Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Computer System Organization

      • 1st Edition
      • June 25, 2014
      • Elliott I. Organick
      • Robert L. Ashenhurst
      • English
      • Paperback
        9 7 8 1 4 8 3 2 0 5 6 1 8
      • eBook
        9 7 8 1 4 8 3 2 1 9 0 4 2
      Computer System Organization: The B5700/B6700 Series focuses on the organization of the B5700/B6700 Series developed by Burroughs Corp. More specifically, it examines how computer systems can (or should) be organized to support, and hence make more efficient, the running of computer programs that evolve with characteristically similar information structures. Comprised of nine chapters, this book begins with a background on the development of the B5700/B6700 operating systems, paying particular attention to their hardware/software architecture. The discussion then turns to the block-structured processes involved in the B6700 job, which consists of a time-invariant algorithm and a time-varying data structure which is the record of execution of that algorithm. Subsequent chapters deal with the basic data structures for B6700 algorithms; task attributes and the creation and coordination of tasks; stack structure and stack ownership; and software interrupts. Storage control strategies as well as the pros and cons of B6700 are also considered, along with some hardware details of procedure entry and return and tasking. This monograph is intended for computer center directors, other computer professionals, and serious students in computer science who have an interest in the subject of computer organization.
    • Data Mining and Predictive Analysis

      • 2nd Edition
      • December 30, 2014
      • Colleen McCue
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 2 9 2
      • eBook
        9 7 8 0 1 2 8 0 0 4 0 8 1
      Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively. Rather than being reactive, security agencies can anticipate and prevent crime through the appropriate application of data mining and the use of standard computer programs. Data Mining and Predictive Analysis offers a clear, practical starting point for professionals who need to use data mining in homeland security, security analysis, and operational law enforcement settings.This revised text highlights new and emerging technology, discusses the importance of analytic context for ensuring successful implementation of advanced analytics in the operational setting, and covers new analytic service delivery models that increase ease of use and access to high-end technology and analytic capabilities. The use of predictive analytics in intelligence and security analysis enables the development of meaningful, information based tactics, strategy, and policy decisions in the operational public safety and security environment.
    • High Performance Parallelism Pearls Volume One

      • 1st Edition
      • November 3, 2014
      • James Reinders + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 1 8 7
      • eBook
        9 7 8 0 1 2 8 0 2 1 9 9 6
      High Performance Parallelism Pearls shows how to leverage parallelism on processors and coprocessors with the same programming – illustrating the most effective ways to better tap the computational potential of systems with Intel Xeon Phi coprocessors and Intel Xeon processors or other multicore processors. The book includes examples of successful programming efforts, drawn from across industries and domains such as chemistry, engineering, and environmental science. Each chapter in this edited work includes detailed explanations of the programming techniques used, while showing high performance results on both Intel Xeon Phi coprocessors and multicore processors. Learn from dozens of new examples and case studies illustrating "success stories" demonstrating not just the features of these powerful systems, but also how to leverage parallelism across these heterogeneous systems.
    • Image Modeling

      • 1st Edition
      • May 10, 2014
      • Azriel Rosenfeld
      • English
      • Paperback
        9 7 8 1 4 8 3 2 4 5 6 8 3
      • eBook
        9 7 8 1 4 8 3 2 7 5 6 0 4
      Image Modeling compiles papers presented at a workshop on image modeling in Rosemont, Illinois on August 6-7, 1979. This book discusses the mosaic models for textures, image segmentation as an estimation problem, and comparative analysis of line-drawing modeling schemes. The statistical models for the image restoration problem, use of Markov random fields as models of texture, and mathematical models of graphics are also elaborated. This text likewise covers the univariate and multivariate random field models for images, stochastic image models generated by random tessellations of the plane, and long crested wave models. Other topics include the Boolean model and random sets, structural basis for image description, and structure in co-occurrence matrices for texture analysis. This publication is useful to specialists and professionals working in the field of image processing.
    • Handbook of Human-Computer Interaction

