Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Architecting High Performing, Scalable and Available Enterprise Web Applications

      • 1st Edition
      • October 29, 2014
      • Shailesh Kumar Shivakumar
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 2 5 8 0
      • eBook
        9 7 8 0 1 2 8 0 2 5 2 8 4
      Architecting High Performing, Scalable and Available Enterprise Web Applications provides in-depth insights into techniques for achieving desired scalability, availability and performance quality goals for enterprise web applications. The book provides an integrated 360-degree view of achieving and maintaining these attributes through practical, proven patterns, novel models, best practices, performance strategies, and continuous improvement methodologies and case studies. The author shares his years of experience in application security, enterprise application testing, caching techniques, production operations and maintenance, and efficient project management techniques.
    • PCI Compliance

      • 4th Edition
      • October 29, 2014
      • Branden R. Williams + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 7 9 7
      • eBook
        9 7 8 0 1 2 8 0 1 6 5 1 0
      Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifia... information.
    • A Practical Guide to SysML

      • 3rd Edition
      • October 23, 2014
      • Sanford Friedenthal + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 0 2 5
      • eBook
        9 7 8 0 1 2 8 0 0 8 0 0 3
      A Practical Guide to SysML, Third Edition, fully updated for SysML version 1.4, provides a comprehensive and practical guide for modeling systems with SysML. With their unique perspective as leading contributors to the language, Friedenthal, Moore, and Steiner provide a full description of the language along with a quick reference guide and practical examples to help you use SysML. The book begins with guidance on the most commonly used features to help you get started quickly. Part 1 explains the benefits of a model-based approach, providing an overview of the language and how to apply SysML to model systems. Part 2 includes a comprehensive description of SysML that provides a detailed understanding that can serve as a foundation for modeling with SysML, and as a reference for practitioners. Part 3 includes methods for applying model-based systems engineering using SysML to specify and design systems, and how these methods can help manage complexity. Part 4 deals with topics related to transitioning MBSE practice into your organization, including integration of the system model with other engineering models, and strategies for adoption of MBSE.
    • Cyber Reconnaissance, Surveillance and Defense

      • 1st Edition
      • October 16, 2014
      • Robert Shimonski
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 0 8 3
      • eBook
        9 7 8 0 1 2 8 0 1 4 6 8 4
      At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gatherin... and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.
    • Commonsense Reasoning

      • 2nd Edition
      • October 16, 2014
      • Erik T. Mueller
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 4 1 6 5
      • eBook
        9 7 8 0 1 2 8 0 1 6 4 7 3
      To endow computers with common sense is one of the major long-term goals of artificial intelligence research. One approach to this problem is to formalize commonsense reasoning using mathematical logic. Commonsense Reasoning: An Event Calculus Based Approach is a detailed, high-level reference on logic-based commonsense reasoning. It uses the event calculus, a highly powerful and usable tool for commonsense reasoning, which Erik Mueller demonstrates as the most effective tool for the broadest range of applications. He provides an up-to-date work promoting the use of the event calculus for commonsense reasoning, and bringing into one place information scattered across many books and papers. Mueller shares the knowledge gained in using the event calculus and extends the literature with detailed event calculus solutions that span many areas of the commonsense world. The Second Edition features new chapters on commonsense reasoning using unstructured information including the Watson system, commonsense reasoning using answer set programming, and techniques for acquisition of commonsense knowledge including crowdsourcing.
    • Optimized Cloud Resource Management and Scheduling

      • 1st Edition
      • October 15, 2014
      • Wenhong Dr. Tian + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 4 7 6 9
      • eBook
        9 7 8 0 1 2 8 0 1 6 4 5 9
      Optimized Cloud Resource Management and Scheduling identifies research directions and technologies that will facilitate efficient management and scheduling of computing resources in cloud data centers supporting scientific, industrial, business, and consumer applications. It serves as a valuable reference for systems architects, practitioners, developers, researchers and graduate level students.
    • Detecting and Combating Malicious Email

      • 1st Edition
      • October 7, 2014
      • Julie JCH Ryan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 1 1 0 3
      • eBook
        9 7 8 0 1 2 8 0 0 5 4 6 0
      Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.
    • Studying and Designing Technology for Domestic Life

      • 1st Edition
      • September 25, 2014
      • Tejinder K. Judge + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 5 5 2
      • eBook
        9 7 8 0 1 2 8 0 0 6 1 4 6
      Conducting research and technology design for domestic life is by no means easy. Methods commonly used in the field of Human-Computer Interaction in settings like the workplace may not easily translate to the richness and complexity of domestic life. This book documents new ways in which researchers are studying domestic life, as well as designing and evaluating technology in the home. Each chapter is a candid discussion about methods that were successfully used for research studies with a focus on the challenges that the researchers faced and the best practices they learned.
    • Brain-Computer Interfacing for Assistive Robotics

      • 1st Edition
      • September 24, 2014
      • Vaibhav Gandhi
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 4 3 8
      • eBook
        9 7 8 0 1 2 8 0 1 5 8 7 2
      Brain-computer interface (BCI) technology provides a means of communication that allows individuals with severely impaired movement to communicate with assistive devices using the electroencephalogram (EEG) or other brain signals. The practicality of a BCI has been possible due to advances in multi-disciplinary areas of research related to cognitive neuroscience, brain-imaging techniques and human-computer interfaces. However, two major challenges remain in making BCI for assistive robotics practical for day-to-day use: the inherent lower bandwidth of BCI, and how to best handle the unknown embedded noise within the raw EEG. Brain-Computer Interfacing for Assistive Robotics is a result of research focusing on these important aspects of BCI for real-time assistive robotic application. It details the fundamental issues related to non-stationary EEG signal processing (filtering) and the need of an alternative approach for the same. Additionally, the book also discusses techniques for overcoming lower bandwidth of BCIs by designing novel use-centric graphical user interfaces. A detailed investigation into both these approaches is discussed.
    • Computational Network Science

      • 1st Edition
      • September 23, 2014
      • Henry Hexmoor
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 9 1 1
      • eBook
        9 7 8 0 1 2 8 0 1 1 5 6 0
      The emerging field of network science represents a new style of research that can unify such traditionally-divers... fields as sociology, economics, physics, biology, and computer science. It is a powerful tool in analyzing both natural and man-made systems, using the relationships between players within these networks and between the networks themselves to gain insight into the nature of each field. Until now, studies in network science have been focused on particular relationships that require varied and sometimes-incompatib... datasets, which has kept it from being a truly universal discipline. Computational Network Science seeks to unify the methods used to analyze these diverse fields. This book provides an introduction to the field of Network Science and provides the groundwork for a computational, algorithm-based approach to network and system analysis in a new and important way. This new approach would remove the need for tedious human-based analysis of different datasets and help researchers spend more time on the qualitative aspects of network science research.