Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Microcomputer Application in Process Control

      • 1st Edition
      • June 28, 2014
      • E. Adali + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 6 4 5 9
      • eBook
        9 7 8 1 4 8 3 2 9 8 9 3 1
      This symposium brings together the research from different disciplines of process control, and discusses the problems encountered in the application of automation systems. The papers in this volume analyze the results of theoretical research and how far applications have been developed, new design methodologies and technologies, to give a comprehensive overview of the state of the art of this fast-developing science.
    • Analysis, Design and Evaluation of Man-Machine Systems 1988

      • 1st Edition
      • June 28, 2014
      • J. Ranta
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 5 7 5
      • eBook
        9 7 8 1 4 8 3 2 9 9 0 4 4
      This volume provides a state-of-the-art review of the development and future use of man-machine systems in all aspects of business and industry. The papers cover such topics as human-computer interaction, system design, and the impact of automation in general, and also by the use of case studies describe a wide range of applications in such areas as office automation, transportation, power plants, machinery and manufacturing processes and defence systems. Contains 73 papers.
    • There's Not an App for That

      • 1st Edition
      • September 14, 2014
      • Simon Robinson + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 9 1 2
      • eBook
        9 7 8 0 1 2 4 1 6 6 9 9 8
      There’s Not an App for That will make your work stand out from the crowd. It walks you through mobile experiences, and teaches you to evaluate current UX approaches, enabling you to think outside of the screen and beyond the conventional. You’ll review diverse aspects of mobile UX: the screens, the experience, how apps are used, and why they’re used. You’ll find special sections on "challenging your approach", as well as a series of questions you can use to critique and evaluate your own designs. Whether the authors are discussing real-world products in conjunction with suggested improvements, showcasing how existing technologies can be put together in unconventional ways, or even evaluating "far out" mobile experiences of the future, you’ll find plenty of practical pointers and action items to help you in your day-to-day work.
    • Social Engineering Penetration Testing

      • 1st Edition
      • April 11, 2014
      • Gavin Watson + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 2 4 8
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 2 8
      Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
    • Analysis, Design & Evaluation of Man-Machine Systems

      • 1st Edition
      • June 28, 2014
      • G. Mancini + 2 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 4 5 2
      • eBook
        9 7 8 1 4 8 3 2 9 8 0 9 2
      Provides a valuable overview of human-machine interaction in technological systems, with particular emphasis on recent advances in theory, experimental and analytical research, and applications related to man-machine systems. Topics covered include: Automation and Operator - task analysis, decision support, task allocation, management decision support, supervisory control, artificial intelligence, training and teaching, expert knowledge; System Concept and Design - software ergonomics, fault diagnosis, safety, design concepts; Man-machine Interface - interface design, graphics and vision, user adaptive interfaces; Systems Operation - process industry, electric power, aircraft, surface transport, prostheses and manual control. Contains 53 papers and three discussion sessions.
    • How to Defeat Advanced Malware

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Simon Crosby
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 1 8
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 3 0
      How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization... The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization...
    • Eye Tracking in User Experience Design

      • 1st Edition
      • March 12, 2014
      • Jennifer Romano Bergstrom + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 1 3 8 3
      • eBook
        9 7 8 0 1 2 4 1 6 7 0 9 4
      Eye Tracking for User Experience Design explores the many applications of eye tracking to better understand how users view and interact with technology. Ten leading experts in eye tracking discuss how they have taken advantage of this new technology to understand, design, and evaluate user experience. Real-world stories are included from these experts who have used eye tracking during the design and development of products ranging from information websites to immersive games. They also explore recent advances in the technology which tracks how users interact with mobile devices, large-screen displays and video game consoles. Methods for combining eye tracking with other research techniques for a more holistic understanding of the user experience are discussed. This is an invaluable resource to those who want to learn how eye tracking can be used to better understand and design for their users.
    • Bridging UX and Web Development

      • 1st Edition
      • June 6, 2014
      • Jack Moffett
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 2 4 5 0
      • eBook
        9 7 8 0 1 2 8 0 0 7 8 7 7
      The divide between UX and Web development can be stifling. Bridging UX and Web Development prepares you to break down those walls by teaching you how to integrate with your team’s developers. You examine the process from their perspective, discovering tools and coding principles that will help you bridge the gap between design and implementation. With these tried and true approaches, you’ll be able to capitalize on a more productive work environment. Whether you’re a novice UX professional finding your place in the software industry and looking to nail down your technical skills, or a seasoned UI designer looking for practical information on how to integrate your team with development, this is the must-have resource for your UX library.
    • Virtual Reality

      • 1st Edition
      • May 10, 2014
      • Alan Wexelblat
      • English
      • Paperback
        9 7 8 1 4 8 3 2 0 7 1 2 4
      • eBook
        9 7 8 1 4 8 3 2 2 0 5 5 0
      Virtual Reality: Applications and Explorations provides information pertinent to the fundamental aspects of virtual reality and artificial reality. This book discusses the potential applications of virtual reality. Organized into three parts encompassing 10 chapters, this book begins with an overview of the traditional computer science activities ad discusses how hard problems in computer science can be addressed with virtual reality ideas and technology. This text then explores some applications of virtual reality technology that could potentially touch almost every purposeful activity that humans undertake in a technological civilization. Other chapters consider the use of virtual reality to manage and present to users information that cannot otherwise be comprehended. This book discusses as well the use of artificial worlds in both computer art and virtual reality. The final chapter deals with how the ideas of virtual reality and artificial reality can be of use to anyone who has to manage a business or organization. This book is a valuable resource for computer scientists.
    • Embedded C Programming

      • 1st Edition
      • September 19, 2014
      • Mark Siegesmund
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 1 4 4
      • eBook
        9 7 8 0 1 2 8 0 1 4 7 0 7
      This book provides a hands-on introductory course on concepts of C programming using a PIC® microcontroller and CCS C compiler. Through a project-based approach, this book provides an easy to understand method of learning the correct and efficient practices to program a PIC® microcontroller in C language. Principles of C programming are introduced gradually, building on skill sets and knowledge. Early chapters emphasize the understanding of C language through experience and exercises, while the latter half of the book covers the PIC® microcontroller, its peripherals, and how to use those peripherals from within C in great detail. This book demonstrates the programming methodology and tools used by most professionals in embedded design, and will enable you to apply your knowledge and programming skills for any real-life application. Providing a step-by-step guide to the subject matter, this book will encourage you to alter, expand, and customize code for use in your own projects.