      • 1st Edition
      • June 28, 2014
      • M.G. Helander
      • English
      • Paperback
        9 7 8 0 4 4 4 8 8 6 7 3 6
      • eBook
        9 7 8 1 4 8 3 2 9 5 1 3 8
      This Handbook is concerned with principles of human factors engineering for design of the human-computer interface. It has both academic and practical purposes; it summarizes the research and provides recommendations for how the information can be used by designers of computer systems. The articles are written primarily for the professional from another discipline who is seeking an understanding of human-computer interaction, and secondarily as a reference book for the professional in the area, and should particularly serve the following: computer scientists, human factors engineers, designers and design engineers, cognitive scientists and experimental psychologists, systems engineers, managers and executives working with systems development.The work consists of 52 chapters by 73 authors and is organized into seven sections. In the first section, the cognitive and information-processi... aspects of HCI are summarized. The following group of papers deals with design principles for software and hardware. The third section is devoted to differences in performance between different users, and computer-aided training and principles for design of effective manuals. The next part presents important applications: text editors and systems for information retrieval, as well as issues in computer-aided engineering, drawing and design, and robotics. The fifth section introduces methods for designing the user interface. The following section examines those issues in the AI field that are currently of greatest interest to designers and human factors specialists, including such problems as natural language interface and methods for knowledge acquisition. The last section includes social aspects in computer usage, the impact on work organizations and work at home.
    • Building an Intelligence-Led Security Program

      • 1st Edition
      • December 5, 2014
      • Allan Liska
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 4 5 3
      • eBook
        9 7 8 0 1 2 8 0 2 3 7 0 9
      As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.
    • Securing VoIP

      • 1st Edition
      • November 14, 2014
      • Regis J. Jr (Bud) Bates
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 3 9 1
      • eBook
        9 7 8 0 1 2 4 1 7 1 2 2 0
      Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
    • Reliability Assurance of Big Data in the Cloud

      • 1st Edition
      • December 9, 2014
      • Yun Yang + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 5 7 2 7
      • eBook
        9 7 8 0 1 2 8 0 2 6 6 8 7
      With the rapid growth of Cloud computing, the size of Cloud data is expanding at a dramatic speed. A huge amount of data is generated and processed by Cloud applications, putting a higher demand on cloud storage. While data reliability should already be a requirement, data in the Cloud needs to be stored in a highly cost-effective manner. This book focuses on the trade-off between data storage cost and data reliability assurance for big data in the Cloud. Throughout the whole Cloud data lifecycle, four major features are presented: first, a novel generic data reliability model for describing data reliability in the Cloud; second, a minimum replication calculation approach for meeting a given data reliability requirement to facilitate data creation; third, a novel cost-effective data reliability assurance mechanism for big data maintenance, which could dramatically reduce the storage space needed in the Cloud; fourth, a cost-effective strategy for facilitating data creation and recovery, which could significantly reduce the energy consumption during data transfer.
    • Representation and Understanding

      • 1st Edition
      • June 28, 2014
      • Jerry Bobrow
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 6 0 0 8
      • eBook
        9 7 8 1 4 8 3 2 9 9 1 5 0
      Language, Thought, and Culture: Advances in the Study of Cognition: Representation and Understanding: Studies in Cognitive Science focuses on the principles, processes, and methodologies involved in artificial intelligence. The selection first offers information on the dimensions of representation, foundations for semantic networks, and reflections on the formal description of behavior. Discussions focus on relativity of behavioral description, hierarchical organization of processes, problems in knowledge representation, and inference, access, and self-awareness. The text then takes a look at the synthesis, analysis, and contingent knowledge in specialized understanding systems, some principles of memory schemata, and representing knowledge for recognition. The book examines frame representations and declarative/procedur... controversy, schema for stories, and structure of episodes in memory. Topics include long-term memory, conceptual dependency, understanding paragraphs, simple story grammar, and first attempt at synthesis. The publication then ponders on concepts for representing mundane reality in plans and multiple representations of knowledge for tutorial reasoning. The selection is highly recommended for researchers interested in exploring artificial intelligence.
    • Building an Information Security Awareness Program

      • 1st Edition
      • August 7, 2014
      • Bill Gardner + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 9 9 6 7 5
      • eBook
        9 7 8 0 1 2 4 1 9 9 8 1 1
      The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data. Forewords written by Dave Kennedy and Kevin Mitnick!