition
      • April 2, 2015
      • Jim Kukunas
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 2 6 6
      • eBook
        9 7 8 0 1 2 8 0 0 8 1 4 0
      Power and Performance: Software Analysis and Optimization is a guide to solving performance problems in modern Linux systems. Power-efficient chips are no help if the software those chips run on is inefficient. Starting with the necessary architectural background as a foundation, the book demonstrates the proper usage of performance analysis tools in order to pinpoint the cause of performance problems, and includes best practices for handling common performance issues those tools identify.
    • Ecological Design of Smart Home Networks

      • 1st Edition
      • March 31, 2015
      • N. Saito + 1 more
      • English
      • Hardback
        9 7 8 1 7 8 2 4 2 1 1 9 1
      • eBook
        9 7 8 1 7 8 2 4 2 1 2 4 5
      This book provides an authoritative guide for postgraduate students and academic researchers in electronics, computer and network engineering, telecommunications, energy technology and home automation, as well as R&D managers in industrial sectors such as wireless technology, consumer electronics, telecommunications and networking, information technology, energy technology and home automation. Part One outlines the key principles and technologies needed for ecological smart home networks. Beginning with a thorough overview of the concept behind ecological smart home network design, the book reviews such important areas as power line communications, hybrid systems and middleware platforms. Part Two then goes on to discuss some important applications of this technology, with wireless smart sensor networks for home and telecare, and smart home networking for content and energy management (including the intelligent Zero Emission Urban System), all explored in detail.
    • Industrial Tomography

      • 1st Edition
      • March 30, 2015
      • Mi Wang
      • English
      • Hardback
        9 7 8 1 7 8 2 4 2 1 1 8 4
      • eBook
        9 7 8 1 7 8 2 4 2 1 2 3 8
      Industrial Tomography: Systems and Applications thoroughly explores the important tomographic techniques of industrial tomography, also discussing image reconstruction, systems, and applications. The text presents complex processes, including the way three-dimensional imaging is used to create multiple cross-sections, and how computer software helps monitor flows, filtering, mixing, drying processes, and chemical reactions inside vessels and pipelines. Readers will find a comprehensive discussion on the ways tomography systems can be used to optimize the performance of a wide variety of industrial processes.
    • Machine Learning

      • 1st Edition
      • March 27, 2015
      • Sergios Theodoridis
      • English
      • Hardback
        9 7 8 0 1 2 8 0 1 5 2 2 3
      • eBook
        9 7 8 0 1 2 8 0 1 7 2 2 7
      This tutorial text gives a unifying perspective on machine learning by covering both probabilistic and deterministic approaches -which are based on optimization techniques – together with the Bayesian inference approach, whose essence lies in the use of a hierarchy of probabilistic models.The book presents the major machine learning methods as they have been developed in different disciplines, such as statistics, statistical and adaptive signal processing and computer science. Focusing on the physical reasoning behind the mathematics, all the various methods and techniques are explained in depth, supported by examples and problems, giving an invaluable resource to the student and researcher for understanding and applying machine learning concepts. The book builds carefully from the basic classical methods to the most recent trends, with chapters written to be as self-contained as possible, making the text suitable for different courses: pattern recognition, statistical/adaptive signal processing, statistical/Bayesian learning, as well as short courses on sparse modeling, deep learning, and probabilistic graphical models.
    • Digital Identity Management

      • 1st Edition
      • March 24, 2015
      • Maryline Laurent + 1 more
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 0 4 1
      • eBook
        9 7 8 0 0 8 1 0 0 5 9 1 0
      In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analysis on the digital ID issue, it describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, identity federation techniques and privacy preservation solutions. The limitations of these solutions and research issues in this field are also discussed to further understand the changes that are taking place.
    • Learning-Based Local Visual Representation and Indexing

      • 1st Edition
      • March 23, 2015
      • Rongrong Ji + 4 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 4 0 9 6
      • eBook
        9 7 8 0 1 2 8 0 2 6 2 0 5
      Learning-Based Local Visual Representation and Indexing, reviews the state-of-the-art in visual content representation and indexing, introduces cutting-edge techniques in learning based visual representation, and discusses emerging topics in visual local representation, and introduces the most recent advances in content-based visual search techniques.
    • Social Sensing

      • 1st Edition
      • March 23, 2015
      • Dong Wang + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 6 7 6
      • eBook
        9 7 8 0 1 2 8 0 1 1 3 1 7
      Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion.
    • Multi-Domain Master Data Management

      • 1st Edition
      • March 21, 2015
      • Mark Allen + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 3 5 5
      • eBook
        9 7 8 0 1 2 8 0 1 1 4 7 8
      Multi-Domain Master Data Management delivers practical guidance and specific instruction to help guide planners and practitioners through the challenges of a multi-domain master data management (MDM) implementation. Authors Mark Allen and Dalton Cervo bring their expertise to you in the only reference you need to help your organization take master data management to the next level by incorporating it across multiple domains. Written in a business friendly style with sufficient program planning guidance, this book covers a comprehensive set of topics and advanced strategies centered on the key MDM disciplines of Data Governance, Data Stewardship, Data Quality Management, Metadata Management, and Data Integration.