Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Guerrilla Analytics

      • 1st Edition
      • September 23, 2014
      • Enda Ridge
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 1 8 6
      • eBook
        9 7 8 0 1 2 8 0 0 5 0 3 3
      Doing data science is difficult. Projects are typically very dynamic with requirements that change as data understanding grows. The data itself arrives piecemeal, is added to, replaced, contains undiscovered flaws and comes from a variety of sources. Teams also have mixed skill sets and tooling is often limited. Despite these disruptions, a data science team must get off the ground fast and begin demonstrating value with traceable, tested work products. This is when you need Guerrilla Analytics. In this book, you will learn about: The Guerrilla Analytics Principles: simple rules of thumb for maintaining data provenance across the entire analytics life cycle from data extraction, through analysis to reporting. Reproducible, traceable analytics: how to design and implement work products that are reproducible, testable and stand up to external scrutiny. Practice tips and war stories: 90 practice tips and 16 war stories based on real-world project challenges encountered in consulting, pre-sales and research. Preparing for battle: how to set up your team's analytics environment in terms of tooling, skill sets, workflows and conventions. Data gymnastics: over a dozen analytics patterns that your team will encounter again and again in projects
    • CSA Guide to Cloud Computing

      • 1st Edition
      • September 22, 2014
      • Raj Samani + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 2 5 5
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 5 9
      CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA Guide to Cloud Computing provide a wealth of industry expertise you won't find anywhere else. Author Raj Samani is the Chief Technical Officer for McAfee EMEA; author Jim Reavis is the Executive Director of CSA; and author Brian Honan is recognized as an industry leader in the ISO27001 standard. They will walk you through everything you need to understand to implement a secure cloud computing structure for your enterprise or organization.
    • Embedded C Programming

      • 1st Edition
      • September 19, 2014
      • Mark Siegesmund
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 1 4 4
      • eBook
        9 7 8 0 1 2 8 0 1 4 7 0 7
      This book provides a hands-on introductory course on concepts of C programming using a PIC® microcontroller and CCS C compiler. Through a project-based approach, this book provides an easy to understand method of learning the correct and efficient practices to program a PIC® microcontroller in C language. Principles of C programming are introduced gradually, building on skill sets and knowledge. Early chapters emphasize the understanding of C language through experience and exercises, while the latter half of the book covers the PIC® microcontroller, its peripherals, and how to use those peripherals from within C in great detail. This book demonstrates the programming methodology and tools used by most professionals in embedded design, and will enable you to apply your knowledge and programming skills for any real-life application. Providing a step-by-step guide to the subject matter, this book will encourage you to alter, expand, and customize code for use in your own projects.
    • Software and System Development using Virtual Platforms

      • 1st Edition
      • September 15, 2014
      • Daniel Aarno + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 2 5 9
      • eBook
        9 7 8 0 1 2 8 0 0 8 1 3 3
      Virtual platforms are finding widespread use in both pre- and post-silicon computer software and system development. They reduce time to market, improve system quality, make development more efficient, and enable truly concurrent hardware/software design and bring-up. Virtual platforms increase productivity with unparalleled inspection, configuration, and injection capabilities. In combination with other types of simulators, they provide full-system simulations where computer systems can be tested together with the environment in which they operate. This book is not only about what simulation is and why it is important, it will also cover the methods of building and using simulators for computer-based systems. Inside you’ll find a comprehensive book about simulation best practice and design patterns, using Simics as its base along with real-life examples to get the most out of your Simics implementation. You’ll learn about: Simics architecture, model-driven development, virtual platform modelling, networking, contiguous integration, debugging, reverse execution, simulator integration, workflow optimization, tool automation, and much more.
    • There's Not an App for That

      • 1st Edition
      • September 14, 2014
      • Simon Robinson + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 9 1 2
      • eBook
        9 7 8 0 1 2 4 1 6 6 9 9 8
      There’s Not an App for That will make your work stand out from the crowd. It walks you through mobile experiences, and teaches you to evaluate current UX approaches, enabling you to think outside of the screen and beyond the conventional. You’ll review diverse aspects of mobile UX: the screens, the experience, how apps are used, and why they’re used. You’ll find special sections on "challenging your approach", as well as a series of questions you can use to critique and evaluate your own designs. Whether the authors are discussing real-world products in conjunction with suggested improvements, showcasing how existing technologies can be put together in unconventional ways, or even evaluating "far out" mobile experiences of the future, you’ll find plenty of practical pointers and action items to help you in your day-to-day work.
    • Geriatric Dentistry, An Issue of Dental Clinics of North America

