Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Database

      • 1st Edition
      • May 12, 2014
      • Patrick O'Neil
      • English
      • eBook
        9 7 8 1 4 8 3 1 8 4 0 4 3
      Database: Principles Programming Performance provides an introduction to the fundamental principles of database systems. This book focuses on database programming and the relationships between principles, programming, and performance. Organized into 10 chapters, this book begins with an overview of database design principles and presents a comprehensive introduction to the concepts used by a DBA. This text then provides grounding in many abstract concepts of the relational model. Other chapters introduce SQL, describing its capabilities and covering the statements and functions of the programming language. This book provides as well an introduction to Embedded SQL and Dynamic SQL that is sufficiently detailed to enable students to immediately start writing database programs. The final chapter deals with some of the motivations for database systems spanning multiple CPUs, including client-server and distributed transactions. This book is a valuable resource for database administrators, application programmers, specialist users, and end users.
    • Uncertainty in Artificial Intelligence

      • 1st Edition
      • June 28, 2014
      • MKP
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 3 3 2 5
      • eBook
        9 7 8 1 4 8 3 2 9 8 6 0 3
      Uncertainty in Artificial Intelligence: Proceedings of the Tenth Conference (1994) covers the papers accepted for presentation at the Tenth Annual Conference on Uncertainty in Artificial Intelligence, held in Seattle, Washington on July 29-31, 1994. The book focuses on the processes, methodologies, and approaches involved in artificial intelligence, including approximations, computational methods, Bayesian networks, and probabilistic inference. The selection first offers information on ending-based strategies for part-of-speech tagging; an evaluation of an algorithm for inductive learning of Bayesian belief networks using simulated data sets; and probabilistic constraint satisfaction with non-Gaussian noise. The text then examines Laplace's method approximations for probabilistic inference in belief networks with continuous variables; computational methods, bounds, and applications of counterfactual probabilities; and approximation algorithms for the loop cutset problem. The book takes a look at learning in multi-level stochastic games with delayed information; properties of Bayesian belief network learning algorithms; and the relation between kappa calculus and probabilistic reasoning. The manuscript also elaborates on intercausal independence and heterogeneous factorization; evidential reasoning with conditional belief functions; and state-space abstraction for anytime evaluation of probabilistic networks. The selection is a valuable reference for researches interested in artificial intelligence.
    • Analysis, Design and Evaluation of Man-Machine Systems 1989

      • 1st Edition
      • May 23, 2014
      • B. Hu
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 2 4 7
      • eBook
        9 7 8 1 4 8 3 2 9 8 8 7 0
      The twenty-seven papers cover recent advances in both empirical and theoretical aspects of man-machine interaction with special emphasis on the subjects of man-automation and man-computer interaction. They provide information on a subject which has grown rapidly in importance during recent years.
    • Enterprise Business Intelligence and Data Warehousing

      • 1st Edition
      • November 24, 2014
      • Alan Simon
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 4 0 7
      • eBook
        9 7 8 0 1 2 8 0 1 7 4 6 3
      Corporations and governmental agencies of all sizes are embracing a new generation of enterprise-scale business intelligence (BI) and data warehousing (DW), and very often appoint a single senior-level individual to serve as the Enterprise BI/DW Program Manager. This book is the essential guide to the incremental and iterative build-out of a successful enterprise-scale BI/DW program comprised of multiple underlying projects, and what the Enterprise Program Manager must successfully accomplish to orchestrate the many moving parts in the quest for true enterprise-scale business intelligence and data warehousing. Author Alan Simon has served as an enterprise business intelligence and data warehousing program management advisor to many of his clients, and spent an entire year with a single client as the adjunct consulting director for a $10 million enterprise data warehousing (EDW) initiative. He brings a wealth of knowledge about best practices, risk management, organizational culture alignment, and other Critical Success Factors (CSFs) to the discipline of enterprise-scale business intelligence and data warehousing.
    • Computer Programming and Architecture

      • 2nd Edition
      • June 28, 2014
      • Henry Levy + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 8 2 4 8
      • eBook
        9 7 8 1 4 8 3 2 9 9 3 7 2
      Takes a unique systems approach to programming and architecture of the VAXUsing the VAX as a detailed example, the first half of this book offers a complete course in assembly language programming. The second describes higher-level systems issues in computer architecture. Highlights include the VAX assembler and debugger, other modern architectures such as RISCs, multiprocessing and parallel computing, microprogramming, caches and translation buffers, and an appendix on the Berkeley UNIX assembler.
    • Networks-on-Chip

      • 1st Edition
      • November 7, 2014
      • Sheng Ma + 3 more
      • Zhiying Wang
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 9 7 9 6
      • eBook
        9 7 8 0 1 2 8 0 1 1 7 8 2
      Networks-on-Chip: From Implementations to Programming Paradigms provides a thorough and bottom-up exploration of the whole NoC design space in a coherent and uniform fashion, from low-level router, buffer and topology implementations, to routing and flow control schemes, to co-optimizations of NoC and high-level programming paradigms. This textbook is intended for an advanced course on computer architecture, suitable for graduate students or senior undergrads who want to specialize in the area of computer architecture and Networks-on-Chip. It is also intended for practitioners in the industry in the area of microprocessor design, especially the many-core processor design with a network-on-chip. Graduates can learn many practical and theoretical lessons from this course, and also can be motivated to delve further into the ideas and designs proposed in this book. Industrial engineers can refer to this book to make practical tradeoffs as well. Graduates and engineers who focus on off-chip network design can also refer to this book to achieve deadlock-free routing algorithm designs.
    • Collaboration with Cloud Computing

      • 1st Edition
      • April 7, 2014
      • Ric Messier
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 4 0 7
      • eBook
        9 7 8 0 1 2 4 1 7 1 2 3 7
      Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
    • How to Attack and Defend Your Website

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Alejandro Caceres
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 2 5
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 4 7
      How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.
    • Industrial Network Security

      • 2nd Edition
      • December 9, 2014
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 1 4 9
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 4 2
      As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
    • Computers and the General Practitioner

      • 1st Edition
      • May 9, 2014
      • Alastair Malcolm + 1 more
      • English
      • Paperback
        9 7 8 1 4 8 3 1 7 4 1 8 1
      • eBook
        9 7 8 1 4 8 3 1 8 9 9 9 4
      Computers and the General Practitioner focuses on the applications of computers in various aspects of health service, including ECG analysis, primary care, and diagnosis. The selection first tackles general practice and technological promise and experience of pioneers. Topics include information systems and general practice, trends in silicon chip technology, and problems of computer usage in National Health Service practice. The publication then examines security in computer controlled information systems and national strategy for primary care computing, including security defenses, linked systems, cryptography, and basic system. The text takes a look at the computer education of the general practitioner, use of computers in the consulting room, and ECG analysis by computer in general practice. Discussions focus on the problems associated with educating doctors, features of a heuristic system, and the function of the computer as a general practitioner's diagnostic assistant. The selection is a dependable source of data for doctors and readers interested in exploring the applications of computers in health services.