Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Modern Enterprise Business Intelligence and Data Management

      • 1st Edition
      • August 28, 2014
      • Alan Simon
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 3 9 1
      • eBook
        9 7 8 0 1 2 8 0 1 7 4 5 6
      Nearly every large corporation and governmental agency is taking a fresh look at their current enterprise-scale business intelligence (BI) and data warehousing implementations at the dawn of the "Big Data Era"…and most see a critical need to revitalize their current capabilities. Whether they find the frustrating and business-impeding continuation of a long-standing "silos of data" problem, or an over-reliance on static production reports at the expense of predictive analytics and other true business intelligence capabilities, or a lack of progress in achieving the long-sought-after enterprise-wide "single version of the truth" – or all of the above – IT Directors, strategists, and architects find that they need to go back to the drawing board and produce a brand new BI/data warehousing roadmap to help move their enterprises from their current state to one where the promises of emerging technologies and a generation’s worth of best practices can finally deliver high-impact, architecturally evolvable enterprise-scale business intelligence and data warehousing. Author Alan Simon, whose BI and data warehousing experience dates back to the late 1970s and who has personally delivered or led more than thirty enterprise-wide BI/data warehousing roadmap engagements since the mid-1990s, details a comprehensive step-by-step approach to building a best practices-driven, multi-year roadmap in the quest for architecturally evolvable BI and data warehousing at the enterprise scale. Simon addresses the triad of technology, work processes, and organizational/human factors considerations in a manner that blends the visionary and the pragmatic.
    • Advanced Neural Computers

      • 1st Edition
      • June 28, 2014
      • R. Eckmiller
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 5 8 2
      • eBook
        9 7 8 1 4 8 3 2 9 4 2 7 8
      This book is the outcome of the International Symposium on Neural Networks for Sensory and Motor Systems (NSMS) held in March 1990 in the FRG. The NSMS symposium assembled 45 invited experts from Europe, America and Japan representing the fields of Neuroinformatics, Computer Science, Computational Neuroscience, and Neuroscience.As a rapidly-published report on the state of the art in Neural Computing it forms a reference book for future research in this highly interdisciplinary field and should prove useful in the endeavor to transfer concepts of brain function and structure to novel neural computers with adaptive, dynamical neural net topologies.A feature of the book is the completeness of the references provided. An alphabetical list of all references quoted in the papers is given, as well as a separate list of general references to help newcomers to the field. A subject index and author index also facilitate access to various details.
    • Studying and Designing Technology for Domestic Life

      • 1st Edition
      • September 25, 2014
      • Tejinder K. Judge + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 5 5 2
      • eBook
        9 7 8 0 1 2 8 0 0 6 1 4 6
      Conducting research and technology design for domestic life is by no means easy. Methods commonly used in the field of Human-Computer Interaction in settings like the workplace may not easily translate to the richness and complexity of domestic life. This book documents new ways in which researchers are studying domestic life, as well as designing and evaluating technology in the home. Each chapter is a candid discussion about methods that were successfully used for research studies with a focus on the challenges that the researchers faced and the best practices they learned.
    • History of Computing in the Twentieth Century

      • 1st Edition
      • June 28, 2014
      • Nicholas Metropolis
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 6 0 9 1
      • eBook
        9 7 8 1 4 8 3 2 9 6 6 8 5
      A History of Computing in the Twentieth Century focuses on the advancements in the processes, methodologies, programs, and techniques in computing. The selection first elaborates on computing developments in Cambridge, U.S.A., pioneering work on computers at Bletchley, and the COLOSSUS. Discussions focus on secrecy and priority, the first COLOSSUS, MARK II COLOSSUS, postwar developments in computing, and the HEATH ROBINSON project. The text then ponders on Turing's work at the National Physical Laboratory and the construction of Pilot ACE, DEUCE, and ACE, the Smithsonian Computer History Project, and programming in America. Topics include origins of FORTRAN, optimization techniques in FORTRAN, DEUCE computer, and the Pilot ACE. The book takes a look at the development of programming in the USSR, advancement of programming languages, and reflections on the evolution of algorithmic language. The book also examines the computer development at Manchester University, the sieve process, MANIAC project, and the ENIAC project. The selection is a valuable reference for computer science experts and researchers interested in the development of computing.
    • How to Define and Build an Effective Cyber Threat Intelligence Capability

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Eric Olson + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 0 1
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 2 3
      Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
    • Cloud Networking

      • 1st Edition
      • June 9, 2014
      • Gary Lee
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 2 8 0
      • eBook
        9 7 8 0 1 2 8 0 0 8 1 6 4
      Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures, fabric technology, interconnections, and more. By the end of the book, readers will understand core networking technologies and how they’re used in a cloud data center.
    • Psychology of Programming

      • 1st Edition
      • May 19, 2014
      • J.-M. Hoc
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 9 0 2
      • eBook
        9 7 8 1 4 8 3 2 9 5 9 1 6
      Psychology provides a backdrop for most of the study of human*b1computer interaction. In this volume the psychological issues that pertain to programming, rather than systems design, are examined in four sections: Theoretical and Methodological Issues; Language Design and Skill Acquisition; Expert Programming; and the Future.****The book was inspired by working groups in France and the United Kingdom but also includes work by major North American figures (such as Curtis and Soloway). It is the first comprehensive work on this topic since the early 1980s.
    • The UX Five-Second Rules

      • 1st Edition
      • March 21, 2014
      • Paul Doncaster
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 3 4 7
      • eBook
        9 7 8 0 1 2 8 0 0 6 6 1 0
      The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method. The Five-Second Rules uses detailed examples from a collection of more than 300 tests to describe the strengths and weaknesses of this rapid testing method. Readers will learn about the "five-second rules" for getting useful data, and will explore what types of design issues can be resolved by using the method. A five-second test (also known as "timeout test" and "exposure test") involves displaying a visual or informational design for five seconds, removing it from view, then asking what aspects were recalled most easily or vividly. The goal is to understand what stands out most about a design or product, and the impact on the viewer's perception of it.
    • Quotient Space Based Problem Solving

      • 1st Edition
      • January 30, 2014
      • Ling Zhang + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 0 3 0 9 8
      • Hardback
        9 7 8 0 1 2 4 1 0 3 8 7 0
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 3 3
      Quotient Space Based Problem Solving provides an in-depth treatment of hierarchical problem solving, computational complexity, and the principles and applications of multi-granular computing, including inference, information fusing, planning, and heuristic search.
    • Face Detection and Recognition on Mobile Devices

      • 1st Edition
      • November 25, 2014
      • Haowei Liu
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 4 5 2
      • eBook
        9 7 8 0 1 2 4 1 7 1 2 8 2
      This hands-on guide gives an overview of computer vision and enables engineers to understand the implications and challenges behind mobile platform design choices. Using face-related algorithms as examples, the author surveys and illustrates how design choices and algorithms can be geared towards developing power-saving and efficient applications on resource constrained mobile platforms.