      • 1st Edition
      • Volume 58-4
      • September 9, 2014
      • Lisa A. Thompson
      • English
      • Hardback
        9 7 8 0 3 2 3 3 2 6 0 5 6
      • eBook
        9 7 8 0 3 2 3 3 2 6 0 6 3
      This issue of Dental Clinics, edited by Lisa A. Thompson and Leonard J. Brennan, focuses on Geriatric Dentistry. Articles include: Our Current Geriatric Population: Demographic and Oral Health Care Utilization; Physiology of Aging of Older Adults: Systemic and Oral Health Considerations; Treatment Planning Considerations in Older Adults; Oral Health Disparity in Older Adults: Dental Decay and Tooth Loss; Oral Health Disparities in Older Adults: Oral bacteria, Inflammation and Aspiration Pneumonia; Salivary Function and Xerostomia and the Implications of Polypharmacy in Elderly; Systemic and Oral Health; Cognitive Impairment in Older Adults and Oral Health considerations: Treatment and Management; Integrating Oral Health into the Interdisciplinary Health Sciences Curriculum; Innovations in Dental Care Delivery for the Older Adult; and more!
    • Hacking and Penetration Testing with Low Power Devices

      • 1st Edition
      • August 29, 2014
      • Philip Polstra
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 5 1 8
      • eBook
        9 7 8 0 1 2 8 0 0 8 2 4 9
      Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!
    • Modern Enterprise Business Intelligence and Data Management

      • 1st Edition
      • August 28, 2014
      • Alan Simon
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 3 9 1
      • eBook
        9 7 8 0 1 2 8 0 1 7 4 5 6
      Nearly every large corporation and governmental agency is taking a fresh look at their current enterprise-scale business intelligence (BI) and data warehousing implementations at the dawn of the "Big Data Era"…and most see a critical need to revitalize their current capabilities. Whether they find the frustrating and business-impeding continuation of a long-standing "silos of data" problem, or an over-reliance on static production reports at the expense of predictive analytics and other true business intelligence capabilities, or a lack of progress in achieving the long-sought-after enterprise-wide "single version of the truth" – or all of the above – IT Directors, strategists, and architects find that they need to go back to the drawing board and produce a brand new BI/data warehousing roadmap to help move their enterprises from their current state to one where the promises of emerging technologies and a generation’s worth of best practices can finally deliver high-impact, architecturally evolvable enterprise-scale business intelligence and data warehousing. Author Alan Simon, whose BI and data warehousing experience dates back to the late 1970s and who has personally delivered or led more than thirty enterprise-wide BI/data warehousing roadmap engagements since the mid-1990s, details a comprehensive step-by-step approach to building a best practices-driven, multi-year roadmap in the quest for architecturally evolvable BI and data warehousing at the enterprise scale. Simon addresses the triad of technology, work processes, and organizational/human factors considerations in a manner that blends the visionary and the pragmatic.
    • Bitemporal Data

      • 1st Edition
      • August 19, 2014
      • Tom Johnston
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 0 6 7 6
      • eBook
        9 7 8 0 1 2 4 0 8 0 5 5 3
      Bitemporal data has always been important. But it was not until 2011 that the ISO released a SQL standard that supported it. Currently, among major DBMS vendors, Oracle, IBM and Teradata now provide at least some bitemporal functionality in their flagship products. But to use these products effectively, someone in your IT organization needs to know more than how to code bitemporal SQL statements. Perhaps, in your organization, that person is you. To correctly interpret business requests for temporal data, to correctly specify requirements to your IT development staff, and to correctly design bitemporal databases and applications, someone in your enterprise needs a deep understanding of both the theory and the practice of managing bitemporal data. Someone also needs to understand what the future may bring in the way of additional temporal functionality, so their enterprise can plan for it. Perhaps, in your organization, that person is you. This is the book that will show the do-it-yourself IT professional how to design and build bitemporal databases and how to write bitemporal transactions and queries, and will show those who will direct the use of vendor-provided bitemporal DBMSs exactly what is going on "under the covers" of that software.
    • Windows Performance Analysis Field Guide

      • 1st Edition
      • August 12, 2014
      • Clint Huffman
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 7 0 1 8
      • eBook
        9 7 8 0 1 2 4 1 6 7 0 4 9
      Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems.